• Master Vocabulary

    Master Vocabulary

    Master Vocabulary guide is free and you are welcome to share it with others. Three Vocabulary Learning Methods & Some Big Ideas: Introduction, Vocabulary List, Active Vocabulary vs Passive Vocabulary, Key to Success, Method One, Is Translating a Good Idea.

     32 p vlute 24/12/2021 16 2

  • Chapter 12: Cryptographic Hash Functions

    Chapter 12: Cryptographic Hash Functions

    Objectives of Chapter 12: To introduce general ideas behind cryptographic hash functions; to discuss the Merkle-Damgard scheme as the basis for iterated hash functions; to distinguish between two categories of hash functions; to discuss the structure of SHA-512; to discuss the structure of Whirlpool.

     8 p vlute 16/11/2015 296 1

  • Lecture Electric circuit theory: Second-order circuits - Nguyễn Công Phương

    Lecture Electric circuit theory: Second-order circuits - Nguyễn Công Phương

    Lecture Electric circuit theory: Second-order circuits include all of the following content: The Source-free series RLC circuit, initial conditions, the characteristic equation, the classical method, second-order op amp circuits.

     45 p vlute 30/06/2016 305 1

  • Lecture Electric circuit theory: Magnetically coupled circuits - Nguyễn Công Phương

    Lecture Electric circuit theory: Magnetically coupled circuits - Nguyễn Công Phương

    Lecture Electric circuit theory - Magnetically coupled circuits presents the following content: Mutual inductance, Dot convention, analysis of magnetically coupled circuits, energy in a coupled circuit, transformers.

     47 p vlute 30/06/2016 408 1

  • Chapter 14: Entity Authentication

    Chapter 14: Entity Authentication

    Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

     7 p vlute 16/11/2015 383 1

  • Lecture Electric circuit theory: First-order crcuits - Nguyễn Công Phương

    Lecture Electric circuit theory: First-order crcuits - Nguyễn Công Phương

    Lecture Electric circuit theory: First-order crcuits include all of the following: Introduction to transient analysis, initial conditions, the source-free RC circuit, the source-free RL circuit, step response of an RC circuit, step response of an RL circuit, the classical method, first-order Op Amp circuits

     41 p vlute 30/06/2016 278 1

  • Chapter 13: Digital Signature

    Chapter 13: Digital Signature

    Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.

     8 p vlute 16/11/2015 315 1

  • Chapter 10: Elliptic Curve Cryptography

    Chapter 10: Elliptic Curve Cryptography

    This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.

     14 p vlute 16/11/2015 392 1

  • Lecture Electric circuit theory: Frequency response - Nguyễn Công Phương

    Lecture Electric circuit theory: Frequency response - Nguyễn Công Phương

    The main contents of this chapter include all of the following: Transfer function, the decibel scale, bode plots, series resonance, parallel resonance, passive filters, active filters, scaling.

     78 p vlute 30/06/2016 284 1

  • Lecture Electric circuit theory: Sinusoid and phasors - Nguyễn Công Phương

    Lecture Electric circuit theory: Sinusoid and phasors - Nguyễn Công Phương

    Lecture Electric circuit theory - Sinusoid and phasors include all of the following content: Sinusoids, complex numbers, phasors, phasor relationships for circuit elements.

     19 p vlute 30/06/2016 270 1

  • Chapter 11: Message Integrity and Message Authentication

    Chapter 11: Message Integrity and Message Authentication

    Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.

     7 p vlute 16/11/2015 297 1

  • Lecture Electric circuit theory: The laplace transform - Nguyễn Công Phương

    Lecture Electric circuit theory: The laplace transform - Nguyễn Công Phương

    In this chapter you will learn: Definition, two important singularity functions, transform pairs, properties of the transform, inverse transform, initial-value and final-value theorems, laplace circuit solutions, circuit element models, analysis techniques, convolution integral, transfer function.

     106 p vlute 30/06/2016 308 1

Hướng dẫn khai thác thư viện số