Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
The research are conducted for statistical security of the digital signature method based on recurrent Vk sequences and made his comparison with well-known Feige-Fiat-Shamir and Schnorr methods. The results of analysis showed that, in general, the method based on Vk sequences has a high level of sta...
Saved in:
| Date: | 2014 |
|---|---|
| Main Authors: | Matov, O. Y., Vasylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100282 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Digitalization of Economic Security Management in Investment Security of Ukraine
by: Kalinin, Oleksandr, et al.
Published: (2023)
by: Kalinin, Oleksandr, et al.
Published: (2023)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Investment Security in the Development of the Digital Economy
by: Kalinin, Oleksandr
Published: (2024)
by: Kalinin, Oleksandr
Published: (2024)
Method for restoring missing data based on a combined exponential smoothing model
by: Terentiev, Oleksandr, et al.
Published: (2025)
by: Terentiev, Oleksandr, et al.
Published: (2025)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
IMPROVING THE EFFICIENCY OF FAULT PROTECTION SYSTEMS OF ELECTRICAL GRIDS BASED ON ZERO SEQUENCE VOLTAGES AND CURRENTS WAVELET TRANSFORMS
by: Syvokobylenko, V. F., et al.
Published: (2020)
by: Syvokobylenko, V. F., et al.
Published: (2020)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
The concept of a hybrid technology for remote detection of explosive objects in coastal shallow water areas
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
Methods of mine detection for humanitarian demining: survey
by: Mentus, Igor, et al.
Published: (2024)
by: Mentus, Igor, et al.
Published: (2024)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
AN EXPERIMENTAL MAGNETIC MOMENT DETERMINATION METHOD BASED ON SPATIAL HARMONIC ANALYSIS OF MAGNETIC FLUX DENSITY SIGNATURES
by: Getman, A. V.
Published: (2013)
by: Getman, A. V.
Published: (2013)
Improvement of power transformer differential protection through detection and exploitation of the negative sequence currents
by: Zitouni, M.
Published: (2022)
by: Zitouni, M.
Published: (2022)
Leveraging Business Controlling for Sustainability Crisis Management in Digital Transformation
by: Shalenyi, Volodymyr, et al.
Published: (2025)
by: Shalenyi, Volodymyr, et al.
Published: (2025)
Remote Sensing Monitoring of Anthropogenic Changes in the Desenka River Channel (Kyiv, Ukraine)
by: Zheng, Yue, et al.
Published: (2022)
by: Zheng, Yue, et al.
Published: (2022)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Methodics of data preprocessing in problem of sequential analysis
by: Moldavskaya, A. V., et al.
Published: (2017)
by: Moldavskaya, A. V., et al.
Published: (2017)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Mathematical model for aerial image decoding and automated analysis of urban infrastructure
by: Marushchak, Vasyl
Published: (2025)
by: Marushchak, Vasyl
Published: (2025)
Electromagnetic precursors of earthquakes and their recurrence
by: Dovbnya, B. V.
Published: (2014)
by: Dovbnya, B. V.
Published: (2014)
Hydrocarbon deposit mapping validation by the means of ground-based spectrometry, remote sensing and geophysical data
by: Titarenko, Olga
Published: (2019)
by: Titarenko, Olga
Published: (2019)
Modeling fires based on the results of correlation analysis
by: Butenko, Olga, et al.
Published: (2023)
by: Butenko, Olga, et al.
Published: (2023)
Research and forecasting of landslide phenomena of the Dniper zone of Kyiv based on the remote sensing data and geomorfological studies
by: Pazynych, Nataliia
Published: (2017)
by: Pazynych, Nataliia
Published: (2017)
System of automated software control of the antenna system of the satellite
by: Yehorov, Volodymyr O.
Published: (2024)
by: Yehorov, Volodymyr O.
Published: (2024)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)