Digital Signatures (Advances in Information Security)
Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
Подобные документы
- 101. Amorphic encryption
Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.
статья, добавлен 18.02.2021 The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.
учебное пособие, добавлен 08.03.2014Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
учебное пособие, добавлен 25.11.2013Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
статья, добавлен 15.09.2012Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016The outlook of the digital divide factors influencing consumer adoption of smart city solutions. The digital divide in the United States of America: Americans without access to high-speed Internet service. Consumer adoption of smart city solutions.
статья, добавлен 28.06.2021The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
статья, добавлен 22.12.2016The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.
статья, добавлен 20.07.2024Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.
статья, добавлен 05.03.2023The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Defining the content of the national context for the study of digital marketing management issues. Bibliometric analysis of scientometric databases. Quantitative analysis, relevance of scientific resources, relevance of authors, relevance of affiliation.
статья, добавлен 12.05.2024- 113. Funds of the library
Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
курсовая работа, добавлен 25.06.2017 Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Philosophy of Agile-management 3.0 as a factor in the development of technological progress in the context of a digital society. The concept of Agile management 3.0, its role in the preparation of a coach. The evolution of platforms in the service sector.
статья, добавлен 08.04.2022- 116. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014 Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
статья, добавлен 22.12.2016Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.
статья, добавлен 27.06.2016Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
материалы конференции, добавлен 08.03.2014The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
статья, добавлен 29.01.2016Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
статья, добавлен 19.03.2024Функциональные требования концепции персонификации в компаниях. Перспективы формирования инструментов digital-аналитики для определения возможностей развития системы. Проектирование технологической архитектуры системы. Описание интерфейса программы.
дипломная работа, добавлен 09.08.2018