Cryptography: Theory and Practice
The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
Подобные документы
- 101. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014 The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.
статья, добавлен 19.03.2024The problem of digital inequality, imbalance in the use of digital technologies in the public sector at central and local levels is analyzed. Features of intellectual communication of power and society in the context of global informatization in Ukraine.
статья, добавлен 19.02.2021- 104. BIM-technology
Main features of BIM-technology. Getting of the digital copy of the building or a construction. Quick make changes to the project. Automation of issue of specifications and sheets of volumes. Main ways of achieving efficiency of the BIM-technology.
реферат, добавлен 21.10.2016 This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014История становления компьютерных игр как отдельного направление в области информационных технологий. Подготовка и требование к тестовой среде. Алгоритмы взаимодействия Main Object и триггеров. Сценарий взаимодействия Main Object и Interactive Object.
дипломная работа, добавлен 07.03.2016Метод как конструкция в виде блока кода, которая выполняет некоторые действия и имеет логическую смысловую нагрузку. Математические функции как аналог методов языка C#. Вызов методов Main и SayHello, их параметры, а также передача по ссылке и значению.
презентация, добавлен 10.04.2023Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012Изучение оптимальных управленческих стратегий, основанных на анализе имитационных экспериментов с целью оптимизации кадрового состава ремонтных бригад в соответствии с жилищным фондом управляющей компании. Описание агента Construct, Service_unit и Main.
контрольная работа, добавлен 20.02.2019Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
статья, добавлен 23.05.2023- 111. Facebook: how to use
Facebook as a social networking service launched in February 2004. Facts and expert’s opinion concerning using it. Join common-interest user groups or organized by workplace. Update like enough to keep your page interesting. Questions for beginners.
презентация, добавлен 25.01.2014 Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019Принцип работы, производительность и конструктивные особенности дисковода CD-ROM. Устройство и технология производства CD-ROM. Цифровые интерфейсы, подключение аудиоканалов. Стандарты на компакт-диски. Динамические изображения и стандарт White Book.
реферат, добавлен 21.10.2010The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023- 115. The code book
The history of codes and ciphers as the story of the centuries-old battle between codemakers and codebreakers, an intellectual arms race that has had a dramatic impact on the course of history. The mechanization of secrecy. A qantum leap into the future.
книга, добавлен 08.03.2014 Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
статья, добавлен 25.12.2016Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
статья, добавлен 19.07.2020An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.
статья, добавлен 12.01.2023Устройство и технология производства CD-ROM. Цифровые интерфейсы, подключение аудиоканалов. Стандарты на компакт-диски. Динамические изображения и стандарт White Book. Работа по механическому и программному восстановлению работоспособности приводов.
курсовая работа, добавлен 10.05.2012- 120. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 Краткая история и инновационная деятельности тайваньской компании Asus. Презентация продукции Asus на международной выставке электроники. Особенности функциональных смартфонов Asus ZenFone, ноутбуков Transformer Book Duet и мониторов ROG Swift PG278Q.
реферат, добавлен 07.12.2014Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
дипломная работа, добавлен 23.09.2018Consideration of book presentsways, him разнородностей in statistical models on the different levels of analysis, successive theoretical structure that places the models of lids as decision elements in a race between a steganography and steganalysis.
учебное пособие, добавлен 08.03.2014An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014Технологія віртуальних приватних мереж (VPN, Virtual Private Network). Класифікація VPN за ступенем захищеності використовуваного середовища, засобом реалізації, призначенням, типом протоколу, рівнем мережевого протоколу. Компоненти, що формують VPN.
курсовая работа, добавлен 28.11.2014