Cryptography in C and C++

Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

Подобные документы

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    книга, добавлен 08.03.2014

  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    книга, добавлен 08.03.2014

  • Параметры алгоритма шифрования и типы криптосистем. Правило Керкхоффа. Симметричное шифрование. Проблема генерации криптостойких ключей. Концепция шифрования по алгоритму Data Encryption Standard. Зависимость между открытыми и закрытыми ключами.

    презентация, добавлен 20.05.2013

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Алгоритмы применения блочных шифров для защиты данных. Разработка криптографического программного обеспечения, способного шифровать и дешифровать текст алгоритмом DES. Алгоритм пермутации ключа, реверсный порядок применения подключей для дешифрования.

    контрольная работа, добавлен 26.01.2013

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.

    статья, добавлен 31.08.2022

  • Загальні теоретичні відомості та одержання початкових навичок роботи з WinAPI (Windows Application Programm Interface). Сутність, характеристика та значення функції WinMain, API GetMessage, MainRegister. Приклади завдань для вирішення з даної теми.

    контрольная работа, добавлен 29.06.2010

  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга, добавлен 08.03.2014

  • Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.

    книга, добавлен 08.03.2014

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.

    статья, добавлен 11.07.2022

  • A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.

    книга, добавлен 08.03.2014

  • The working with excel. The basic operations in the work: creating, editing, copying, removing different data. Editing the cell by using the formula bar and by double-clicking, using the formatting toolbar. Changing the font size and formatting numbers.

    контрольная работа, добавлен 21.11.2010

  • Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.

    материалы конференции, добавлен 08.03.2014

  • Объект Application как посредник между программой и операционной системой Windows. Получение списка принтеров, доступных в системе. Объект Clipboard как область межпрограммного обмена данными Windows, которая инкапсулирует свойства для работы с буфером.

    реферат, добавлен 28.10.2011

  • Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.

    книга, добавлен 08.03.2014

  • Характеристика особенностей первых версий Windows. Описание особенностей интерфейса и программ версии Windows 95, Windows 98, Windows 2000 и Windows Me. Характеристика специфики операционной системы Windows XP, Windows Vista, Windows 7 и Windows 8.

    реферат, добавлен 02.04.2017

  • Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.

    курс лекций, добавлен 11.10.2014

  • This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.

    статья, добавлен 26.10.2020

  • Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.

    диссертация, добавлен 27.01.2015

  • One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.

    статья, добавлен 15.09.2012

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

  • Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.

    книга, добавлен 08.03.2014

  • Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.

    учебное пособие, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.