Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
For problems of confidentiality of information objects of automated systems is suggested to use a block cryptographic transformation of conventional number systems in residue classes to the positional system. Refs: 4 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Y., Vаsylenko, V. S., Vаsylenko, M. Y. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105225 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Colour class domination numbers of some classes of graphs
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
A genetic method for solving the problem on educational classes scheduling
by: Федорченко, Є. М., et al.
Published: (2024)
by: Федорченко, Є. М., et al.
Published: (2024)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
On Stone sublattices of the lattice of totally local Fitting classes
by: Skiba, Alexander N., et al.
Published: (2018)
by: Skiba, Alexander N., et al.
Published: (2018)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Construction and research of operators of an interlineation of functions of three variables on system of not intersected curves in a cylindrical frame with preservation of a class of differentiability
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of an interlineation of functions of three variables on system of not intersected curves in a cylindrical frame with preservation of a class of differentiability
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Camina groups with few conjugacy classes
by: Cangelmi, Leonardo, et al.
Published: (2018)
by: Cangelmi, Leonardo, et al.
Published: (2018)
Analysis of the influence of load inductance on nonlinear distortions of a class D amplifier caused by «dead time»
by: Naida, S. A., et al.
Published: (2021)
by: Naida, S. A., et al.
Published: (2021)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Формування ?-SiC на поверхні por-Si/mono-Si за механізмом Странського – Крастанова
by: Suchikova, Y. O., et al.
Published: (2022)
by: Suchikova, Y. O., et al.
Published: (2022)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Groups of nilpotency class \(2\) of order \(p^4\) as additive groups of local nearrings
by: Raievska, Iryna, et al.
Published: (2024)
by: Raievska, Iryna, et al.
Published: (2024)
Computing characteristics of one class of non-commutative hypercomplex number systems of 4-dimension
by: Kalinovsky, Ya. O., et al.
Published: (2014)
by: Kalinovsky, Ya. O., et al.
Published: (2014)
Class structure of electromechanical energy converter models with UML-diagrams application
by: Pliugin, V. E.
Published: (2014)
by: Pliugin, V. E.
Published: (2014)
Twisted conjugacy classes of Automorphisms of Baumslag-Solitar groups
by: Fel’shtyn, Alexander, et al.
Published: (2018)
by: Fel’shtyn, Alexander, et al.
Published: (2018)
Building and research of operator approximation of functions of two variables with preservation of class Cr(R2) for traces of derivatives to a fixed order in the specified line
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Building and research of operator approximation of functions of two variables with preservation of class Cr(R2) for traces of derivatives to a fixed order in the specified line
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Analysis of the payback period of a modernized pump unit with induction electric motors of advanced energy efficiency classes
by: Goman, V.V., et al.
Published: (2021)
by: Goman, V.V., et al.
Published: (2021)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Electromechanical guidance system based on a fuzzy proportional-plus-differential position controller
by: Paranchuk, Ya. S., et al.
Published: (2021)
by: Paranchuk, Ya. S., et al.
Published: (2021)
Criteria Conceived Commutative Hypercomplex Number Systems Direct Sum of Low-Dimensional Systems
by: Kalinovsky, J. А.
Published: (2012)
by: Kalinovsky, J. А.
Published: (2012)
Solution of the Block System with Numerical Elements in the Matlab Environment
by: Семчишин, Ліда Михайлівна, et al.
Published: (2019)
by: Семчишин, Ліда Михайлівна, et al.
Published: (2019)
Gram matrices and Stirling numbers of a class of diagram algebras, II
by: Karimilla Bi, N., et al.
Published: (2018)
by: Karimilla Bi, N., et al.
Published: (2018)
Gram matrices and Stirling numbers of a class of diagram algebras, I
by: Karimilla Bi, N., et al.
Published: (2018)
by: Karimilla Bi, N., et al.
Published: (2018)
There isn’t much duality in radical theory
by: Gardner, B. J.
Published: (2018)
by: Gardner, B. J.
Published: (2018)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Cyclicity of Control Operations on an Arbitrary Modulus
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Construction of High-Dimensional Isomorphic Hypercomplex Number Systems
by: Боярінова, Ю. Є., et al.
Published: (2012)
by: Боярінова, Ю. Є., et al.
Published: (2012)
Investigation of properties of generalized hyper-number systems of the fourth order found with help of the Grassmann-Clifford doubling procedure
by: Kalinovsky, J. A., et al.
Published: (2016)
by: Kalinovsky, J. A., et al.
Published: (2016)
Similar Items
-
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Colour class domination numbers of some classes of graphs
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018) -
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)