Practice and Theory in Public Key Cryptography
Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.
Подобные документы
The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
статья, добавлен 15.09.2012Способы защиты от несанкционированного доступа к информационным ресурсам компьютеров. Специфика применения системы "Secret Net 5.0-C". Реализация дискреционной и мандатной модели разграничения прав. Включение механизма гарантированного уничтожения данных.
презентация, добавлен 21.04.2014Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
статья, добавлен 17.12.2022The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.
статья, добавлен 12.12.2024Computational and Mathematical Preliminaries: computability, complexity, intractability. Efficient Number-Theoretic Algorithms and Intractable Problems. Public-Key Cryptography and Type Crytposystems. Integer Factorization and Discrete Logarithm Attacks.
книга, добавлен 08.03.2014Программное обеспечение процесса создания на жестком диске компьютера виртуального зашифрованного диска. Возможности утилиты BestCrypt Volume Encryption в шифровании информации. Криптографические технологии, реализованные в BestCrypt Volume Encryption.
статья, добавлен 02.02.2019Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015- 108. Quantum information
Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014 The place of neural network modeling of language units as an innovative tool for modern research. The value of linguistic units, the genesis of which can be traced thanks to the interaction of an artificial neural network with an array of text data.
статья, добавлен 04.09.2024Secret stories, codes, and cryptogram puzzles. Historical background to the conspiracy stories. Caesar/shift ciphers. Hints to help crack the cryptograms and puzzles. Answers to all cryptograms, their assignment and application in modern practice.
учебное пособие, добавлен 08.03.2014Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
статья, добавлен 15.09.2012Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.
презентация, добавлен 13.06.2015Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019The model of the turbulent boundary layer over a rough surface is presented. The roughness density effect on the shift of the mean velocity logarithmic profile has been estimated in the case of 2D and 3D roughness elements. Surface layer transformation.
статья, добавлен 27.04.2017"Baby" Small-Scale Experimental Machine (Малая экспериментальная машина), созданная в Манчестерском университете, как первая работающая машина с архитектурой Неймана. Создание первого универсального программируемого компьютера в континентальной Европе.
реферат, добавлен 21.01.2015Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
статья, добавлен 27.01.2019A network protocol as a specification for the format and relative timing of the messages exchanged. Formalizing why and how vulnerabilities occur in protocols. Previous models. Automated tools. Terminology relationships. A network time protocol exploit.
статья, добавлен 15.09.2012Здійснення ефективного відстеження та аналізу проектів за допомогою програмного продукту Office Project Standard-2007. Створення завдання для розбивки витрат праці за проектом. Функціональні можливості службової програми порівняння версій проекту.
реферат, добавлен 13.07.2017The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
практическая работа, добавлен 29.11.2014- 124. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 - 125. Models of the system
Standard Formalisms - software engineering notations used to specify the required behaviour of specific interactive systems. Types of system model: dialogue, full state definition, abstract interaction. Computers are inherently mathematical machines.
презентация, добавлен 28.12.2013