Abstract:
In this paper, we will present how to find keys elliptic curve cryptosystems (ECC) with simple tools of Delphi 7 console application, using the software problem solving of the scalar point multiplication in the field GF(p), where p is an arbitrary prime number.

Abstract:
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resortto trial division by a few initial prime numbers, since such a division take less time. How far we should gowith such a division is the that we are trying to answer in this paper?For the theory of the matter is fullyresolved. However, that in practice we do not have much use.Therefore, we present a solution that isprobably irrelevant to theorists, but it is very useful to people who have spent many nights to producelarge (probably) prime numbers using its own software.

Abstract:
Many people know the general story about RSA and large (probably) prime numbers, without having an idea of how to perform arithmetic operations with the numbers of thousands of bits. Even if they want to develop their own tool for a digital signature, they give up because they think that special hardware-software offers are required for that. In this paper we want to show that even by using a very simple console application, the tools for signature can be developed. Those tools are not as powerful and functional as the products of renowned companies, but they are sufficient to stimulate the interest in cryptography (and the coding of known algorithms is the best way for that), and that is our overriding and permanent goal[3].

Abstract:
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resort to trial division by a few initial prime numbers, since such a division take less time. How far we should go with such a division is the that we are trying to answer in this paper?For the theory of the matter is fully resolved. However, that in practice we do not have much use. Therefore, we present a solution that is probably irrelevant to theorists, but it is very useful to people who have spent many nights to produce large (probably) prime numbers using its own software.

Abstract:
In this paper we present the experimental results that more clearly than any theory suggest an answer to the question: when in detection of large (probably) prime numbers to apply, a very resource demanding, Miller-Rabin algorithm. Or, to put it another way, when the dividing by first several tens of prime numbers should be replaced by primality testing? As an innovation, the procedure above will be supplemented by considering the use of the well-known Goldbach's conjecture in the solving of this and some other important questions about the RSA cryptosystem, always guided by the motto "do not harm" - neither the security nor the time spent.

Abstract:
In this paper, we present a complete digital signature message stream, just the way the RSAdigitalsignature scheme does it. We will focus on the operations with large numbers due to the fact that operatingwith large numbers is the essence of RSA that cannot be understood by the usual illustrative examples withsmall numbers[1]

Abstract:
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.

Abstract:
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a software implementation of finding the inverse element, the operation which is essentially related to both ECC (Elliptic Curve Cryptography) and the RSA schemes of digital signature.

Abstract:
In this paper, we present a complete digital signature message stream, just the way the RSA digital signature scheme does it. We will focus on the operations with large numbers due to the fact that operating with large numbers is the essence of RSA that cannot be understood by the usual illustrative examples with small numbers.

Abstract:
When people track moving objects, they concentrate on different characteristics.Recent results show that people more often concentrate on spatiotemporalthan featural properties of the objects. In other words, location and directionof motion seem to be more informative properties than the stable featuralcharacteristics. This finding contradicts some of our knowledge about cognitivesystem. Current research was done in attempt to specify the effect of featuralcharacteristics, especially color and shape. In Experiment 1, subjects were askedto track four mobile targets presented with another four moving objects. Afterthe motion has stopped, they had to mark the initial four targets. Our resultshave shown that participants pay more attention to the featural properties thanto spatiotemporal characteristics. Since our task was more difficult than thetasks typically reported in the literature, the results might be interpreted as if thesubjects relied mostly on attentional processes. The task in Experiment 2 wasmade even more difficult: the subjects were asked to direct attention on identityof every target. Consequently, the task demanded more complex cognitiveprocesses and emphasizing effects of featural properties. Results suggest thatcolor and shape does not have the same influences on multiple object tracking,but that color has more significant effect.