Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
The principles of specialized processors for realization of authentication of subjects (objects) of interaction based on the Vk recurrent sequences are presented. Compared to the known analogues the developed processors, although less speedy, but provide a higher level of cryptographic reliability d...
Saved in:
| Date: | 2014 |
|---|---|
| Main Author: | Iaremchuk, I. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100238 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Processor group determination for the effective processor capacity usage
by: Dmytrenko, О.A., et al.
Published: (2024)
by: Dmytrenko, О.A., et al.
Published: (2024)
Cloud service for authentication of a person based on their electrocardiogram
by: Luhovskyi, Yu.O.
Published: (2023)
by: Luhovskyi, Yu.O.
Published: (2023)
Algorithmic and Structural Circuit Technology Characteristics for Hardware Implementation of Operations with Quaternions in Functional Processors
by: Kalinovsky, Ya.O., et al.
Published: (2013)
by: Kalinovsky, Ya.O., et al.
Published: (2013)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)
by: Solovyov, V. I., et al.
Published: (2014)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Recurrent neural network model for music generation
by: Komarskiy, O.C., et al.
Published: (2022)
by: Komarskiy, O.C., et al.
Published: (2022)
Extracellular acidity as favouring factor of tumor progression and metastatic dissemination
by: Calorini, L., et al.
Published: (2012)
by: Calorini, L., et al.
Published: (2012)
R.E. Kavetsky "Tumor and host". ‒ Kiev, 1962. ‒ 301 p.
by: Kavetsky, R.E.
Published: (2012)
by: Kavetsky, R.E.
Published: (2012)
"Tumor and host" by R.E. Kavetsky (1962): implications for the past, present and future
by: Osinsky, S.P., et al.
Published: (2012)
by: Osinsky, S.P., et al.
Published: (2012)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Recurrent neural networks for the problem of improving numerical meteorological forecasts
by: Doroshenko, А.Yu., et al.
Published: (2023)
by: Doroshenko, А.Yu., et al.
Published: (2023)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Recurrent-and-Parallel GMDH Algorithms for High-Performance Computing
by: Stepashko, V.S., et al.
Published: (2019)
by: Stepashko, V.S., et al.
Published: (2019)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2005)
by: Sanchez, S., et al.
Published: (2005)
Problems of authentication of region as subject of political activity
by: M. Hordiienko
Published: (2009)
by: M. Hordiienko
Published: (2009)
Protecting public clients using an authorization algorithm
by: Bodak, B.V., et al.
Published: (2023)
by: Bodak, B.V., et al.
Published: (2023)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Coding trees by means of linear recurrence sequences
by: A. V. Anisimov
Published: (2017)
by: A. V. Anisimov
Published: (2017)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
A sequence of factorizable subgroups
by: Dabbaghian, Vahid
Published: (2018)
by: Dabbaghian, Vahid
Published: (2018)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Improvement of voltage stability for grid connected solar photovoltaic systems using static synchronous compensator with recurrent neural network
by: Praveen Kumar, T., et al.
Published: (2022)
by: Praveen Kumar, T., et al.
Published: (2022)
Similar Items
-
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)