- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Lecture Cryptography and network security: Chapter 10
Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...
59 p actvn 26/03/2024 9 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Symmetric-Key Cryptography, Knapsack Cryptosystem, Trapdoor One-Way Function, Security of the Rabin System
Variant of OTP Cipher with symmetric key solution
The paper proposes a solution to construct symmetric–key cryptographic algorithms based on OTP cipher developed based on the cipher One – Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,...).
10 p actvn 25/12/2023 34 0
Từ khóa: Symmetric-Key Cryptography, Symmetric-Key Cryptographic Algorithm, Symmetric-Key Cryptosystems, One - Time Pad Algorithm, OTP Cipher, Mật mã khóa đối xứng, Hệ mật khóa đối xứng
Ebook A graduate course in applied cryptography: Part 1
Part 1 of ebook "A graduate course in applied cryptography" develops symmetric encryption which explains how two parties, Alice and Bob, can securely exchange information when they have a shared key unknown to the attacker. We discuss data confidentiality, data integrity, and the important concept of authenticated encryption.
411 p actvn 29/11/2023 42 0
Từ khóa: A graduate course in applied cryptography, Transport layer security, Secret key cryptography, Stream ciphers, Block ciphers, Chosen plaintext attack, Authenticated encryption
Ebook A graduate course in applied cryptography: Part 2
Continued part 1, part 2 of ebook "A graduate course in applied cryptography" develops the concepts of public-key encryption and digital signatures, which allow Alice and Bob to communicate securely, without having a pre-shared secret key. About cryptographic protocols, such as protocols for user identification, key exchange, zero knowledge, and secure computation.
489 p actvn 29/11/2023 42 0
Từ khóa: A graduate course in applied cryptography, Transport layer security, Public key cryptography, Public key encryption, Digital signatures, Fast hash-based signatures, Post-quantum cryptography
Handbook of elliptic and hyperelliptic curve cryptography: Part 1
Handbook of elliptic and hyperelliptic curve cryptography: Part 1 presents the following content: Chapter 1 introduction to public-key cryptography, chapter 2 algebraic background, chapter 3 background on p-adic numbers, chapter 4 background on curves and jacobians, chapter 5 varieties over special fields, chapter 6 background on pairings, chapter 7 background on weil descent, chapter 8 cohomological backgroundon point counting, chapter 9...
423 p actvn 23/05/2023 131 0
Từ khóa: Handbook of elliptic, Hyperelliptic curve cryptography, Algebraic background, Public-key cryptography, Cohomological backgroundon point counting, Finite field arithmetic
Ebook Codes - The Guide to Secrecy From Ancient to Modern Times
This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...
700 p actvn 27/02/2022 244 3
Từ khóa: Ebook The Guide to Secrecy, Guide to Secrecy, Ancient to Modern Times, Key Cryptography, Riddles of Ancient Egypt, Cryptography in the Renaissance
Ebook Understanding cryptography: A Textbook for Students and Practitioners
This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...
382 p actvn 27/02/2022 230 1
Từ khóa: Ebook Understanding cryptography, Message authentication code, Public-key infrastructure, Elliptic-curve cryptography, The data encryption standard, The advanced encryption standard
Bài giảng Mật mã học: Public-Key cryptography - Huỳnh Trọng Thưa
Bài giảng "Mật mã học: Public-Key cryptography" cung cấp cho người học các kiến thức: Principles of asymmetric cryptography, one-way function, key lengths and security levels, euclidean algorithm,...Mời các bạn cùng tham khảo.
49 p actvn 29/07/2020 317 1
Từ khóa: Bài giảng Mật mã học, Mật mã học, Euclidean algorithm, Public-Key cryptography, Security levels, Asymmetric cryptography
Certified Ethical Hacker - Module 18: Cryptography
Certified Ethical Hacker - Module 18 trình bày các chủ đề: Giới thiệu cryptography; tổng quan về mã hóa; các thuật toán băm; public key infrastructure; chữ ký số, mã hóa dữ liệu; trên ổ cứng truecrypt. Mời các bạn tham khảo.
18 p actvn 29/11/2018 663 5
Từ khóa: Kỹ thuật máy tính, An ninh bảo mật máy tính, Giới thiệu cryptography, Tổng quan về mã hóa, Các thuật toán băm, Public key infrastructure, Mã hóa dữ liệu, Trên ổ cứng truecrypt
Ebook Modern Cryptography - Theory and Practice: Phần 2
Part 1 of the book serial ebook Pc Underground to part 2 of you will continue to learn about relevant issues such as: authentication protocols — principles, authentication protocols — the real world, authentication framework for public-key cryptography, formal and strong security definitions for public-key cryptosystems,... Document serve you specialized information technology and related industries.
368 p actvn 28/02/2018 564 1
Từ khóa: Modern Cryptography, Authentication protocols, The real world, Public-key cryptography, Strong security definiti
Handbook of information and communication security: Part 1
The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is...
409 p actvn 31/07/2017 446 11
Từ khóa: Communication security, Information security, System security, Public-key cryptography, Elliptic curve cryptography, Chaos-based information security
Lecture Security+ Certification: Chapter 10 - Trung tâm Athena
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34 p actvn 24/02/2017 413 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Public key infrastructure, Symmetric cryptography
Đăng nhập
Bộ sưu tập nổi bật
10 19597
Bộ sưu tập Kỹ thuật viễn thông
11 16531
Bộ sưu tập Tài liệu học tiếng Anh
14 82981
12 23568