Cryptographic boolean functions and applications

Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.

Подобные документы

  • The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.

    статья, добавлен 11.07.2022

  • The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.

    статья, добавлен 15.09.2012

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие, добавлен 08.03.2014

  • The basic tendencies of development of mobile marketing in Ukraine are considered. The development of Internet marketing. The advantages of hybrid mobile applications, the essence of their use, as one of the modern means of communication for business.

    статья, добавлен 10.10.2018

  • Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.

    статья, добавлен 22.12.2016

  • Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.

    статья, добавлен 19.08.2020

  • Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.

    статья, добавлен 22.03.2023

  • Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.

    статья, добавлен 23.02.2016

  • In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.

    статья, добавлен 18.08.2018

  • Information about Microsoft Word, the application and purpose of the program. The features and functions of Microsoft Word. Characteristics of the main tools for creating lists, copying and moving sections of text. Text formatting, parameter control.

    доклад, добавлен 09.03.2018

  • Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.

    лекция, добавлен 28.12.2013

  • Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.

    статья, добавлен 08.01.2024

  • The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.

    статья, добавлен 15.09.2012

  • Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.

    реферат, добавлен 24.03.2015

  • The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.

    статья, добавлен 13.02.2016

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    книга, добавлен 08.03.2014

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    статья, добавлен 27.05.2021

  • Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.

    статья, добавлен 01.02.2024

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • Властивості режиму гамування зі зворотним зв’язком за шифргамою (Output Feedback). Властивості гами, оцінка ймовірності появи гами певного періоду за умови відповідності властивостей блокового симетричного шифру певним властивостям випадкової підстановки.

    статья, добавлен 01.03.2017

  • The replacement of the distribution of probable landmark locations, obtained from each local detector, with simpler parametric forms. Extensions to handle partial occlusions and reduce computational complexity. Algorithm regularized landmark mean-shift.

    статья, добавлен 24.12.2016

  • With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.

    статья, добавлен 19.09.2024

  • Разработка метода шифрования информации с использованием регистра сдвига с линейной обратной связью (Linear Feedback Shift Register – LFSR) и динамических ключей. Использование нескольких регистров одновременно. Применяемый криптографический ключ.

    статья, добавлен 11.07.2022

  • Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.

    статья, добавлен 16.08.2023

  • Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.