Post-Quantum Cryptography

Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.

Подобные документы

  • The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.

    ??????, добавлен 15.09.2012

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    ??????? ???????, добавлен 08.03.2014

  • ???????? ???????? ???????????? ????? Visual Basic. ???????????? ????????? ??????? VB. ????????????? ??????? ?????????? OLE. ????? ?????????? Visual Basic 6.0. ?????????????? ???????????? ????????? ??????????. ???????????? ????? ???????? ? ??????????.

    ???????, добавлен 17.11.2013

  • ???????? ??????? ????????-???????????????? ??????????? ????????????????. ????????, ????? ??? ???? ???????? ? Visual Basic. ????? Visual Basic 6.0. ???????? ?????? ??????? ? ??? ?????????. ????? ?????????? ??????????. ???????, ????????????, ??????????.

    ???????, добавлен 25.10.2013

  • ???? XML ??? ?????? ?????? ??????????? ????? ???????????? ? Internet. ??????? XML Path Language ??? ?????? ????????? ?????????? XML. ?????????? ??????????? ?????????? ??? ?????? ? ????. ?????????? ???????? XPath ?? ????? ???????????????? Visual Basic.

    ??????, добавлен 28.11.2020

  • ??????? ????????? ? ??????? ???????? ??????????. Visual Basic - ????? ?????????? ?????????? ?????????? ????????. ???????? ? ???????????? ?????? ? ??????? ?????? ? Visual Basic. ???????????????? ?? ??????? ??????? ???. ???????? Web-??????? ? ???? ??????.

    ?????, добавлен 06.05.2011

  • ???????? ???????? ????????? ? ??????????? ????? Visual Basic. ?????????????? ??????? ? ???????? ??????? ?????, ????????? ? ????? ?????????. ?????? ??????? ??? ????????????? ??????????? ????????????? ?????? ?? ???????????????? ?? ????? Visual Basic.

    ??????? ???????, добавлен 15.04.2016

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    ?????, добавлен 08.03.2014

  • ???? ???????????????? Visual Basic, ??? ?????????????? ? ? ??????????? ?????? ? ????? Windows. ??????????? ????????? ????????? ? ????? Visual Basic ??? ?????????? ?????????????? ????????? ? ???????? ?????????. ??????????? ???????? ??????????????.

    ??????????? ??????, добавлен 10.01.2016

  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    ??????? ???????, добавлен 08.03.2014

  • ???????? ? ?????????????? ???????????? ????? Visual Basic, ??? ???????????? ? ??????????. ??????? ???????????????? ??? ?????????? ???????? Visual Basic for Applications, ????????? ? ??????? ??????? ????? ????????????????. ?????????? ???????? ? MS Excel.

    ???????? ??????, добавлен 02.12.2011

  • ???????? ????? ?????? ? ??????????, ??????, ??????? ??????????, ??????????????. Visual Basic ??? ????????-??????????????? ??????? ????????????????, ??????? ??????????? ??????????????? ??? ?????????? ??????? ??????????? ?????????? ? ??????????????.

    ?????????, добавлен 05.07.2010

  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    ??????, добавлен 29.09.2016

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    ??????, добавлен 06.05.2018

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    ??????, добавлен 15.04.2024

  • The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    ?????, добавлен 08.03.2014

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    ??????, добавлен 24.10.2018

  • ???????? ?????????? ????-????? ????????? ????????? ? ????? ???????????????? Basic, ??????????? ?? ?????? ????? ??????????????? ???????? ?????????. ??????? ?????????? ??????? ?????? ??? ???????????? ???????? ? ??????????? ???????? y ??? ???????? ?.

    ???????????? ??????, добавлен 12.11.2009

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    ??????, добавлен 27.10.2020

  • ???????? ??????? ???????? ? ?????????????? ????? ???????????????? Visual Basic, ???????? ??????????? ??????????. ???????????? ?????????? ?????????? ???????? ?????????? ??????. ???????? ????????????? ?????? ? ????????, ?????????? ????? ???? ? ?????????.

    ???????????? ??????, добавлен 21.04.2014

  • ?????????????? ????? ???????????????? Visual Basic for Applications ? ??????????? ?????????????? ???????????? Excel. ???????? ??????????? ???? ?????????? ??????????? ????????????, ???????? ????????? ?????????? ? ??????????? ?????????? ?????????.

    ??????, добавлен 11.10.2016

  • Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.

    ?????, добавлен 08.03.2014

  • ???????? ??????? Visual Basic. ???????? ????????. ??????????????? ????? ?????????? IDE. ?????? ????????????????: ?????? ? ???????, ???????????? ??????????, ?????????, ???????????. ???????? ???? ?????????? ? Visual Basic. ?????????? ??????????? ?????????.

    ???????? ??????, добавлен 23.09.2011

  • The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

    ??????????? ??????, добавлен 07.08.2017

  • ???????????? ????????? ???????? ? Visual Basic for Applications. ??????????? ???????, ???????? ? ????????????? ?????????? ??????? ? ?????????. ??????????? ??????? ???????????? ??????????. ??????? ?????? ??????????? ? ?????????????? ?????????? ? Excel.

    ???????????? ??????, добавлен 24.05.2015

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.