搜索筛选:
搜索耗时0.1043秒,为你在为你在102,285,761篇论文里面共找到 17 篇相符的论文内容
类      型:
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
Three new worldwide calendars are proposed and compared in this paper. None of them requires any departure from an existing tradition to divide years on lean an...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
In this paper we consider a parallel algorithm that detects the maximizer of unimodal function f(x) computable at every point on unbounded interval (0, ∞). The...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2012
Several algorithms based on homogeneous polynomials for multiplication of large integers are described in the paper. The homogeneity of polynomials provides sev...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
In this paper is demonstrated a method for reduction of integer factorization problem to an analysis of a sequence of modular elliptic equations. As a result, t...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2010
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and vali...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2010
Topological design of service networks is studied in the paper. Quantitative model and algorithm minimizing cost of processing and delivery is described. Algori...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2010
A Nim-type computer game of strategy on plane is described in this paper. It is demonstrated that winning strategies of this two-person game are determined by a...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integer...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
This paper considers three algorithms for the extraction of square roots of complex integers {called Gaussians} using arithmetic based on complex modulus p + iq...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2010
This paper provides a framework that reduces the computational complexity of the discrete logarithm problem. The paper describes how to decompose the initial DL...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this f...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2010
A hybrid cryptographic system providing digital authentication is described and analyzed in this paper. The proposed cryptosystem incorporates three features: c...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
In certain computational systems the amount of space required to execute an algorithm is even more restrictive than the corresponding time necessary for solutio...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2012
This paper provides several generalizations of Gauss theorem that counts points on special elliptic curves. It is demonstrated how to implement these generaliza...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
A cryptosystem based on computation of square roots of complex integers modulo composite n is described in this paper. This paper provides an algorithm extracti...
[期刊论文] 作者:Boris S. Verkhovsky, 来源:通讯、网络与系统学国际期刊(英文) 年份:2011
This paper is a logical continuation of my recently-published paper. Security of modern communication based on RSA cryptographic protocols and their analogues i...
[期刊论文] 作者:Boris S. Verkhovsky,Roberto D., 来源:通讯、网络与系统学国际期刊(英文) 年份:2012
Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries...
相关搜索: