The Discrete Logarithm Problem on Elliptic Curves of Trace One

An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.

Подобные документы

  • Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.

    книга, добавлен 19.03.2014

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.

    магистерская работа, добавлен 27.08.2016

  • Разработка FBD-программы средствами Trace Mode 5, которая реализует функцию дешифратора. Инверсии и побитовое логическое умножение. Разработка проекта автоматизации, включающего в себя информационную структуру, математическую базу и графическую часть.

    контрольная работа, добавлен 23.11.2014

  • Инструментальные средства для создания операторского интерфейса и программирования РС-контроллеров. Редактор базы каналов, шаблонов. Монитор реального времени. Автоматическое горячее резервирование. Глобальный регистратор, серверы документирования.

    реферат, добавлен 25.06.2013

  • Функции локальных систем управления по автоматизации простейших функций. Распределенная АСУ ТП на базе SCADA-системы TRACE MODE. Исполнительные элементы электродвигательного однооборотного механизма. Аппаратные средства АСУ ТП, их назначение и функции.

    презентация, добавлен 27.08.2013

  • Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.

    дипломная работа, добавлен 08.03.2014

  • Перенос графической информации с бумажных носителей в компьютер и обработка картографических материалов - основное назначение программного приложения "Easy Trace". Максимально возможная чистка растра от лишних данных - залог успешной трассировки.

    контрольная работа, добавлен 05.06.2020

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    дипломная работа, добавлен 13.07.2020

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    статья, добавлен 29.11.2016

  • The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.

    статья, добавлен 15.06.2012

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    книга, добавлен 08.03.2014

  • The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.

    книга, добавлен 08.03.2014

  • Достоинства векторной графики. Основные задачи, решаемые с помощью программы Easy Trace. Контроль целостности векторной и атрибутивной информации в процессе векторизации. Оцифровки озелененных территорий города Улан-Удэ и прилегающих к нему территорий.

    отчет по практике, добавлен 27.04.2019

  • The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.

    презентация, добавлен 09.03.2016

  • Рассмотрение особенностей контроля и управления процессом нагрева в SCADA системе Trace Mode, который может служить прообразом систем управления микроклиматом в птичнике, теплице. Инструментальная система, ресурсы и возможности компоновки тренда.

    статья, добавлен 26.05.2017

  • A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.

    статья, добавлен 28.10.2020

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга, добавлен 08.03.2014

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    статья, добавлен 23.02.2016

  • A novel family of data-driven linear transformations, aimed at finding low dimensional embeddings of multivariate data, in a way that optimally preserves the structure of the data. The PCA and Fisher’s LDA are the special members in this transformation.

    статья, добавлен 08.02.2013

  • Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.

    книга, добавлен 08.03.2014

  • Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.

    статья, добавлен 30.08.2016

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.