A quick glance at quantum cryptography

The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.

Подобные документы

  • Исследование ключевых инструментальных слоев открытых настольных платформ. Анализ интерфейса программного комплекса Quantum GIS. Сравнительная характеристика открытых пользовательских географических информационных систем и их проприетарных аналогов.

    реферат, добавлен 24.10.2014

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.

    презентация, добавлен 09.03.2016

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    презентация, добавлен 10.06.2016

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.

    материалы конференции, добавлен 08.03.2014

  • An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.

    статья, добавлен 30.04.2018

  • Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

    статья, добавлен 17.12.2022

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.

    статья, добавлен 31.05.2021

  • Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.

    книга, добавлен 08.03.2014

  • Ознакомление с теоретическими аспектами управления предприятием и взаимоотношениями с клиентами. Анализ рынка внедрения системы "Quick resto". Рассмотрение суммарной прибыли компаний-разработчиков. Определение требований к информационной системе.

    курсовая работа, добавлен 28.02.2024

  • The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.

    статья, добавлен 15.09.2012

  • Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.

    презентация, добавлен 28.12.2013

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    статья, добавлен 01.11.2021

  • The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.

    книга, добавлен 08.03.2014

  • Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.

    лекция, добавлен 28.12.2013

  • The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.

    статья, добавлен 13.07.2022

  • Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.

    статья, добавлен 10.08.2018

  • Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.

    курс лекций, добавлен 08.03.2014

  • An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.

    статья, добавлен 15.09.2012

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга, добавлен 08.03.2014

  • Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.

    статья, добавлен 13.01.2017

  • Изучение языков программирования общего назначения. Рассмотрение видов трансляторов: компиляторов и интерпретаторов. Их основные функции. Алгоритмический язык Quick BASIC, его элементы. Структурные составляющие и основные команды языка Quick BASIC.

    презентация, добавлен 07.04.2014

  • Modeling attempts of unauthorized extraction of stegano content (halftone test images) for different variants of disintegration of the array of lengths of the series of reference blocks of the original images. Modeling using portrait and landscape.

    статья, добавлен 25.02.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.