Elliptic curves and their applications to cryptography an introduction

Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.

Подобные документы

  • The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.

    учебное пособие, добавлен 15.09.2012

  • A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.

    статья, добавлен 28.02.2016

  • Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.

    книга, добавлен 08.03.2014

  • The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.

    книга, добавлен 08.03.2014

  • A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.

    статья, добавлен 26.06.2016

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.

    статья, добавлен 01.02.2019

  • Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.

    статья, добавлен 08.06.2024

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга, добавлен 08.03.2014

  • Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.

    реферат, добавлен 31.10.2012

  • Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    книга, добавлен 08.03.2014

  • Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.

    статья, добавлен 25.10.2016

  • The characteristics and features of the topic model in the form of stochastic matrices, their purpose and application. Creation and distinctive features of the new algorithm to build a Sub-hierarchy Galois, the specificity of the visualization tools.

    курсовая работа, добавлен 21.06.2016

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    книга, добавлен 15.09.2012

  • Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.

    статья, добавлен 10.08.2018

  • Ознакомление с основными сведениями о представлении бизнес-процессов как шаблонов WorkFlow в системе PDM STEP Suite. Разработка блок-схемы бизнес-процесса. Проектирование шаблона процесса в модуле "Редактор шаблонов процессов" системы PDM STEP Suite.

    лабораторная работа, добавлен 24.11.2013

  • The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.

    статья, добавлен 15.09.2012

  • Description of the developed energy saving algorithm for autonomous heating systems installed in heated premises. Determination of the moment of switching on for the transition to the specified nominal temperature after maintaining the set temperature.

    статья, добавлен 03.12.2018

  • The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.

    статья, добавлен 18.09.2018

  • Development of tools aimed at maximising the efficiency of the competition of Kaggle. Approbation of a new modified knn algorithm, which allows to obtain more accurate results for classification problems, to participants Of kaggle competitions.

    дипломная работа, добавлен 01.12.2019

  • Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.

    дипломная работа, добавлен 01.12.2019

  • This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.

    статья, добавлен 26.10.2020

  • The detail parallelization a popular global search method, the PSO algorithm using MPJ Express. The parallel PSO algorithm’s robustness and efficiency are demonstrated by using four standard benchmark functions Alpine, Rosenbrock, Rastrigin and Schaffer.

    статья, добавлен 23.02.2015

  • New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.

    материалы конференции, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.