Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
The principles of specialized processors for realization of authentication of subjects (objects) of interaction based on the Vk recurrent sequences are presented. Compared to the known analogues the developed processors, although less speedy, but provide a higher level of cryptographic reliability d...
Saved in:
| Date: | 2014 |
|---|---|
| Main Author: | Iaremchuk, I. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100238 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)
by: Solovyov, V. I., et al.
Published: (2014)
Algorithmic and Structural Circuit Technology Characteristics for Hardware Implementation of Operations with Quaternions in Functional Processors
by: Kalinovsky, Ya.O., et al.
Published: (2013)
by: Kalinovsky, Ya.O., et al.
Published: (2013)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Improvement of voltage stability for grid connected solar photovoltaic systems using static synchronous compensator with recurrent neural network
by: Praveen Kumar, T., et al.
Published: (2022)
by: Praveen Kumar, T., et al.
Published: (2022)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
On speciality of Jordan brackets
by: Shestakov, Ivan
Published: (2018)
by: Shestakov, Ivan
Published: (2018)
INTERACTION OF EIGENMODES IN A SPHERICAL PARTICLE WITH NEGATIVE VALUES OF ITS MATERIAL PARAMETERS
by: Svishchov, Yu. V.
Published: (2019)
by: Svishchov, Yu. V.
Published: (2019)
A sequence of factorizable subgroups
by: Dabbaghian, Vahid
Published: (2018)
by: Dabbaghian, Vahid
Published: (2018)
UX research methods and strategies in the development of interactive interfaces
by: Kostiuk, Anton, et al.
Published: (2025)
by: Kostiuk, Anton, et al.
Published: (2025)
The interaction of acousnic and electromagnetic fields in a mixture of electrolytes
by: Kuzmina, L. M., et al.
Published: (2016)
by: Kuzmina, L. M., et al.
Published: (2016)
Exact sequences of graphs
by: Abbasi, Ahmad, et al.
Published: (2019)
by: Abbasi, Ahmad, et al.
Published: (2019)
The Matuyama—Brunhes boundary in the loess-palaeosol sequence of Dolynske, southern Ukraine
by: Bakhmutov, V. G., et al.
Published: (2021)
by: Bakhmutov, V. G., et al.
Published: (2021)
Порогова оптимізація risk-based автентифікації під вартісні регуляторні обмеження PSD2
by: Курніцький, Д.П., et al.
Published: (2026)
by: Курніцький, Д.П., et al.
Published: (2026)
Parametric models for investigation of contact interaction of elements stamp tools
by: Демина, Наталья Анатольевна
Published: (2014)
by: Демина, Наталья Анатольевна
Published: (2014)
Parametric models for investigation of contact interaction of elements stamp tools
by: Демина, Наталья Анатольевна
Published: (2014)
by: Демина, Наталья Анатольевна
Published: (2014)
Improvement of power transformer differential protection through detection and exploitation of the negative sequence currents
by: Zitouni, M.
Published: (2022)
by: Zitouni, M.
Published: (2022)
A NEW METHOD FOR SIDELOBE SUPPRESSION IN THE AMBIGUITY FUNCTION OF SIGNALS MODULATED BY PSEUDO-RANDOM SEQUENCES
by: Lukin, K. O., et al.
Published: (2025)
by: Lukin, K. O., et al.
Published: (2025)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Significance of the Ukrainian loess-palaeosol sequences for Pleistocene climate reconstructions: rock magnetic, palaeosol and pollen proxies
by: Hlavatskyi , D. V., et al.
Published: (2021)
by: Hlavatskyi , D. V., et al.
Published: (2021)
Magnetic enhancement model for southern Ukraine loess on the example of the Middle Pleistocene sequence at Dolynske
by: Hlavatskyi, D.V.
Published: (2025)
by: Hlavatskyi, D.V.
Published: (2025)
Mathematical modeling of contact interaction of stamp rigging elements
by: Демина, Н. А.
Published: (2014)
by: Демина, Н. А.
Published: (2014)
Mathematical modeling of contact interaction of stamp rigging elements
by: Демина, Н. А.
Published: (2014)
by: Демина, Н. А.
Published: (2014)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Choice of Conditions of Acoustooptic Interaction for Processors Using Components of Second Order Bragg’s Diffraction
by: Kupchenko, L. F., et al.
Published: (2013)
by: Kupchenko, L. F., et al.
Published: (2013)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Оцінка інноваційного та інвестиційного потенціалів як стратегічного базису ідентифікації Smart-спеціалізації регіонів України
by: Andryeyeva, Natalya, et al.
Published: (2020)
by: Andryeyeva, Natalya, et al.
Published: (2020)
IMPROVING THE EFFICIENCY OF FAULT PROTECTION SYSTEMS OF ELECTRICAL GRIDS BASED ON ZERO SEQUENCE VOLTAGES AND CURRENTS WAVELET TRANSFORMS
by: Syvokobylenko, V. F., et al.
Published: (2020)
by: Syvokobylenko, V. F., et al.
Published: (2020)
On groups whose subgroups of infinite special rank are transitively normal
by: Semko, Nicolai N., et al.
Published: (2017)
by: Semko, Nicolai N., et al.
Published: (2017)
Serial group rings of finite groups. General linear and close groups
by: Kukharev, Andrei, et al.
Published: (2015)
by: Kukharev, Andrei, et al.
Published: (2015)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
On the non–periodic groups, whose subgroups of infinite special rank are transitively normal
by: Kurdachenko, L. A., et al.
Published: (2020)
by: Kurdachenko, L. A., et al.
Published: (2020)
Similar Items
-
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)