Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
It has been presented algorithms for fast computation of elements of recurrent Vk sequences for positive and negative values of the n index of this sequence. For each of these values, it was considered two possible algorithm variants — based both on the binary method, and on the method of decomposin...
Saved in:
| Date: | 2013 |
|---|---|
| Main Author: | Iaremchuk, Iu. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2013
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/103361 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Recurrent-and-Parallel GMDH Algorithms for High-Performance Computing
by: Stepashko, V.S., et al.
Published: (2019)
by: Stepashko, V.S., et al.
Published: (2019)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Workshop with International Participation ‘‘New Trends in Cancer Research and Innovative Tumor Vaccines’’, May 11–12, 2017, Kyiv, Ukraine
Published: (2017)
Published: (2017)
For contributors to SPQEO
Published: (2019)
Published: (2019)
The III Swedish-Ukrainian meeting on cancer diseases
Published: (2016)
Published: (2016)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Symposium and Summer School “Fundamental principles of cancer biotherapy” Kyiv, Ukraine, May 21-24, 2018
Published: (2018)
Published: (2018)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
International scientific conference ‘‘Normal and cancer stem cells: discovery, diagnosis and therapy’’ october 5–6, 2017 Kyiv, Ukraine
Published: (2017)
Published: (2017)
Oncology. Selected lectures
Published: (2011)
Published: (2011)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
For contributors to SPQEO
Published: (2019)
Published: (2019)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Construction of a Computer Technology for Information Support of Decisions in the Foundry Production Proces
by: Tokova, O.V., et al.
Published: (2019)
by: Tokova, O.V., et al.
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
The DABC and TLBO Algorithms for Solve Job Shop Scheduling Problem
by: Witkowski, T.
Published: (2019)
by: Witkowski, T.
Published: (2019)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Similar Items
-
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Recurrent-and-Parallel GMDH Algorithms for High-Performance Computing
by: Stepashko, V.S., et al.
Published: (2019)