Cryptanalysis of RSA and Its Variants
Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
Подобные документы
Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
дипломная работа, добавлен 08.03.2014Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
практическая работа, добавлен 29.11.2014On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.
учебное пособие, добавлен 26.08.2016Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
книга, добавлен 08.03.2014The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.
монография, добавлен 08.03.2014The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
контрольная работа, добавлен 07.08.2017Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.
учебное пособие, добавлен 08.03.2014Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
практическая работа, добавлен 13.02.2016The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
статья, добавлен 15.09.2012Characterization major methods of construction principal manifolds. Familiarity with the issues numerical computation. Analysis nonlinear manifold learning from unorganized data points is a challenging unsupervised learning and data visualization.
автореферат, добавлен 08.02.2013Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
книга, добавлен 08.03.2014Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.
статья, добавлен 08.06.2024Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.
книга, добавлен 08.03.2014Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
дипломная работа, добавлен 23.09.2018Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.
статья, добавлен 20.01.2017Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
материалы конференции, добавлен 08.03.2014The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
книга, добавлен 13.03.2014Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018