Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.
Saved in:
Date: | 2012 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | Ukrainian |
Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
Subjects: | |
Online Access: | http://drsp.ipri.kiev.ua/article/view/105249 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Journal Title: | Data Recording, Storage & Processing |