MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the re...
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Published: |
Kherson State University,
2010-07-01T00:00:00Z.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
Connect to this object online.3rd Floor Main Library
Call Number: |
A1234.567 |
---|---|
Copy 1 | Available |