Topical issues of cryptography
Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
Подобные документы
Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
?????, добавлен 08.03.2014The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
?????, добавлен 08.03.2014The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.
??????? ???????, добавлен 08.03.2014- 30. Brute force
Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.
?????, добавлен 08.03.2014 A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
??????, добавлен 15.09.2012Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.
?????, добавлен 08.03.2014Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
?????, добавлен 08.03.2014Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
?????, добавлен 08.03.2014Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
????????? ???????????, добавлен 08.03.2014A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
?????, добавлен 08.03.2014- 39. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
?????, добавлен 08.03.2014 The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
??????, добавлен 23.10.2020Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
??????, добавлен 15.03.2014The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
?????, добавлен 08.03.2014The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.
??????, добавлен 15.09.2012??????????? ??????????? ???????? ???????? ?? ??????? ????? ?????????? ???????????? ?????????????? ?????. ??????????? ??????? BestCrypt Volume Encryption ? ?????????? ??????????. ????????????????? ??????????, ????????????? ? BestCrypt Volume Encryption.
??????, добавлен 02.02.2019Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
??????? ???????, добавлен 08.03.2014A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.
?????, добавлен 08.03.2014Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
?????, добавлен 08.03.2014Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
???????????? ??????, добавлен 29.11.2014Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
?????, добавлен 08.03.2014