Advances in cryptology
Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
Подобные документы
Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.
статья, добавлен 18.02.2021The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.
статья, добавлен 28.05.2023A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
книга, добавлен 13.03.2014Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.
курс лекций, добавлен 08.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
курс лекций, добавлен 08.03.2014Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014The determination of the level of security provided by the finalists is largely guesswork, as in the case of any unbroken cryptosystem. Software implementation languages. General security. Software speeds for encryption, decryption, and key setup.
книга, добавлен 08.03.2014One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.
учебное пособие, добавлен 08.03.2014История создания средств усиленной аутентификации, их функциональные особенности. Разработка средств аутентификации с целью предотвращения несанкционированного вмешательства посторонних лиц. Положительные и отрицательные стороны USB-токена JaCarta U2F.
статья, добавлен 10.03.2019Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Сравнительный анализ ONVIF и PSIA. Анализ существующих технических решений. Средства и методы разработки, постановка задачи. Процесс разработки библиотеки: реализация SOAP, ONVIF сервисов, WS-Security, WS-Discovery. Разработка высокоуровневых функций.
дипломная работа, добавлен 07.09.2018Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
статья, добавлен 15.09.2012Описание технологии и результатов применения системно-когнитивного анализа для выявления знаний о последствиях ошибок в конфигурировании системы безопасности по отчету Microsoft Baseline Security Analyzer (MBSA). Анализ методов использования этих знаний.
статья, добавлен 27.04.2017The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
книга, добавлен 08.03.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014- 100. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020