The Discrete Logarithm Problem on Elliptic Curves of Trace One
An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
Подобные документы
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
книга, добавлен 19.03.2014Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.
магистерская работа, добавлен 27.08.2016Разработка FBD-программы средствами Trace Mode 5, которая реализует функцию дешифратора. Инверсии и побитовое логическое умножение. Разработка проекта автоматизации, включающего в себя информационную структуру, математическую базу и графическую часть.
контрольная работа, добавлен 23.11.2014Инструментальные средства для создания операторского интерфейса и программирования РС-контроллеров. Редактор базы каналов, шаблонов. Монитор реального времени. Автоматическое горячее резервирование. Глобальный регистратор, серверы документирования.
реферат, добавлен 25.06.2013Функции локальных систем управления по автоматизации простейших функций. Распределенная АСУ ТП на базе SCADA-системы TRACE MODE. Исполнительные элементы электродвигательного однооборотного механизма. Аппаратные средства АСУ ТП, их назначение и функции.
презентация, добавлен 27.08.2013Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
дипломная работа, добавлен 08.03.2014Перенос графической информации с бумажных носителей в компьютер и обработка картографических материалов - основное назначение программного приложения "Easy Trace". Максимально возможная чистка растра от лишних данных - залог успешной трассировки.
контрольная работа, добавлен 05.06.2020The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
дипломная работа, добавлен 13.07.2020Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
статья, добавлен 15.06.2012A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
книга, добавлен 08.03.2014Достоинства векторной графики. Основные задачи, решаемые с помощью программы Easy Trace. Контроль целостности векторной и атрибутивной информации в процессе векторизации. Оцифровки озелененных территорий города Улан-Удэ и прилегающих к нему территорий.
отчет по практике, добавлен 27.04.2019The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.
презентация, добавлен 09.03.2016Рассмотрение особенностей контроля и управления процессом нагрева в SCADA системе Trace Mode, который может служить прообразом систем управления микроклиматом в птичнике, теплице. Инструментальная система, ресурсы и возможности компоновки тренда.
статья, добавлен 26.05.2017A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
статья, добавлен 28.10.2020Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.
книга, добавлен 08.03.2014The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.
статья, добавлен 23.02.2016A novel family of data-driven linear transformations, aimed at finding low dimensional embeddings of multivariate data, in a way that optimally preserves the structure of the data. The PCA and Fisher’s LDA are the special members in this transformation.
статья, добавлен 08.02.2013Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.
книга, добавлен 08.03.2014Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
статья, добавлен 30.08.2016Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
книга, добавлен 08.03.2014Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014