Finite automata and application to cryptography

Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.

Подобные документы

  • The characteristics and features of the topic model in the form of stochastic matrices, their purpose and application. Creation and distinctive features of the new algorithm to build a Sub-hierarchy Galois, the specificity of the visualization tools.

    ???????? ??????, добавлен 21.06.2016

  • The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).

    ???????? ??????, добавлен 30.08.2016

  • The purpose of this article is to review adaptive random testing is an improved version of random testing, that adapts the test case generation process based on the feedback from the previous test cases. Adaptive random testing aims to increase the fault.

    ??????, добавлен 13.12.2024

  • The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.

    ??????, добавлен 26.06.2018

  • ???????? ?????????????? ??????? ? ??????? ????????????? ?????????? "Oracle Application". ?????? ??? ?????????? ?????????, ????????????? ????????, ????????????. ??????? ????????????? ????????? ???????????, ?????????? ??????, ?????????? ? ????????????.

    ??????????? ??????, добавлен 25.05.2012

  • The software which automates the process of air-traffic situations generation. The set includes: airspace sector editor, dynamic situation generator. Reducing the generation time and increasing the quantities of practical tasks due to automation.

    ??????, добавлен 27.06.2016

  • Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.

    ??????, добавлен 08.06.2024

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    ????????? ??????, добавлен 01.04.2010

  • Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.

    ??????, добавлен 28.02.2016

  • The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.

    ???????????, добавлен 24.11.2016

  • Description of the development of a gaming mobile application that integrates augmented reality. Augmented reality and gamification "Formation of a holistic personality" as educational strategies in learning in the period of innovative technologies.

    ??????, добавлен 11.07.2023

  • The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

    ??????, добавлен 18.09.2020

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    ????????? ??????, добавлен 13.07.2020

  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    ???? ??????, добавлен 08.03.2014

  • The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.

    ??????, добавлен 23.06.2016

  • ?????? ?????????? ????????? "?????? windows form" ? ?????????????? ????? ???????????????? ?++. ?????? ????????????? ?????, ????????? ???????? ?????????? ? ????????? ??????? ????? ?????????, ????????? ????, ???????????? ? ????????? ?????? ???????.

    ???????? ??????, добавлен 09.06.2015

  • A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.

    ??????, добавлен 15.09.2012

  • The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.

    ??????, добавлен 11.07.2022

  • ???????? ?????????? ????????? VBA. ???????????? ???????? ?????????????? ? ????????? ?????????? ? ??????? ????????. ???????? ???????? Visual Basic for Application ?? ??????? ???????? ?????????. ???????? ????????? ?? ?????? ??????????? ?????????? ????.

    ???????????? ??????, добавлен 02.10.2014

  • The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.

    ???????????, добавлен 09.03.2016

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    ???????????, добавлен 10.06.2016

  • Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.

    ???? ??????, добавлен 08.03.2014

  • ?????? Application ??? ????????? ????? ?????????? ? ???????????? ???????? Windows. ????????? ?????? ?????????, ????????? ? ???????. ?????? Clipboard ??? ??????? ??????????????? ?????? ??????? Windows, ??????? ????????????? ???????? ??? ?????? ? ???????.

    ???????, добавлен 28.10.2011

  • ?????????????? ??????????? ???? ??????, ???????? ??????? ????????? Application. ????????? ?????????? ? ????? ??????, ?????????? ??????????? DataSource. ??????????? ??????? ? ???????? ???? ??????. ????? ?????????? ????? ? ????????, ??????????? ??????????.

    ???????? ??????, добавлен 21.01.2020

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    ????????? ??????, добавлен 02.09.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.