Secure key establishment

Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

Подобные документы

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.

    статья, добавлен 12.05.2024

  • The modern computer technologies. Drawing of clock-pulse generator that from pulse sequence for all programming system. Engineering graphics OrCAD Capture. Projecting and design of principal schemes in electronics, microelectronics and electrotechniques.

    книга, добавлен 11.10.2014

  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция, добавлен 15.04.2014

  • Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.

    книга, добавлен 08.03.2014

  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга, добавлен 08.03.2014

  • Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.

    дипломная работа, добавлен 08.03.2014

  • The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.

    эссе, добавлен 13.09.2011

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    статья, добавлен 20.01.2016

  • TCP/IP (Transmission Control Protocol/Internet Protocol) - средство для обмена информацией между компьютерами, объединенными в сеть. Программное обеспечение для TCP/IP и архитектура. Краткое описание протоколов семейства с расшифровкой аббревиатур.

    статья, добавлен 23.11.2009

  • Современные утилиты шифрования данных. Принцип "прозрачного" шифрования. Защита всех данных, содержащихся на жестком диске, при помощи программы Secure Disk. Шифрование "на лету" утилитой TrueCrypt. Принцип скрытых контейнеров и опции их подключения.

    реферат, добавлен 10.06.2011

  • Описание общей структурной схемы программной утилиты "Session Initiaiton Protocol" как протокол передачи данных прикладного уровня. Разработка программного обеспечения с открытым кодом SIP софтфона и сервера – приложений для совершения Интернет-звонков.

    дипломная работа, добавлен 11.09.2020

  • Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.

    статья, добавлен 26.01.2021

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • The method and algorithm for realization of arithmetic operations in the system of remainder classes. The principal advantage of the suggested method. The algorithms for realization of arithmetic operations of summation, deduction and multiplication.

    статья, добавлен 14.07.2016

  • Modeling an optoelectronic fire smoke alarm detector at the functional diagram level by means of Matlab tools. Characteristics of developed detector model and evaluating the ability of the logic unit to distinguishing between fire signals and noise.

    статья, добавлен 26.06.2016

  • Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.

    статья, добавлен 04.09.2024

  • The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.

    статья, добавлен 22.07.2014

  • The results of program modeling of biological "molecular current generator" are described. Simulation was done on the base of experimental studying of electrical currents through molecular channel-receptor complex in membrane of natural brain neurons.

    статья, добавлен 14.09.2016

  • Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.

    книга, добавлен 08.03.2014

  • Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.

    курс лекций, добавлен 08.03.2014

  • Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.

    статья, добавлен 30.08.2016

  • There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.

    статья, добавлен 17.02.2021

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    статья, добавлен 30.04.2018

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    статья, добавлен 30.01.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.