Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
For problems of confidentiality of information objects of automated systems is suggested to use a block cryptographic transformation of conventional number systems in residue classes to the positional system. Refs: 4 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Y., Vаsylenko, V. S., Vаsylenko, M. Y. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105225 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Recursive method for constructing linear convolution algorithms of various lengths using hypercomplex number systems.
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Generalized analysis of matrix representations for associative hypercomplex number systems used in power engineering
by: Klipkov, S. I.
Published: (2014)
by: Klipkov, S. I.
Published: (2014)
Construction of High-Dimensional Isomorphic Hypercomplex Number Systems
by: Боярінова, Ю. Є., et al.
Published: (2012)
by: Боярінова, Ю. Є., et al.
Published: (2012)
A method of selecting hyper complex numbers systems for modeling digital reversible filters
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
Criteria Conceived Commutative Hypercomplex Number Systems Direct Sum of Low-Dimensional Systems
by: Kalinovsky, J. А.
Published: (2012)
by: Kalinovsky, J. А.
Published: (2012)
Method of hypercomplex numbers systems generation for modeling digital reversible filters of 4th order
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
On the zero forcing number of graphs and their splitting graphs
by: Chacko, Baby, et al.
Published: (2019)
by: Chacko, Baby, et al.
Published: (2019)
Isomorphism of Commutative Hypercomplex Number Systems and Representations of Exponential Functions in Them
by: Каліновський, Я. О., et al.
Published: (2012)
by: Каліновський, Я. О., et al.
Published: (2012)
Colour class domination numbers of some classes of graphs
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
Symmetric cryptoalgorithms in the residue number system
by: M. M. Kasianchuk, et al.
Published: (2021)
by: M. M. Kasianchuk, et al.
Published: (2021)
Residue number system asymmetric sryptoalgorithms
by: Ya. M. Nykolaichuk, et al.
Published: (2022)
by: Ya. M. Nykolaichuk, et al.
Published: (2022)
A method for implementing the operation of modulo addition of two numbers residues of the residual number system
by: V. A. Krasnobaev, et al.
Published: (2020)
by: V. A. Krasnobaev, et al.
Published: (2020)
The General Case of an Isomorphism of Commutative Hypercomplex Number Systems and Presentation of Exponential Functions in Them
by: Kalinovsky, Ja. A., et al.
Published: (2012)
by: Kalinovsky, Ja. A., et al.
Published: (2012)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
Structure of an algoritsm for quick two-dimensional convolution by means of isomorphing hypercomplex numerical systems
by: Kalinovsky, Ya. A., et al.
Published: (2018)
by: Kalinovsky, Ya. A., et al.
Published: (2018)
The detour hull number of a graph
by: Santhakumaran, A. P., et al.
Published: (2018)
by: Santhakumaran, A. P., et al.
Published: (2018)
Transformation of pseudo-numbers of the residual class system with all even modules into the numbers of the system
by: Ju. D. Polisskij
Published: (2018)
by: Ju. D. Polisskij
Published: (2018)
The method of operational data diagnosing represented in the residue number system
by: V. A. Krasnobaev, et al.
Published: (2019)
by: V. A. Krasnobaev, et al.
Published: (2019)
The method of operational data diagnosing represented in the residue number system
by: V. A. Krasnobaev, et al.
Published: (2018)
by: V. A. Krasnobaev, et al.
Published: (2018)
Algorithm for Transforming Representations of Numbers in Systems of Residual Classes
by: Ju. D. Polisskij
Published: (2020)
by: Ju. D. Polisskij
Published: (2020)
The method of arithmetic comparison of data presented in the residue number system
by: V. A. Krasnobaev, et al.
Published: (2016)
by: V. A. Krasnobaev, et al.
Published: (2016)
Dynamic network model based on the use of hypercomplex number systems
by: Ланде, Д. В., et al.
Published: (2020)
by: Ланде, Д. В., et al.
Published: (2020)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Study of Symmetries Operator of Isomorphism Hypercomplex Number Systems and Their Application for the Synthesis of Algorithms of Fast Calculations of Cyclic Convolution
by: Kalinovsky, Ya. O.
Published: (2014)
by: Kalinovsky, Ya. O.
Published: (2014)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Computing characteristics of one class of non-commutative hypercomplex number systems of 4-dimension
by: Kalinovsky, Ya. O., et al.
Published: (2014)
by: Kalinovsky, Ya. O., et al.
Published: (2014)
Reproducing of the humidity curve of power transformers oil using adaptive neuro-fuzzy systems
by: Vasilevskij, V.V., et al.
Published: (2021)
by: Vasilevskij, V.V., et al.
Published: (2021)
Similar Items
-
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)