Post-Quantum Cryptography
Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
Подобные документы
The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
??????, добавлен 15.09.2012Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.
??????? ???????, добавлен 08.03.2014???????? ???????? ???????????? ????? Visual Basic. ???????????? ????????? ??????? VB. ????????????? ??????? ?????????? OLE. ????? ?????????? Visual Basic 6.0. ?????????????? ???????????? ????????? ??????????. ???????????? ????? ???????? ? ??????????.
???????, добавлен 17.11.2013- 104. ??????? Visual Basic
???????? ??????? ????????-???????????????? ??????????? ????????????????. ????????, ????? ??? ???? ???????? ? Visual Basic. ????? Visual Basic 6.0. ???????? ?????? ??????? ? ??? ?????????. ????? ?????????? ??????????. ???????, ????????????, ??????????.
???????, добавлен 25.10.2013 ???? XML ??? ?????? ?????? ??????????? ????? ???????????? ? Internet. ??????? XML Path Language ??? ?????? ????????? ?????????? XML. ?????????? ??????????? ?????????? ??? ?????? ? ????. ?????????? ???????? XPath ?? ????? ???????????????? Visual Basic.
??????, добавлен 28.11.2020??????? ????????? ? ??????? ???????? ??????????. Visual Basic - ????? ?????????? ?????????? ?????????? ????????. ???????? ? ???????????? ?????? ? ??????? ?????? ? Visual Basic. ???????????????? ?? ??????? ??????? ???. ???????? Web-??????? ? ???? ??????.
?????, добавлен 06.05.2011???????? ???????? ????????? ? ??????????? ????? Visual Basic. ?????????????? ??????? ? ???????? ??????? ?????, ????????? ? ????? ?????????. ?????? ??????? ??? ????????????? ??????????? ????????????? ?????? ?? ???????????????? ?? ????? Visual Basic.
??????? ???????, добавлен 15.04.2016Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
?????, добавлен 08.03.2014???? ???????????????? Visual Basic, ??? ?????????????? ? ? ??????????? ?????? ? ????? Windows. ??????????? ????????? ????????? ? ????? Visual Basic ??? ?????????? ?????????????? ????????? ? ???????? ?????????. ??????????? ???????? ??????????????.
??????????? ??????, добавлен 10.01.2016- 110. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
??????? ???????, добавлен 08.03.2014 ???????? ? ?????????????? ???????????? ????? Visual Basic, ??? ???????????? ? ??????????. ??????? ???????????????? ??? ?????????? ???????? Visual Basic for Applications, ????????? ? ??????? ??????? ????? ????????????????. ?????????? ???????? ? MS Excel.
???????? ??????, добавлен 02.12.2011???????? ????? ?????? ? ??????????, ??????, ??????? ??????????, ??????????????. Visual Basic ??? ????????-??????????????? ??????? ????????????????, ??????? ??????????? ??????????????? ??? ?????????? ??????? ??????????? ?????????? ? ??????????????.
?????????, добавлен 05.07.2010Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
??????, добавлен 29.09.2016- 114. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
??????, добавлен 06.05.2018 The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
??????, добавлен 15.04.2024The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
?????, добавлен 08.03.2014- 117. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
??????, добавлен 24.10.2018 ???????? ?????????? ????-????? ????????? ????????? ? ????? ???????????????? Basic, ??????????? ?? ?????? ????? ??????????????? ???????? ?????????. ??????? ?????????? ??????? ?????? ??? ???????????? ???????? ? ??????????? ???????? y ??? ???????? ?.
???????????? ??????, добавлен 12.11.2009Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
??????, добавлен 27.10.2020???????? ??????? ???????? ? ?????????????? ????? ???????????????? Visual Basic, ???????? ??????????? ??????????. ???????????? ?????????? ?????????? ???????? ?????????? ??????. ???????? ????????????? ?????? ? ????????, ?????????? ????? ???? ? ?????????.
???????????? ??????, добавлен 21.04.2014?????????????? ????? ???????????????? Visual Basic for Applications ? ??????????? ?????????????? ???????????? Excel. ???????? ??????????? ???? ?????????? ??????????? ????????????, ???????? ????????? ?????????? ? ??????????? ?????????? ?????????.
??????, добавлен 11.10.2016Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
?????, добавлен 08.03.2014???????? ??????? Visual Basic. ???????? ????????. ??????????????? ????? ?????????? IDE. ?????? ????????????????: ?????? ? ???????, ???????????? ??????????, ?????????, ???????????. ???????? ???? ?????????? ? Visual Basic. ?????????? ??????????? ?????????.
???????? ??????, добавлен 23.09.2011- 124. Internet security
The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
??????????? ??????, добавлен 07.08.2017 ???????????? ????????? ???????? ? Visual Basic for Applications. ??????????? ???????, ???????? ? ????????????? ?????????? ??????? ? ?????????. ??????????? ??????? ???????????? ??????????. ??????? ?????? ??????????? ? ?????????????? ?????????? ? Excel.
???????????? ??????, добавлен 24.05.2015