A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology

The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC) s. 200 - 204
Hlavní autoři: Epishkina, Anna, Kogos, Konstantin, Nikiforova, Natalia
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.07.2016
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
AbstractList The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
Author Epishkina, Anna
Kogos, Konstantin
Nikiforova, Natalia
Author_xml – sequence: 1
  givenname: Anna
  surname: Epishkina
  fullname: Epishkina, Anna
  email: avepishkina@mephi.ru
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
– sequence: 2
  givenname: Konstantin
  surname: Kogos
  fullname: Kogos, Konstantin
  email: kgkogos@mephi.ru
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
– sequence: 3
  givenname: Natalia
  surname: Nikiforova
  fullname: Nikiforova, Natalia
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
BookMark eNpNj71ugzAUhV2pHZq0T9AOfgFSGwPGIyL9iUTUDqk6RtfmGqwCjgwZePtSNUOlI53l-450VuR68AMS8sjZhnOmnra7j-3-q9zEjGcbmcZK5OqKrHiSSaGEVPKWuIIafw4jUm_pHqYWe5icgY5WvnGGwlDTQ4s-zL9A0TU-uKntRwpLaP9f0GC-m-DPi7Ggva8xDNSE-TT5zjfzHbmx0I14f-k1-Xx5PpRvUfX-uiuLKnI8FlNUi5hppjGtERRYzdBowCyJJWOYWF3nDOpcpcgym0Bi8kTFaG2eSi0zjlKsycPfrkPE4ym4HsJ8vLwXP_CMVwU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DIPDMWC.2016.7529389
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1467393797
9781467393782
1467393789
9781467393799
EndPage 204
ExternalDocumentID 7529389
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:32 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73
PageCount 5
ParticipantIDs ieee_primary_7529389
PublicationCentury 2000
PublicationDate 20160701
PublicationDateYYYYMMDD 2016-07-01
PublicationDate_xml – month: 07
  year: 2016
  text: 20160701
  day: 01
PublicationDecade 2010
PublicationTitle 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)
PublicationTitleAbbrev DIPDMWC
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.5965486
Snippet The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear...
SourceID ieee
SourceType Publisher
StartPage 200
SubjectTerms Algorithm design and analysis
Boolean functions
Ciphers
Computer security
cryptology
curriculum
Information security
mathematical logic
Shift registers
theory of algorithms
Title A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology
URI https://ieeexplore.ieee.org/document/7529389
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6AePCkBoyKmh48ulD21e2RgEQTIRx8cCN9TJUIu4SHCf_e6e4GNfFisofNZiZNOoev33a--Qi5scJ3Y72EFzj9VohnZGfkHntINmyEGGt0rq16eeSjUTKZiHGF3O61MACQN59By73md_km01v3q6zNIwSnRFRJlXNeaLVKNVyHiXb_YdwfvvZcu1bcKkN_eabkkDE4-t9ix6Txrb2j4z2qnJAKpHUy61KduXYLmlk63E9alXPqvJI1lamhhcreBXTnbxly_vfFmkp86OJngpL6w0k5MANDF7kVGtWr3TI3st01yPPg7ql375UmCd4MQWfjmcBniimIDEghrWKglQRkFZwxCK0yCZMmERGw2IYy1EkofLA2ibjicQd4cEpqaZbCGaFILgKrhB9jVZFWchkKJVTADPd9hUB2Tupum6bLYg7GtNyhi78_N8mhq0TR2npJapvVFq7Igf7czNar67x4X7-GnfM
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0gmuhJDRi_3YNHC0u77XaPBCQQgXBA5Ub2U4lACR8m_Ht32wY18WLSQ9PMZJOdw9vXnTcP4N4w3431Yl7g9FvEnpGdkXvkWbJhQouxSqbaqpcu7ffj0YgNCvCw08JordPmM11xr-ldvkrkxv0qq9LQglPM9mA_JMSvZWqtXA9Xw6za7AyavdeGa9iKKnnwL9eUFDRax_9b7gTK3-o7NNjhyikU9LwEkzqSiWu4QIlBvd2sVT5Fzi1ZIj5XKNPZu4D69C2xrP99tkLcPmj2M0Fw-eHEHDbDhs5SMzQkl9tFamW7LcNz63HYaHu5TYI3sbCz9lTgY4GFDpXmjBuBtRRcW15BMdbECBVjrmIWahwZwomMCfO1MXFIBY1qmgZnUJwnc30OyNKLwAjmR7aullhSTphgIsCK-r6wUHYBJbdN40U2CWOc79Dl35_v4LA97HXH3U7_6QqOXFWyRtdrKK6XG30DB_JzPVktb9NCfgEgfKE6
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+Third+International+Conference+on+Digital+Information+Processing%2C+Data+Mining%2C+and+Wireless+Communications+%28DIPDMWC%29&rft.atitle=A+course+of+Mathematical+Logic+and+Theory+of+Algorithms+as+a+mathematical+background+of+modern+cryptology&rft.au=Epishkina%2C+Anna&rft.au=Kogos%2C+Konstantin&rft.au=Nikiforova%2C+Natalia&rft.date=2016-07-01&rft.pub=IEEE&rft.spage=200&rft.epage=204&rft_id=info:doi/10.1109%2FDIPDMWC.2016.7529389&rft.externalDocID=7529389