Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
The research are conducted for statistical security of the digital signature method based on recurrent Vk sequences and made his comparison with well-known Feige-Fiat-Shamir and Schnorr methods. The results of analysis showed that, in general, the method based on Vk sequences has a high level of sta...
Saved in:
| Date: | 2014 |
|---|---|
| Main Authors: | Matov, O. Y., Vasylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100282 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Electronic (security) documentary courses. Electronic digital signature
by: Ya. Plaksiienko, et al.
Published: (2019)
by: Ya. Plaksiienko, et al.
Published: (2019)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Coding trees by means of linear recurrence sequences
by: A. V. Anisimov
Published: (2017)
by: A. V. Anisimov
Published: (2017)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Power of n and nth root of multi-digit numbers based on recurrent relations
by: Tereshchenko, A.N.
Published: (2017)
by: Tereshchenko, A.N.
Published: (2017)
Interval estimation of distribution parameter by statistical trials of expected value
by: Barannik, V.O.
Published: (2019)
by: Barannik, V.O.
Published: (2019)
Power of n and n-th root of multi-digit numbers based on recurrent relations
by: A. N. Tereshchenko
Published: (2015)
by: A. N. Tereshchenko
Published: (2015)
On Statistical Convergence of Metric-Valued Sequences
by: M. Kьзьkaslan, et al.
Published: (2014)
by: M. Kьзьkaslan, et al.
Published: (2014)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Statistical analysis of local plots of bits sequences
by: V. I. Masol, et al.
Published: (2019)
by: V. I. Masol, et al.
Published: (2019)
Improvement of the signature-system method by applying priority features in the signatures of monitoring objects to ensure maximum probability of their proper recognition
by: O. A. Iliashov, et al.
Published: (2020)
by: O. A. Iliashov, et al.
Published: (2020)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
Methods of mine detection for humanitarian demining: survey
by: Mentus, Igor, et al.
Published: (2024)
by: Mentus, Igor, et al.
Published: (2024)
On the Signature of a Path in an Operator Algebra
by: Gilliers, Nicolas, et al.
Published: (2022)
by: Gilliers, Nicolas, et al.
Published: (2022)
Aggregate signature protocol with group Leader
by: H. L. Kozina, et al.
Published: (2021)
by: H. L. Kozina, et al.
Published: (2021)
On the lacunary (A,φ)-statistical convergence of double sequences
by: E. Savaє
Published: (2018)
by: E. Savaє
Published: (2018)
Joint distribution of some statistics of random bit sequences
by: V. I. Masol, et al.
Published: (2021)
by: V. I. Masol, et al.
Published: (2021)
On generalized statistical and ideal convergence of metric-valued sequences
by: P. Das, et al.
Published: (2016)
by: P. Das, et al.
Published: (2016)
Statistical data analysis for budget planning in the provision of medical and social rehabilitation injured persons
by: Fedorenko, S.M., et al.
Published: (2015)
by: Fedorenko, S.M., et al.
Published: (2015)
Method for restoring missing data based on a combined exponential smoothing model
by: Terentiev, Oleksandr, et al.
Published: (2025)
by: Terentiev, Oleksandr, et al.
Published: (2025)
Using the whole image and restrictions in the research of properties of some signature operations in Table Algebra
by: N. D. Kakhuta, et al.
Published: (2019)
by: N. D. Kakhuta, et al.
Published: (2019)
IMPROVING THE EFFICIENCY OF FAULT PROTECTION SYSTEMS OF ELECTRICAL GRIDS BASED ON ZERO SEQUENCE VOLTAGES AND CURRENTS WAVELET TRANSFORMS
by: Syvokobylenko, V. F., et al.
Published: (2020)
by: Syvokobylenko, V. F., et al.
Published: (2020)
Improvement of power transformer differential protection through detection and exploitation of the negative sequence currents
by: Zitouni, M.
Published: (2022)
by: Zitouni, M.
Published: (2022)
Signatures of noncommutativity in bar detectors of gravitational waves
by: S. Gangopadhyay, et al.
Published: (2019)
by: S. Gangopadhyay, et al.
Published: (2019)
Signatures of noncommutativity in bar detectors of gravitational waves
by: S. Gangopadhyay, et al.
Published: (2019)
by: S. Gangopadhyay, et al.
Published: (2019)
Similar Items
-
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)