Method of Digital Signature Producing and Verification Based on Recurrent Sequences
It is proposed a method of digital signature producing and verification, based on the mathematical apparatus of recurrent Vk sequences, as well as a scheme and a protocol of its implementation. The analysis of the proposed method demonstrated that, compared to the known analogues, it is more reliabl...
Saved in:
| Date: | 2013 |
|---|---|
| Main Author: | Iaremchuk, Iu. Е. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2013
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/103423 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
AN EXPERIMENTAL MAGNETIC MOMENT DETERMINATION METHOD BASED ON SPATIAL HARMONIC ANALYSIS OF MAGNETIC FLUX DENSITY SIGNATURES
by: Getman, A. V.
Published: (2013)
by: Getman, A. V.
Published: (2013)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
On recurrence in \(G\)-spaces
by: Protasov, Igor V., et al.
Published: (2017)
by: Protasov, Igor V., et al.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Systematization of natural factors that determine changes in spectral signatures of landscape features above hydrocarbon deposits onshore and on the shelf
by: Arkhipov, Oleksander, et al.
Published: (2025)
by: Arkhipov, Oleksander, et al.
Published: (2025)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
An improvement of the box-covering method for solving noisy image processing tasks
by: Терлецький, С. В., et al.
Published: (2025)
by: Терлецький, С. В., et al.
Published: (2025)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Constructing R-sequencings and terraces for groups of even order
by: Ollis, Matt
Published: (2016)
by: Ollis, Matt
Published: (2016)
Improvement of voltage stability for grid connected solar photovoltaic systems using static synchronous compensator with recurrent neural network
by: Praveen Kumar, T., et al.
Published: (2022)
by: Praveen Kumar, T., et al.
Published: (2022)
ASSESSMENT OF DYNAMICS OF UNFAVORABLE HYDROLOGICAL AND HYDROGEOLOGICAL PROCESSES BASED ON SATELLITE DATA AND DIGITAL ELEVATION MODELS (THE POLESIE REGION OF UKRAINE IS AN EXAMPLE)
by: LYALKO, V. I., et al.
Published: (2012)
by: LYALKO, V. I., et al.
Published: (2012)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Recurrence sequences over residual rings
by: Sanchez, S., et al.
Published: (2018)
by: Sanchez, S., et al.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Порогова оптимізація risk-based автентифікації під вартісні регуляторні обмеження PSD2
by: Курніцький, Д.П., et al.
Published: (2026)
by: Курніцький, Д.П., et al.
Published: (2026)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Optimal Digital System for Research Library
by: Lobuzin, I. V.
Published: (2014)
by: Lobuzin, I. V.
Published: (2014)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
A sequence of factorizable subgroups
by: Dabbaghian, Vahid
Published: (2018)
by: Dabbaghian, Vahid
Published: (2018)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Digitization of Historical and Cultural Heritage: Technology and Management
by: Lobuzin, I. V.
Published: (2012)
by: Lobuzin, I. V.
Published: (2012)
MULTIFUNCTIONAL DIGITAL RECEIVER-SPECTROMETER
by: Vasilyev, O. Y., et al.
Published: (2014)
by: Vasilyev, O. Y., et al.
Published: (2014)
Digitization of archival and historical data on destroyed cultural heritage objects within the Zelenyi Hai archaeological complex of the 8th-13th centuries
by: Pavlenko, Ivan, et al.
Published: (2025)
by: Pavlenko, Ivan, et al.
Published: (2025)
Exact sequences of graphs
by: Abbasi, Ahmad, et al.
Published: (2019)
by: Abbasi, Ahmad, et al.
Published: (2019)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
WIDEBAND DIGITAL RECEIVER/PULSE ANALYZER
by: Vynogradov, V. V., et al.
Published: (2015)
by: Vynogradov, V. V., et al.
Published: (2015)
DIGITAL STRUCTURAL-LITHOLOGICAL MODEL OF TARASIVSKE TITANIUM-ZIRCONIUM PLACER DEPOSIT
by: Tsymbal, S.M., et al.
Published: (2016)
by: Tsymbal, S.M., et al.
Published: (2016)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014) -
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013) -
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)