Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
The research are conducted for statistical security of the digital signature method based on recurrent Vk sequences and made his comparison with well-known Feige-Fiat-Shamir and Schnorr methods. The results of analysis showed that, in general, the method based on Vk sequences has a high level of sta...
Saved in:
| Date: | 2014 |
|---|---|
| Main Author: | Iaremchuk, Iu. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100258 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Optimal Digital System for Research Library
by: Lobuzin, I. V.
Published: (2014)
by: Lobuzin, I. V.
Published: (2014)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Systematization of natural factors that determine changes in spectral signatures of landscape features above hydrocarbon deposits onshore and on the shelf
by: Arkhipov, Oleksander, et al.
Published: (2025)
by: Arkhipov, Oleksander, et al.
Published: (2025)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
AN EXPERIMENTAL MAGNETIC MOMENT DETERMINATION METHOD BASED ON SPATIAL HARMONIC ANALYSIS OF MAGNETIC FLUX DENSITY SIGNATURES
by: Getman, A. V.
Published: (2013)
by: Getman, A. V.
Published: (2013)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
An improvement of the box-covering method for solving noisy image processing tasks
by: Терлецький, С. В., et al.
Published: (2025)
by: Терлецький, С. В., et al.
Published: (2025)
ANALYSIS OF METHODS AND ALGORITHMS FOR STUDYING THE REGIME RELIABILITY OF POWER SYSTEMS IN CONDITIONS OF CASCADE FAILURE PROGRESSION
by: Bardyk, Ye., et al.
Published: (2023)
by: Bardyk, Ye., et al.
Published: (2023)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Improvement of voltage stability for grid connected solar photovoltaic systems using static synchronous compensator with recurrent neural network
by: Praveen Kumar, T., et al.
Published: (2022)
by: Praveen Kumar, T., et al.
Published: (2022)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
A sequence of factorizable subgroups
by: Dabbaghian, Vahid
Published: (2018)
by: Dabbaghian, Vahid
Published: (2018)
Digitization of Historical and Cultural Heritage: Technology and Management
by: Lobuzin, I. V.
Published: (2012)
by: Lobuzin, I. V.
Published: (2012)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023)
by: Ustimenko, Vasyl O., et al.
Published: (2023)
MULTIFUNCTIONAL DIGITAL RECEIVER-SPECTROMETER
by: Vasilyev, O. Y., et al.
Published: (2014)
by: Vasilyev, O. Y., et al.
Published: (2014)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Exact sequences of graphs
by: Abbasi, Ahmad, et al.
Published: (2019)
by: Abbasi, Ahmad, et al.
Published: (2019)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
WIDEBAND DIGITAL RECEIVER/PULSE ANALYZER
by: Vynogradov, V. V., et al.
Published: (2015)
by: Vynogradov, V. V., et al.
Published: (2015)
OPERATIONAL RELIABILITY ANALYSIS FOR SUSTAINABLE ENERGY SYSTEM PLANNING DEVELOPMENT
by: Bardyk , Ye., et al.
Published: (2024)
by: Bardyk , Ye., et al.
Published: (2024)
GLOBAL STATISTICS OF BOLIDES IN THE TERRESTRIAL ATMOSPHERE
by: Chernogor, L. F., et al.
Published: (2017)
by: Chernogor, L. F., et al.
Published: (2017)
The Matuyama—Brunhes boundary in the loess-palaeosol sequence of Dolynske, southern Ukraine
by: Bakhmutov, V. G., et al.
Published: (2021)
by: Bakhmutov, V. G., et al.
Published: (2021)
Statistical Analysis Dataset Based on Taguchi Design and Regression Modeling
by: Kolesnyk, Vitalii, et al.
Published: (2026)
by: Kolesnyk, Vitalii, et al.
Published: (2026)
Similar Items
-
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)