A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology

The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC) S. 200 - 204
Hauptverfasser: Epishkina, Anna, Kogos, Konstantin, Nikiforova, Natalia
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 01.07.2016
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
AbstractList The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
Author Epishkina, Anna
Kogos, Konstantin
Nikiforova, Natalia
Author_xml – sequence: 1
  givenname: Anna
  surname: Epishkina
  fullname: Epishkina, Anna
  email: avepishkina@mephi.ru
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
– sequence: 2
  givenname: Konstantin
  surname: Kogos
  fullname: Kogos, Konstantin
  email: kgkogos@mephi.ru
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
– sequence: 3
  givenname: Natalia
  surname: Nikiforova
  fullname: Nikiforova, Natalia
  organization: Dept. of Cryptology & Cybersecurity, Nat. Res. Nucl. Univ. MEPhI (Moscow Eng. Phys. Inst.), Moscow, Russia
BookMark eNpNj71ugzAUhV2pHZq0T9AOfgFSGwPGIyL9iUTUDqk6RtfmGqwCjgwZePtSNUOlI53l-450VuR68AMS8sjZhnOmnra7j-3-q9zEjGcbmcZK5OqKrHiSSaGEVPKWuIIafw4jUm_pHqYWe5icgY5WvnGGwlDTQ4s-zL9A0TU-uKntRwpLaP9f0GC-m-DPi7Ggva8xDNSE-TT5zjfzHbmx0I14f-k1-Xx5PpRvUfX-uiuLKnI8FlNUi5hppjGtERRYzdBowCyJJWOYWF3nDOpcpcgym0Bi8kTFaG2eSi0zjlKsycPfrkPE4ym4HsJ8vLwXP_CMVwU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DIPDMWC.2016.7529389
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEL
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1467393797
9781467393782
1467393789
9781467393799
EndPage 204
ExternalDocumentID 7529389
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:32 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i123t-d320b0be5dea9afb0ecbae642700e4fbd80ad895e06f4a4c8492eff857b761e73
PageCount 5
ParticipantIDs ieee_primary_7529389
PublicationCentury 2000
PublicationDate 20160701
PublicationDateYYYYMMDD 2016-07-01
PublicationDate_xml – month: 07
  year: 2016
  text: 20160701
  day: 01
PublicationDecade 2010
PublicationTitle 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)
PublicationTitleAbbrev DIPDMWC
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.5964667
Snippet The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear...
SourceID ieee
SourceType Publisher
StartPage 200
SubjectTerms Algorithm design and analysis
Boolean functions
Ciphers
Computer security
cryptology
curriculum
Information security
mathematical logic
Shift registers
theory of algorithms
Title A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology
URI https://ieeexplore.ieee.org/document/7529389
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5t8eBJpRXf5ODRbdPdZJMcS6vooaUHxd5KHhMttrulD6H_3mR3qQpehBBCmBCYkHxMMl8-hG5jnYJMnPEbiSYRTYFFWlsd-UhAMKJ8HatCbIKPRmIykeMauttzYQCgSD6DdmgWb_k2N9twVdbhzIOTkHVU55yXXK2KDdclsjN4Gg-Gr_2QrpW2K9NfmikFZDwc_W-yY9T65t7h8R5VTlANsiaa9bDJQ7oFzh0e7n9aVXMctJINVpnFJcs-GPTmb7mP-d8Xa6x8wYufA7QyH4HK4Ud400UhhYbNarcshGx3LfTycP_cf4wqkYRo5kFnE9kkJppoYBaUVE4TMFqBjyo4IUCdtoIoKyQDkjqqqBFUxuCcYFzztAs8OUWNLM_gDGESoInF2jDwQRmXIlH-ADAEUq0spewcNYObpsvyH4xp5aGLv7sv0WFYiTK19Qo1NqstXKMD87mZrVc3xeJ9AT4Xnwg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61CnpSacW3OXh023Q32U2OpbVYbEsPFXsrecxqsd0tfQj99ya7S1XwIoQQwoTAhORjkvnyIXTvqxBEEGu7kWjg0RCYp5RRno0EOCPS1r7MxCaiwYCPx2JYQg87LgwAZMlnUHPN7C3fpHrjrsrqEbPgxMUe2meU-o2crVXw4RpE1NvdYbv_2nIJW2GtMP6lmpKBRuf4f9OdoOo3-w4Pd7hyikqQVNC0iXXqEi5wGuP-7q9VOcNOLVljmRic8-ydQXP2ltqo_32-wtIWPP85QEn94cgcdoQ1nWdiaFgvt4tMynZbRS-dx1HryStkEryphZ21ZwKfKKKAGZBCxoqAVhJsXBERAjRWhhNpuGBAwphKqjkVPsQxZ5GKwgZEwRkqJ2kC5wgTB07MV5qBDcsiwQNpjwBNIFTSUMouUMW5abLIf8KYFB66_Lv7Dh0-jfq9Sa87eL5CR25V8kTXa1ReLzdwgw7053q6Wt5mC_kFrmyiTw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+Third+International+Conference+on+Digital+Information+Processing%2C+Data+Mining%2C+and+Wireless+Communications+%28DIPDMWC%29&rft.atitle=A+course+of+Mathematical+Logic+and+Theory+of+Algorithms+as+a+mathematical+background+of+modern+cryptology&rft.au=Epishkina%2C+Anna&rft.au=Kogos%2C+Konstantin&rft.au=Nikiforova%2C+Natalia&rft.date=2016-07-01&rft.pub=IEEE&rft.spage=200&rft.epage=204&rft_id=info:doi/10.1109%2FDIPDMWC.2016.7529389&rft.externalDocID=7529389