Advances in Coding Theory and Crytography

Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.

Подобные документы

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    статья, добавлен 27.05.2021

  • The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.

    статья, добавлен 07.12.2016

  • Learning English for working with the computer and other information technology. Working with computer programs, discussion of problems and project planning. Use for intermediate level students and above. Using software: useful verbs, the control panel.

    учебное пособие, добавлен 28.05.2015

  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций, добавлен 08.03.2014

  • The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.

    статья, добавлен 28.09.2016

  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    реферат, добавлен 06.02.2014

  • Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.

    статья, добавлен 29.01.2016

  • Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.

    курс лекций, добавлен 08.03.2014

  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    учебное пособие, добавлен 08.03.2014

  • На основі the theory of plafales, показані основні кроки алгоритму конструювання базисних функцій в МСЕ на основі двовимірного симплексу — трикутника першого порядку. Конструювання базисних функцій в автоматичному режимі з компонентом штучного інтелекту.

    статья, добавлен 25.08.2016

  • New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.

    материалы конференции, добавлен 08.03.2014

  • Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    книга, добавлен 08.03.2014

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

  • The essence of the national system of electronic information resources as a set of national resources needed to solve the problems of socio-economic development and electronic information resources of the National registry using a single technology.

    статья, добавлен 20.01.2017

  • Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.

    книга, добавлен 19.03.2014

  • Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.

    курс лекций, добавлен 08.03.2014

  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    книга, добавлен 08.03.2014

  • Computational and Mathematical Preliminaries: computability, complexity, intractability. Efficient Number-Theoretic Algorithms and Intractable Problems. Public-Key Cryptography and Type Crytposystems. Integer Factorization and Discrete Logarithm Attacks.

    книга, добавлен 08.03.2014

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья, добавлен 09.01.2024

  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций, добавлен 20.10.2016

  • Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.

    книга, добавлен 08.03.2014

  • Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.

    книга, добавлен 08.03.2014

  • Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.

    книга, добавлен 08.03.2014

  • Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.

    презентация, добавлен 21.06.2015

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.