Implementation theoretical information protocol for public distribution cryptology keys

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Keys and Private Keys

This work is about developing tools for secure communications using quantum protocols. The work focuses on ways to transfer classical information using quantum communication channels, and exploiting the properties of quantum information theory to achieve secrecy. Quantum cryptography and classical cryptography essentially deal with the same tasks, such as, just to mention a few, private communi...

متن کامل

Determining Strengths For Public Keys Used For Exchanging Symmetric Keys

Implementors of systems that use public key cryptography to exchange symmetric keys need to make the public keys resistant to some predetermined level of attack. That level of attack resistance is the strength of the system, and the symmetric keys that are exchanged must be at least as strong as the system strength requirements. The three quantities, system strength, symmetric key strength, and...

متن کامل

Public Signature Veriication Keys Signature Checking Keys

assumptions about trusted synchronization paths and synchronization bounds between principals. This establishes requirements for evaluating the adequacy of the underlying clock synchronization algorithm. Also, it provides a metric for comparing protocol designs. For example, by modifying synchronization assumptions to reeect synchronization failures the designer can assess the extent of vulnera...

متن کامل

Public Transport Ontology for Passenger Information Retrieval

Passenger information aims at improving the user-friendliness of public transport systems while influencing passenger route choices to satisfy transit user’s travel requirements. The integration of transit information from multiple agencies is a major challenge in implementation of multi-modal passenger information systems. The problem of information sharing is further compounded by the multi-l...

متن کامل

Computational Methods in Public Key Cryptology

These notes informally review the most common methods from computational number theory that have applications in public key cryptology.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Serbian Journal of Electrical Engineering

سال: 2016

ISSN: 1451-4869,2217-7183

DOI: 10.2298/sjee1601021t