Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
The research are conducted for statistical security of the digital signature method based on recurrent Vk sequences and made his comparison with well-known Feige-Fiat-Shamir and Schnorr methods. The results of analysis showed that, in general, the method based on Vk sequences has a high level of sta...
Saved in:
| Date: | 2014 |
|---|---|
| Main Author: | Iaremchuk, Iu. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100258 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Functionality and Statistics of the use of the scientific digital library of periodical publications of the NAS of Ukraine
by: Andon, P.I., et al.
Published: (2018)
by: Andon, P.I., et al.
Published: (2018)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Optimal Digital System for Research Library
by: Lobuzin, I. V.
Published: (2014)
by: Lobuzin, I. V.
Published: (2014)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
An improvement of the box-covering method for solving noisy image processing tasks
by: Терлецький, С. В., et al.
Published: (2025)
by: Терлецький, С. В., et al.
Published: (2025)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Electronic (security) documentary courses. Electronic digital signature
by: Ya. Plaksiienko, et al.
Published: (2019)
by: Ya. Plaksiienko, et al.
Published: (2019)
MODERN SOLUTIONS FOR PROVIDING ASSESSMENT AND CONTROL OF SECURITY OF ELECTRICITY SUPPLY
by: Pryshchepa, Yaroslav, et al.
Published: (2024)
by: Pryshchepa, Yaroslav, et al.
Published: (2024)
Systematization of natural factors that determine changes in spectral signatures of landscape features above hydrocarbon deposits onshore and on the shelf
by: Arkhipov, Oleksander, et al.
Published: (2025)
by: Arkhipov, Oleksander, et al.
Published: (2025)
AN EXPERIMENTAL MAGNETIC MOMENT DETERMINATION METHOD BASED ON SPATIAL HARMONIC ANALYSIS OF MAGNETIC FLUX DENSITY SIGNATURES
by: Getman, A. V.
Published: (2013)
by: Getman, A. V.
Published: (2013)
Digitization of Historical and Cultural Heritage: Technology and Management
by: Lobuzin, I. V.
Published: (2012)
by: Lobuzin, I. V.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Recurrent neural network model for music generation
by: Komarskiy, O.C., et al.
Published: (2022)
by: Komarskiy, O.C., et al.
Published: (2022)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Recurrent neural networks for the problem of improving numerical meteorological forecasts
by: Doroshenko, А.Yu., et al.
Published: (2023)
by: Doroshenko, А.Yu., et al.
Published: (2023)
MULTIFUNCTIONAL DIGITAL RECEIVER-SPECTROMETER
by: Vasilyev, O. Y., et al.
Published: (2014)
by: Vasilyev, O. Y., et al.
Published: (2014)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
WIDEBAND DIGITAL RECEIVER/PULSE ANALYZER
by: Vynogradov, V. V., et al.
Published: (2015)
by: Vynogradov, V. V., et al.
Published: (2015)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
ANALYSIS OF METHODS AND ALGORITHMS FOR STUDYING THE REGIME RELIABILITY OF POWER SYSTEMS IN CONDITIONS OF CASCADE FAILURE PROGRESSION
by: Bardyk, Ye., et al.
Published: (2023)
by: Bardyk, Ye., et al.
Published: (2023)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2005)
by: Sanchez, S., et al.
Published: (2005)
USING AN INDICATIVE APPROACH TO ASSESSING THE SECURITY OF ELECTRICITY SUPPLY
by: Pryshchepa, Yaroslav, et al.
Published: (2024)
by: Pryshchepa, Yaroslav, et al.
Published: (2024)
World Experience in the Digitalization of Public Administration in the Development of the Tourist and Recreational Sphere
by: Boretska, N., et al.
Published: (2021)
by: Boretska, N., et al.
Published: (2021)
Fuzzy system for determining the quality of digital images of documents to be microfilmed
by: Egorov, P. N.
Published: (2016)
by: Egorov, P. N.
Published: (2016)
A sequence of factorizable subgroups
by: Dabbaghian, Vahid
Published: (2018)
by: Dabbaghian, Vahid
Published: (2018)
Coding trees by means of linear recurrence sequences
by: A. V. Anisimov
Published: (2017)
by: A. V. Anisimov
Published: (2017)
Detection of breast cancer presenting as a mass in women with dense breasts — digital breast tomosynthesis versus full-field digital mammography
by: Babkina, T.M., et al.
Published: (2023)
by: Babkina, T.M., et al.
Published: (2023)
Optimal design of tubularbar structures subjected to corrosion
by: Фридман, М. М.
Published: (2016)
by: Фридман, М. М.
Published: (2016)
Similar Items
-
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)