نتایج جستجو برای: cryptology

تعداد نتایج: 644  

Journal: :The Computer Science Journal of Moldova 2003
Ennio Cortellini

The problem of a computationally feasible method of finding the discrete logarithm in a (large) finite field is discussed, presenting the main algorithms in this direction. Some cryptographic schemes based on the discrete logarithm are presented. Finally, the theory of linear recurring sequences is outlined, in relation to its applications in cryptology.

1998
Bart Preneel

This paper provides an overview of the state of the art in the design of cryptographic algorithms. It reviews the different type of algorithms for encryption and authentication and explains the principles of stream ciphers, block ciphers, hash functions, public-key encryption algorithms, and digital signature schemes. Subsequently the design and evaluation procedures for cryptographic algorithm...

Journal: :J. Mathematical Cryptology 2009
Jaime Gutierrez

1991

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this advances in cryptology crypto 99 19th annual international cryptology conference santa barbara california u s a august 15 19 1999 proceedings, it will really give you the good idea to be successful. It is not only for you to be success in certain life you...

Journal: :IACR Cryptology ePrint Archive 2010
Yasufumi Hashimoto

It is well known that if the higher half bits of a prime factor are known or the secret key is small enough then the RSA cryptosystem is broken (e.g. [Coppersmith, J. Cryptology, 1997] and [Boneh-Durfee, Eurocrypt’99]). Recently, Sarkar-MaitraSarkar [Cryptology ePrint Archiv, 2008/315] proposed attacks against RSA under the conditions that the higher bits of a prime factor is known and the secr...

2013
Tabu S. Kondo Leonard J. Mselle

This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only...

Journal: :CoRR 2018
Berry Schoenmakers

The resourcefulness of people working in the area of cryptology is striking. A wonderfully diverse set of professionals capable of generating an almost endless stream of new, intriguing research problems and, fortunately—driven by the ever faster changing playing field of our information society and infrastructure under attack—capable of finding many ingenious and compelling solutions as well. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید