A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology
The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information...
Uloženo v:
| Vydáno v: | 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC) s. 200 - 204 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.07.2016
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background. |
|---|---|
| AbstractList | The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background. |
| Author | Epishkina, Anna Kogos, Konstantin Nikiforova, Natalia |
| Author_xml | – sequence: 1 givenname: Anna surname: Epishkina fullname: Epishkina, Anna email: avepishkina@mephi.ru organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia – sequence: 2 givenname: Konstantin surname: Kogos fullname: Kogos, Konstantin email: kgkogos@mephi.ru organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia – sequence: 3 givenname: Natalia surname: Nikiforova fullname: Nikiforova, Natalia organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia |
| BookMark | eNpNj71ugzAUhV2pHZq0T9AOfgFSGwPGIyL9iUTUDqk6RtfmGqwCjgwZePtSNUOlI53l-450VuR68AMS8sjZhnOmnra7j-3-q9zEjGcbmcZK5OqKrHiSSaGEVPKWuIIafw4jUm_pHqYWe5icgY5WvnGGwlDTQ4s-zL9A0TU-uKntRwpLaP9f0GC-m-DPi7Ggva8xDNSE-TT5zjfzHbmx0I14f-k1-Xx5PpRvUfX-uiuLKnI8FlNUi5hppjGtERRYzdBowCyJJWOYWF3nDOpcpcgym0Bi8kTFaG2eSi0zjlKsycPfrkPE4ym4HsJ8vLwXP_CMVwU |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/DIPDMWC.2016.7529389 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1467393797 9781467393782 1467393789 9781467393799 |
| EndPage | 204 |
| ExternalDocumentID | 7529389 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:37:32 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_7529389 |
| PublicationCentury | 2000 |
| PublicationDate | 20160701 |
| PublicationDateYYYYMMDD | 2016-07-01 |
| PublicationDate_xml | – month: 07 year: 2016 text: 20160701 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC) |
| PublicationTitleAbbrev | DIPDMWC |
| PublicationYear | 2016 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.5965486 |
| Snippet | The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 200 |
| SubjectTerms | Algorithm design and analysis Boolean functions Ciphers Computer security cryptology curriculum Information security mathematical logic Shift registers theory of algorithms |
| Title | A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology |
| URI | https://ieeexplore.ieee.org/document/7529389 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6AePCkBoyKmh48ulD21e2RgEQTIRx8cCN9TJUIu4SHCf_e6e4GNfFisofNZiZNOoev33a--Qi5scJ3Y72EFzj9VohnZGfkHntINmyEGGt0rq16eeSjUTKZiHGF3O61MACQN59By73md_km01v3q6zNIwSnRFRJlXNeaLVKNVyHiXb_YdwfvvZcu1bcKkN_eabkkDE4-t9ix6Txrb2j4z2qnJAKpHUy61KduXYLmlk63E9alXPqvJI1lamhhcreBXTnbxly_vfFmkp86OJngpL6w0k5MANDF7kVGtWr3TI3st01yPPg7ql375UmCd4MQWfjmcBniimIDEghrWKglQRkFZwxCK0yCZMmERGw2IYy1EkofLA2ibjicQd4cEpqaZbCGaFILgKrhB9jVZFWchkKJVTADPd9hUB2Tupum6bLYg7GtNyhi78_N8mhq0TR2npJapvVFq7Igf7czNar67x4X7-GnfM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0gmuhJDRi_3YNHC0u77XaPBCQQgXBA5Ub2U4lACR8m_Ht32wY18WLSQ9PMZJOdw9vXnTcP4N4w3431Yl7g9FvEnpGdkXvkWbJhQouxSqbaqpcu7ffj0YgNCvCw08JordPmM11xr-ldvkrkxv0qq9LQglPM9mA_JMSvZWqtXA9Xw6za7AyavdeGa9iKKnnwL9eUFDRax_9b7gTK3-o7NNjhyikU9LwEkzqSiWu4QIlBvd2sVT5Fzi1ZIj5XKNPZu4D69C2xrP99tkLcPmj2M0Fw-eHEHDbDhs5SMzQkl9tFamW7LcNz63HYaHu5TYI3sbCz9lTgY4GFDpXmjBuBtRRcW15BMdbECBVjrmIWahwZwomMCfO1MXFIBY1qmgZnUJwnc30OyNKLwAjmR7aullhSTphgIsCK-r6wUHYBJbdN40U2CWOc79Dl35_v4LA97HXH3U7_6QqOXFWyRtdrKK6XG30DB_JzPVktb9NCfgEgfKE6 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+Third+International+Conference+on+Digital+Information+Processing%2C+Data+Mining%2C+and+Wireless+Communications+%28DIPDMWC%29&rft.atitle=A+course+of+Mathematical+Logic+and+Theory+of+Algorithms+as+a+mathematical+background+of+modern+cryptology&rft.au=Epishkina%2C+Anna&rft.au=Kogos%2C+Konstantin&rft.au=Nikiforova%2C+Natalia&rft.date=2016-07-01&rft.pub=IEEE&rft.spage=200&rft.epage=204&rft_id=info:doi/10.1109%2FDIPDMWC.2016.7529389&rft.externalDocID=7529389 |