intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Elliptic curve cryptosystems

Xem 1-3 trên 3 kết quả Elliptic curve cryptosystems
  • Privacy-preserving frequency mining is a quite simple technique, but it is very useful in privacy-preserving machine learning and data mining. In this paper, we construct an elliptic curve analog of the ElGamal system-based protocol for privacy-preserving frequency mining in fully distributed setting.

    pdf8p tamynhan9 02-12-2020 16 2   Download

  • Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.

    pdf12p levuphongqn 18-08-2015 96 4   Download

  • Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms

    pdf4p levuphongqn 18-08-2015 74 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2