Advanced Encryption Standard – AES

Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.

Подобные документы

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    книга, добавлен 08.03.2014

  • The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.

    статья, добавлен 27.03.2016

  • The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.

    статья, добавлен 23.06.2016

  • New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.

    материалы конференции, добавлен 08.03.2014

  • Экскурс в историю электронной криптографии. Процесс превращения открытого текста в зашифрованный. Шифрование с секретным ключом. Стандарт Data Encryption Stantart. Способность шифра противостоять всевозможным атакам. Применения криптографических методов.

    курсовая работа, добавлен 12.06.2011

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие, добавлен 08.03.2014

  • A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.

    книга, добавлен 08.03.2014

  • The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.

    монография, добавлен 08.03.2014

  • Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.

    дипломная работа, добавлен 30.08.2016

  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    книга, добавлен 08.03.2014

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.

    книга, добавлен 08.03.2014

  • Find the ratio of root-mean-square deviations of pixel distortions and rotations in the learning process to avoid classification errors. Simulation, training and testing of a two-layer perceptron with 250 neurons in its hidden layer for training traingda.

    статья, добавлен 27.09.2016

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    дипломная работа, добавлен 01.04.2010

  • A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.

    книга, добавлен 08.03.2014

  • Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.

    статья, добавлен 16.02.2016

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

  • Standard Formalisms - software engineering notations used to specify the required behaviour of specific interactive systems. Types of system model: dialogue, full state definition, abstract interaction. Computers are inherently mathematical machines.

    презентация, добавлен 28.12.2013

  • Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.

    статья, добавлен 09.08.2022

  • Микросхемы динамической памяти. Разъем шины Industry Standard Architecture. Микроканальная архитектура. PCI local bus как основная шина расширения современных компьютеров. AGP как стандарт подключения графических адаптеров. Спецификация плат PCI-Express.

    презентация, добавлен 25.06.2013

  • The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.

    статья, добавлен 15.09.2012

  • Изучение Microsoft Project как фактического стандарта среди средств автоматизации индивидуальной работы менеджеров проектов. Описание Microsoft Office Standard - серверного продукта и настольного приложения для планирования и управления проектами.

    краткое изложение, добавлен 13.04.2015

  • Основные характеристики Delphi. Компилятор, встроенный в Delphi. Объектно-ориентированная модель программных компонент. Визуальные инструменты для скоростной разработки приложений. Создание панели быстрого доступа к командам. Компоненты вкладки Standard.

    реферат, добавлен 27.02.2012

  • Теоретические основы и возможности использования CRM–систем. Характеристика CRM-систем "1С: Фитнес клуб КОРП" и "Index.CRM Standard". Анализ внешней и внутренней среды организации. Организационная структура, организация управления на примере ООО "Волна".

    отчет по практике, добавлен 03.06.2015

  • Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.

    курс лекций, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.