Malicious Cryptography and Exposing Cryptovirology
Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
Подобные документы
Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.
материалы конференции, добавлен 08.03.2014The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
книга, добавлен 08.03.2014Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
статья, добавлен 22.12.2016Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
статья, добавлен 09.04.2022The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.
дипломная работа, добавлен 13.09.2017Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.
книга, добавлен 08.03.2014Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Генерирование псевдослучайных чисел. Линейный конгруэнтный метод, алгоритм Фибоначчи с запаздываниями и метод Блюма. Генерирование псевдослучайных чисел классом Random в С++. Метод середины квадрата. Постановка задачи, разработка и кодирование алгоритма.
курсовая работа, добавлен 14.05.2015Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.
дипломная работа, добавлен 27.08.2016Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.
статья, добавлен 18.02.2015Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
статья, добавлен 21.01.2022The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
статья, добавлен 24.08.2022This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.
курс лекций, добавлен 08.03.2014Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014Характеристика программного обеспечения производителя Sony (Sony Sound Forge, Sony Vegas), основных возможностей и интерфейса данных программ. Преимущества Sony Sound Forge и Vegas. Устройство главного окна программы, рабочей области, панели инструментов.
реферат, добавлен 21.01.2014Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
статья, добавлен 08.06.2024Loop statements, functions. The example of a program that reads numbers from Memo until number zero is found. A two-dimensional array as a collection of components, all of the same type, structured in two dimensions (rows and columns), examples.
курс лекций, добавлен 11.10.2014Иерархия протоколов TCP/IP, адресация и имена объектов в сети Internet, структура подсетей. Атаки TSP/IP и защита от них. Предсказание TCP sequence number. Десинхронизация нулевыми данными, детектирование и защита, понятие пассивного сканирования.
курсовая работа, добавлен 26.11.2009