Xem 1-20 trên 236 kết quả Cryptography
  • Mật mã ( Cryptography) Mật mã (cryptography) là một trong những mặt phức tạp nhất của quá trình phát triển phần mềm mà bất kỳ nhà phát triển nào cũng sẽ sử dụng.

    pdf9p dauhutuongot 22-07-2010 136 46   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security.

    pdf531p cuong4012 22-02-2013 102 36   Download

  • Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with

    pdf254p trung254 01-04-2012 91 30   Download

  • Bạn cần tạo một khóa đối xứng từ một password để người dùng chỉ cần nhớ password và không cần lưu trữ khóa. Sử dụng lớp System.Security.Cryptography.PasswordDeriveBytes để tạo khóa đối xứng từ chuỗi password.

    pdf9p dauhutuongot 22-07-2010 91 29   Download

  • As a companion book of Vaudenay's A Classical Introduction to Cryptography, this exercise book contains a carefully revised version of most of the material used in teaching by the authors or given as examinations to the undergraduate students of the Cryptography and Security lecture at EPFL from 2000 to mid-2005. It covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems....

    pdf262p crius75 02-01-2013 52 13   Download

  • During the last three decades, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary people, computer cryptography was the exclusive domain of the world’s militaries since the World War II. Today, state-of the-art computer cryptography is practiced outside the secured walls of the military agencies. The laypersons can now employ security practices that can protect against the most powerful adversaries.

    pdf256p qsczaxewd 25-09-2012 45 12   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

    pdf3551p muathu_102 28-01-2013 55 11   Download

  • As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. Many attempts have been made to solve this problem within the cryptographic community. In this book, we present one of these data security methods known as visual cryptography (VC).

    pdf144p tuanloc_do 03-12-2012 39 5   Download

  • Chương 7 - Cryptography basics and methods (Mật mã và các phương pháp). Nội dung chính trình bày trong chương này gồm có: Tổng quan về mật mã, các thuật giải mã hóa, các hệ thống mã hóa, kiến trúc hạ tầng khóa công cộng, đối phó với các tấn công mã hóa.

    ppt40p nhanmotchut_1 04-10-2016 83 5   Download

  • (BQ) Part 1 book "Introduction to modern cryptography" has contents: Introduction and classical cryptography, perfectly secret encryption; message authentication codes and collision resistant hash functions, practical constructions of pseudorandom permutations,...and other contents.

    pdf259p bautroibinhyen20 06-03-2017 28 5   Download

  • Let us introduce the issues involved in cryptography. First, we need to define some terms; then we give some taxonomies.

    ppt54p trada85 22-01-2013 52 4   Download

  • Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries

    pdf0p doilan 25-01-2013 32 4   Download

  • (BQ) Part 1 book "Cryptography engineering" has contents: The context of cryptography, introduction to cryptography, block ciphers, block cipher modes, hash functions, message authentication codes, the secure channel, implementation issues, implementation issues.

    pdf191p bautroibinhyen20 06-03-2017 18 4   Download

  • (BQ) Part 2 book "Cryptography engineering" has contents: Primes, Diffie-Hellman, introduction to cryptographic protocols, key negotiation, implementation issue, the clock, key servers, the dream of PKi, storing secrets, storing secrets,... and other contents.

    pdf191p bautroibinhyen20 06-03-2017 13 4   Download

  • Tài liệu "Cryptography: Module 18" trình bày các chủ đề: Giới thiệu cryptography; tổng quan về mã hóa; các thuật toán băm; public key infrastructure; chữ ký số, mã hóa dữ liệu; trên ổ cứng truecrypt. Mời các bạn tham khảo.

    pdf18p tranhanh9196 12-10-2018 10 4   Download

  • (BQ) Appropriate for undergraduate and graduate level courses in Cryptography and Computer security. Best-selling author and two-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field.

    pdf562p levuphongqn 18-08-2015 40 3   Download

  • Cryptography & Key Exchange Protocols includes about Cryptography-related concepts, Key channel establishment for symmetric cryptosystems, Perfect encryption, Dolev-Yao threat model, Protocol “message authentication”Protocol “message authentication”, Protocol “challenge-response“, Public-key cryptosystems.

    pdf44p cocacola_17 11-12-2015 39 3   Download

  • (BQ) Part 2 book "Introduction to modern cryptography" has contents: Number theory and cryptographic hardness assumptions, factoring and computing discrete logarithms, private key management and the public key revolution, digital signature schemes,....and other contents.

    pdf294p bautroibinhyen20 06-03-2017 20 3   Download

  • This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

    pdf8p tuanlocmuido 13-12-2012 22 2   Download

  • To use data encryption algorithms in network communications, all parities must first agree on using the same secret keys Rely on couriers Set up a meeting to determine a secret key Use postal service, email service, phone service … However, these conventional methods are inflexible for network communication applications Public-key cryptography (PKC) Invented in the 1970’s Without the need of sharing prior secrets to distribute secret keys securely Can also be used for authentication

    ppt39p muathu_102 28-01-2013 46 2   Download



nocache searchPhinxDoc
Đồng bộ tài khoản