Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes

For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.

Saved in:
Bibliographic Details
Date:2012
Main Authors: Mаtоv, О. Ya., Vаsylenko, V. S., Vаsylenko, M. Yu.
Format: Article
Language:Ukrainian
Published: Інститут проблем реєстрації інформації НАН України 2012
Subjects:
Online Access:http://drsp.ipri.kiev.ua/article/view/105249
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Data Recording, Storage & Processing

Institution

Data Recording, Storage & Processing