Securing JavaScript applications with Web Cryptography API
With an increasing number of web applications, the need of ordinary users to have more secure web applications has increased and web developers are attempting to match those expectations. This article is devoted to consideration of the basic concepts of the Web Cryptography API since it defines cryptographic primitives to be deployed across browsers and JavaScript web applications. The purpose of the article is the theoretical justification for the application of Web Crypto API within native...
Ill Posed Problems and Information Security
Well posed (by Hadamard) problem has properties of existence, uniqueness and stability of its solution. Ill posed problems do not have at least one of the above properties, often this is the stability property of the solution with respect to initial conditions. The solution of such problems is sensitive even to a small change in the values of the input data, and so we do not guarantee an acceptable approximation to the answer at the level of the existing error in the measurement of initial values...
About pairing on abelian varieties p-rank one and their cryptographic applications
Described and analyzed in terms of computational efficiency different types of pairings on hyperelliptic curves, especially on curves of genus 2 and p-rank one for the cryptographic applications.
1. Алешников С. И., Алешникова М. В., Горбачёв А. А. Протокол доверенного шифрования на основе модифицированного алгоритма вычисления спаривания Вейля на алгебраических...
‘A power of shuffled letters’: anagrams in the European culture of the Middle Ages and the Renaissance
... la fin de la Renaissance: Le De Alchemiae difficultatibus de Theobald de Hoghelande // Bulletin
de l’Association d’étude sur l’humanisme, la réforme et la renaissance. 1994. Vol. 38, № 38. Р. 45—71.
17. Janssens L. La tradition d’une cryptographie satirique médiévale (d’Ovide à Clément IV, Napoléon Ier, Hitler // Revue belge de philologie et d’histoire. 1992. T. 70, № 4. Р. 960—996.
18. Kendall C. B. The allegory of the church. Romanesque portals and their verse inscriptions....
A major principle of Indo-European poetry or arbitrary etymologising? A review of modern international publications on anagrams in the cultures of Ancient East and Antiquity
... verba dat omnis amor // The Classical Quarterly. 2013. Vol. 63, № 1. Р. 447—449.
9. Jamison S. M. An anagram in the Gāthās // Journal of the American Oriental Society. 2002. Vol. 122, № 2. P. 287—289.
10. Janssens L. La tradition d’une cryptographie satirique médiévale (D’Ovide à Clément IV, Napoléon Ier, Hitler) // Revue belge de philologie et d’histoire. 1992. Vol. 70, № 4. P. 960—996.
11. Lestayo J. R. S. Les mots sous les choses: Starobinski, Borges, Saussure //Modern ...