Public-key cryptosystem based on isogenies
A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
Подобные документы
Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.
учебное пособие, добавлен 25.11.2013Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
книга, добавлен 08.03.2014Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
книга, добавлен 08.03.2014The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014Acquaintance with methods of data processing and transmission in computer mathematics. Consideration of the features of teaching computer skills in computer mathematics. General characteristics of the stages of development of a conceptual database schema.
статья, добавлен 29.05.2021Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.
статья, добавлен 23.02.2016The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.
книга, добавлен 08.03.2014The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
статья, добавлен 27.03.2016Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
книга, добавлен 13.03.2014Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.
материалы конференции, добавлен 08.03.2014Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
книга, добавлен 08.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014Features of the mechanism that will help to identify lines with Romanian chromatic words on the basis of computer technology. Steps develop a dictionary of poetic meanings of colors. Development of the dictionary linguists and computer scientists.
статья, добавлен 23.02.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.
книга, добавлен 15.09.2012Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
учебное пособие, добавлен 08.03.2014Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
статья, добавлен 15.09.2020Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
статья, добавлен 23.02.2016Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.
статья, добавлен 14.01.2017The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
статья, добавлен 15.09.2012The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.
статья, добавлен 23.02.2016