Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
The research are conducted for statistical security of the digital signature method based on recurrent Vk sequences and made his comparison with well-known Feige-Fiat-Shamir and Schnorr methods. The results of analysis showed that, in general, the method based on Vk sequences has a high level of sta...
Saved in:
| Date: | 2014 |
|---|---|
| Main Authors: | Matov, O. Y., Vasylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100282 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Electronic (security) documentary courses. Electronic digital signature
by: Ya. Plaksiienko, et al.
Published: (2019)
by: Ya. Plaksiienko, et al.
Published: (2019)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Coding trees by means of linear recurrence sequences
by: A. V. Anisimov
Published: (2017)
by: A. V. Anisimov
Published: (2017)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
On the boundedness of one recurrent sequence in a banach space
by: Vyatchaninov, O. V., et al.
Published: (2009)
by: Vyatchaninov, O. V., et al.
Published: (2009)
On the Boundedness of a Recurrence Sequence in a Banach Space
by: Gomilko, A. M., et al.
Published: (2003)
by: Gomilko, A. M., et al.
Published: (2003)
On the asymptotic behavior of certain infinite-dimensional recurrence sequences
by: Tomilov, Yu. V., et al.
Published: (1995)
by: Tomilov, Yu. V., et al.
Published: (1995)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Power of n and nth root of multi-digit numbers based on recurrent relations
by: Tereshchenko, A.N.
Published: (2017)
by: Tereshchenko, A.N.
Published: (2017)
Interval estimation of distribution parameter by statistical trials of expected value
by: Barannik, V.O.
Published: (2019)
by: Barannik, V.O.
Published: (2019)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Basis Partitions and Their Signature
by: Alladi, Krishnaswami
Published: (2025)
by: Alladi, Krishnaswami
Published: (2025)
Power of n and n-th root of multi-digit numbers based on recurrent relations
by: A. N. Tereshchenko
Published: (2015)
by: A. N. Tereshchenko
Published: (2015)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
On statistical convergence of vector-valued sequences associated with multiplier sequences
by: Altinok, H., et al.
Published: (2006)
by: Altinok, H., et al.
Published: (2006)
On statistical convergence of vector-valued sequences associated with multiplier sequences
by: Altinok, H., et al.
Published: (2006)
by: Altinok, H., et al.
Published: (2006)
Digital processing of photos from a 4π track detector
by: Afanasiev, S.N., et al.
Published: (2022)
by: Afanasiev, S.N., et al.
Published: (2022)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
On Statistical Convergence of Metric-Valued Sequences
by: M. Kьзьkaslan, et al.
Published: (2014)
by: M. Kьзьkaslan, et al.
Published: (2014)
On the statistical convergence of metric-valued sequences
by: Kucukaslan, M., et al.
Published: (2014)
by: Kucukaslan, M., et al.
Published: (2014)
On the Statistical Convergence of Metric-Valued Sequences
by: Değer, U., et al.
Published: (2014)
by: Değer, U., et al.
Published: (2014)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
Improvement of the signature-system method by applying priority features in the signatures of monitoring objects to ensure maximum probability of their proper recognition
by: O. A. Iliashov, et al.
Published: (2020)
by: O. A. Iliashov, et al.
Published: (2020)
Methods of mine detection for humanitarian demining: survey
by: Mentus, Igor, et al.
Published: (2024)
by: Mentus, Igor, et al.
Published: (2024)
Statistical analysis of local plots of bits sequences
by: V. I. Masol, et al.
Published: (2019)
by: V. I. Masol, et al.
Published: (2019)
Aggregate signature protocol with group Leader
by: H. L. Kozina, et al.
Published: (2021)
by: H. L. Kozina, et al.
Published: (2021)
On the Signature of a Path in an Operator Algebra
by: Gilliers, Nicolas, et al.
Published: (2022)
by: Gilliers, Nicolas, et al.
Published: (2022)
Method for restoring missing data based on a combined exponential smoothing model
by: Terentiev, Oleksandr, et al.
Published: (2025)
by: Terentiev, Oleksandr, et al.
Published: (2025)
Similar Items
-
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)