Advances in Cryptology
Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
Подобные документы
Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.
книга, добавлен 08.03.2014- 27. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
книга, добавлен 08.03.2014 Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
книга, добавлен 08.03.2014The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
книга, добавлен 08.03.2014Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.
статья, добавлен 18.02.2021Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
книга, добавлен 08.03.2014An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
книга, добавлен 08.03.2014The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
книга, добавлен 08.03.2014A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014Basic security skills on the World Wide Web. Cryptology, Web site protection and attacks. One-way encryptions and message digests. Some strong symmetric-key ciphers. Practical software-based stream ciphers. Block ciphers with variable key lengths.
учебное пособие, добавлен 04.12.2012There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.
статья, добавлен 17.02.2021Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.
книга, добавлен 08.03.2014Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
книга, добавлен 08.03.2014Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.
книга, добавлен 08.03.2014The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
книга, добавлен 13.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.
книга, добавлен 08.03.2014Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Various aspects of multimedia content encryption. His general performance and the fundamental techniques. The common encryption techniques, including complete, partial and compression-combined encryption, will be investigated, analyzed and evaluated.
книга, добавлен 08.03.2014