Message Recovery for Signature Schemes Based on the Discrete logarithm problem
The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.
Подобные документы
Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.
книга, добавлен 08.03.2014Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
статья, добавлен 26.08.2020The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.
магистерская работа, добавлен 27.08.2016The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
статья, добавлен 01.02.2019One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
книга, добавлен 08.03.2014Использование редактора формул Microsoft Equation, с помощью которого можно было вводить формулы любой сложности в документы. Создание сложных математических формул, используя символы и шаблоны панели инструментов. Параметры диалогового окна Матрица.
контрольная работа, добавлен 27.10.2019Характеристика редактора формул Mc Equation, описание порядка его запуска, характеристика панелей инструментов, стилей оформления символов, используемых при создании формул и матриц. Создание математического выражения при помощи редактора формул.
лабораторная работа, добавлен 22.05.2014Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
реферат, добавлен 31.10.2012The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test
статья, добавлен 07.11.2018Type theory introduced by Russell and Whitehead to overcome a paradox found in Frege’s work. The design of lambda-calculus in functional programming languages. The isomorphism between concepts of logic and concepts in type theory and programming.
статья, добавлен 22.02.2021The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
статья, добавлен 27.03.2016The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.
статья, добавлен 29.07.2016A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
статья, добавлен 29.01.2016The problem of constructing a system of operational dispatch management for agricultural enterprises. The choice of the functionality of the control plane, allowing to minimize the losses due to delays and poor implementation of the Executive plan.
статья, добавлен 25.12.2016The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.
книга, добавлен 09.04.2013The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
статья, добавлен 09.09.2021Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.
книга, добавлен 25.11.2013A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021