Authentication Method of Interaction Parties Based on Reccurent Sequences
It has been suggested a method for authentication of the interaction parties, based on recurrent Vk sequences and their dependencies. An analysis of cryptographic reliability and computational com-plexity shows that the proposed method is more robust in providing, in general, approximately the same...
Saved in:
| Date: | 2013 |
|---|---|
| Main Author: | Yaremchuk, Yu. Е. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2013
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/103381 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Cloud service for authentication of a person based on their electrocardiogram
by: Luhovskyi, Yu.O.
Published: (2023)
by: Luhovskyi, Yu.O.
Published: (2023)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
An improvement of the box-covering method for solving noisy image processing tasks
by: Терлецький, С. В., et al.
Published: (2025)
by: Терлецький, С. В., et al.
Published: (2025)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Development and Researches of Fitness of Expert Tool «Fractal-M» for Authentication of Announcer on the Parameters of Vocal Signals
by: Solovyov, V. I., et al.
Published: (2014)
by: Solovyov, V. I., et al.
Published: (2014)
Digital platform for managing investment projects within the "government-business-society" relations based on partnership
by: Petrova, I.
Published: (2024)
by: Petrova, I.
Published: (2024)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Conceptual model of a manufacturing enterprise’s digital ecosystem in the context of Industry 4.0.
by: Loza, S.
Published: (2025)
by: Loza, S.
Published: (2025)
Considering risks when using information technology
by: Diachenko, V.
Published: (2024)
by: Diachenko, V.
Published: (2024)
The Economic Impact of Cloud Technologies on the Industry 4.0 Development
by: Reznikov, R.
Published: (2023)
by: Reznikov, R.
Published: (2023)
World Experience in the Digitalization of Public Administration in the Development of the Tourist and Recreational Sphere
by: Boretska, N., et al.
Published: (2021)
by: Boretska, N., et al.
Published: (2021)
Platform Strategiarchy as a Tool for Reducing Information Asymmetry, Taking into Account the Scale, Cardinality and Order of the Strategy
by: Vyshnevskyi, O.
Published: (2023)
by: Vyshnevskyi, O.
Published: (2023)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Protecting public clients using an authorization algorithm
by: Bodak, B.V., et al.
Published: (2023)
by: Bodak, B.V., et al.
Published: (2023)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Approaches to optimizing thes of reading steganographic information in vector images
by: Казміді, І. Д., et al.
Published: (2026)
by: Казміді, І. Д., et al.
Published: (2026)
Method of processing information about the state of the environment based on data obtained through a service-oriented network
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Similar Items
-
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013) -
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)