User contributions
This user is currently blocked. The latest block log entry is provided below for reference:
- 17:33, 21 December 2013 Admin (Talk | contribs) changed block settings for 13-01-AgibalovaAV (Talk | contribs) with an expiry time of indefinite (account creation disabled, autoblock disabled)
(Latest | Earliest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 13:33, 18 December 2013 (diff | hist) . . (+68) . . Talk:Symmetric encryption schemes
- 13:30, 18 December 2013 (diff | hist) . . (-1) . . Multiple encryption (top)
- 13:29, 18 December 2013 (diff | hist) . . (+935) . . N Multiple encryption (Created page with "Multiple encryption is one of symmetric encryption schemas. The method is applicable to any symmetric block codes, but reduces speed encryption, or increases the requirements ...")
- 13:17, 18 December 2013 (diff | hist) . . (+29) . . Talk:Symmetric encryption schemes
- 13:16, 18 December 2013 (diff | hist) . . (+1) . . Talk:Symmetric encryption schemes
- 13:16, 18 December 2013 (diff | hist) . . (+101) . . Talk:Symmetric encryption schemes
- 13:14, 18 December 2013 (diff | hist) . . (+47) . . Symmetric encryption schemes (→Security challenge) (top)
- 13:09, 18 December 2013 (diff | hist) . . (+9) . . Talk:Symmetric encryption schemes
- 13:09, 18 December 2013 (diff | hist) . . (-140) . . Talk:Cryptographic firmness (Blanked the page) (top)
- 13:08, 18 December 2013 (diff | hist) . . (+215) . . Talk:Symmetric encryption schemes
- 13:07, 18 December 2013 (diff | hist) . . (+4) . . Symmetric encryption schemes (→Cryptographic primitives and/or protocols)
- 13:06, 18 December 2013 (diff | hist) . . (+140) . . N Talk:Cryptographic firmness (Created page with "18.12 Добавлено определение криптостойкости на английском языке - Агибалова А.")
- 13:06, 18 December 2013 (diff | hist) . . (+366) . . N Cryptographic firmness (Created page with "Cryptographic firmness is the ability of a cryptographic algorithm to resist cryptanalysis. The algorithm is considered to be stable, if in order to make a successful attack t...")
- 13:02, 18 December 2013 (diff | hist) . . (+29) . . Symmetric encryption schemes (→Glossary)
- 22:53, 12 December 2013 (diff | hist) . . (+141) . . Список литературы к разделу (top)
- 23:54, 10 December 2013 (diff | hist) . . (+18) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Algorithms for Byzantine Failures)
- 23:43, 10 December 2013 (diff | hist) . . (+691) . . N Экспоненциальный сбор информации (Created page with "'''Экспоненциальный сбор информации (ЭСИ)''' - это стратегия, в которой алгоритмы, процессы переда...") (top)
- 23:40, 10 December 2013 (diff | hist) . . (+69) . . «Задача о византийских генералах». Протокол «византийского соглашения». Обеспечение безопасности распределенных вычислений (→Глоссарий)
- 23:39, 10 December 2013 (diff | hist) . . (+6) . . Exponential information gathering (top)
- 23:39, 10 December 2013 (diff | hist) . . (+338) . . N Exponential information gathering (Created page with "Exponential information gathering is strategy, in which algorithms, processes send and relay initial values for several rounds, recording the values they receive along various...")
- 23:37, 10 December 2013 (diff | hist) . . (+40) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Glossary)
- 19:30, 6 December 2013 (diff | hist) . . (+22) . . Byzantine Agreement with Authentication (top)
- 19:29, 6 December 2013 (diff | hist) . . (+169) . . N Digital signature (Created page with "A '''digital signature''' for process i is a transformation that i can apply to any of its outgoing messages in order to prove that the message really did originate at i")
- 19:28, 6 December 2013 (diff | hist) . . (+24) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Glossary)
- 19:26, 6 December 2013 (diff | hist) . . (+56) . . Byzantine Agreement with Authentication
- 19:24, 6 December 2013 (diff | hist) . . (+26) . . The distributed computing (top)
- 19:22, 6 December 2013 (diff | hist) . . (+12) . . Byzantine agreement protocol (top)
- 19:21, 6 December 2013 (diff | hist) . . (+34) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Byzantine generals problem)
- 19:20, 6 December 2013 (diff | hist) . . (+34) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Byzantine generals’ problem in the mutual knowledge verification system)
- 23:09, 5 December 2013 (diff | hist) . . (-10) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing
- 23:08, 5 December 2013 (diff | hist) . . (+4) . . Glossary (top)
- 23:08, 5 December 2013 (diff | hist) . . (+6) . . Byzantine generals’ problem (top)
- 23:08, 5 December 2013 (diff | hist) . . (+6) . . Qutrits (top)
- 23:07, 5 December 2013 (diff | hist) . . (+6) . . Distributed computing (top)
- 23:07, 5 December 2013 (diff | hist) . . (0) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Glossary)
- 23:06, 5 December 2013 (diff | hist) . . (+290) . . N Glossary (Created page with "'''Byzantine Agreement with Authentication''' is byzantine fault model in which processes have the extra power to authenticate their communications, based on the use of digita...")
- 23:04, 5 December 2013 (diff | hist) . . (+253) . . N Distributed computing (Created page with "Distributed computing is a way of complex computational problems solving with using multiple computers, often united into a parallel computing system. Byzantine generals p...")
- 23:04, 5 December 2013 (diff | hist) . . (+141) . . N Qutrits (Created page with "Qutrits are trinity information units. Back")
- 23:02, 5 December 2013 (diff | hist) . . (+379) . . N Byzantine generals’ problem (Created page with "In cryptology Byzantine generals’ problem is the problem of interaction of several remote sites which received orders from one center. A part of sites, including the center,...")
- 23:02, 5 December 2013 (diff | hist) . . (+9) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Glossary)
- 23:01, 5 December 2013 (diff | hist) . . (+125) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Glossary)
- 22:57, 5 December 2013 (diff | hist) . . (-234) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Bibliography)
- 22:55, 5 December 2013 (diff | hist) . . (+2) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing (→Bibliography)
- 22:55, 5 December 2013 (diff | hist) . . (+340) . . Byzantine generals problem. Byzantine agreement protocol. Security of distributed computing
- 22:51, 5 December 2013 (diff | hist) . . (+2,272) . . N Correctness (Created page with "To show the correctness of EIGByz, we start with some preliminary assertions. The first says that all nonfaulty processes agree on the values relayed directly from nonfaulty p...")
- 22:49, 5 December 2013 (diff | hist) . . (+1,653) . . N Byzantine Agreement with Authentication (Created page with "Byzantine fault model in which processes have the extra power to authenticate their communications, based on the use of digital signatures. A digital signature for process i i...")
- 22:45, 5 December 2013 (diff | hist) . . (+693) . . N Relationship between the stopping and Byzantine agreement problems (Created page with "It is not quite the case that an algorithm that solves the Byzantine agreement automatically solves the agreement problem for stopping failures; the difference is that in the ...") (top)
- 22:44, 5 December 2013 (diff | hist) . . (-12) . . The DCS advantages and disadvantages (top)
- 22:44, 5 December 2013 (diff | hist) . . (+990) . . N The DCS advantages and disadvantages (Created page with "==The DCS advantages== Message transmission between the source and receiver is directly, bypassing the rest of the system objects. If there is no access to objects which ...")
- 22:39, 5 December 2013 (diff | hist) . . (+595) . . N Protected communication systems creation principles in distributed computing systems (Created page with "There are two ways of constructing topology DCS with channels: File:Example5.jpg Figure 3: The “common bus” network topology. The first way: Every object is connect...")
(Latest | Earliest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)