نتایج جستجو برای: cryptology
تعداد نتایج: 644 فیلتر نتایج به سال:
This work addresses the topic of Mathematics Education in Computing Curricula through the stimulating subject of Cryptology. It deals with the simple and complex mathematical concepts involved in several aspects of cryptology, including basic information relating to several algorithmic ciphers and applications. Different mathematical objects such as functions, matrices, modular arithmetic, coun...
Citation Bellare, Mihi, Shai Halevi, Amit Sahai, and Salil Vadhan. 1998. Many-to-one trapdoor functions and their relation to public-key cryptosystems. In Advances in Cryptology--Proceedings of CRYPTO '98, 18th Annual International Conference, Santa Barbara, California,August 23-27, 1998, ed. Hugo Krawczyk, Berlin: Springer.H. Krawczyk, editor, 283-299. Advances in Cryptology CRYPTO `98, Lectur...
Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) ECRYPT ⇪⇪⌃ The work described in this report has in part been supported by the Commission of the European ...
In this article we are going to compare useful cryptology algorithm in different area and explain them though application of algorithms have very large but doing some comparison one can do decision usage introduced right place. first mention important point of, digital signature distribution key then these tow algorithms.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید