Advances in cryptology
Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
Подобные документы
The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.
??????, добавлен 15.09.2012Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
?????, добавлен 08.03.2014- 103. ???????? ???????????? ???????? ??????????. ?????? ??????? ?????? ??????? ?? Cloud Security Alliance
?????? ????????? ????? ???????????? ????? ???????? ??????????. ????? ?? ???????? ?????? ? ??????? ?? ?? ??????????. ????????? ??????? ?? ?????? ?? ????? ???????????? ??????? ?? ???????? Cloud Security Alliance ? ?????? ?? ???????????? ?????????????.
??????, добавлен 01.11.2018 ???????? ?????????????? ??????? ?????? ?????? ???? ? ???????????? ??????? ?????? ???????. ???????? ?????? ?????? ? ??????? ?????????? ??????? Digital Security Office ??? ????????? ????? ???????????? ? ?????? ?????????? ??????? ?? ?? ??????????.
??????, добавлен 23.03.2018Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
?????, добавлен 08.03.2014Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
????????? ??????, добавлен 08.03.2014The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
??????, добавлен 03.02.2021An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
?????, добавлен 08.03.2014Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.
??????, добавлен 09.12.2024The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
??????, добавлен 15.06.2012Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.
????????? ???????????, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.
??????, добавлен 14.01.2017Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.
???????????, добавлен 08.03.2014Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
?????, добавлен 08.03.2014Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
???????????, добавлен 24.01.2017Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
??????, добавлен 20.03.2024Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.
?????, добавлен 08.03.2014Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
???? ??????, добавлен 08.03.2014A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
??????, добавлен 09.04.2022Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
??????, добавлен 20.03.2024Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
???????????, добавлен 21.06.2015Features of the mechanism that will help to identify lines with Romanian chromatic words on the basis of computer technology. Steps develop a dictionary of poetic meanings of colors. Development of the dictionary linguists and computer scientists.
??????, добавлен 23.02.2016- 125. Antivirus software
Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.
??????, добавлен 04.12.2011