Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Ya., Vаsylenko, V. S., Vаsylenko, M. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105249 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
A genetic method for solving the problem on educational classes scheduling
by: Федорченко, Є. М., et al.
Published: (2024)
by: Федорченко, Є. М., et al.
Published: (2024)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
On Stone sublattices of the lattice of totally local Fitting classes
by: Skiba, Alexander N., et al.
Published: (2018)
by: Skiba, Alexander N., et al.
Published: (2018)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Аналіз систем підтримки розумного будинку
by: Глибовець, А.М., et al.
Published: (2019)
by: Глибовець, А.М., et al.
Published: (2019)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Recurrent-and-Parallel GMDH Algorithms for High-Performance Computing
by: Stepashko, V.S., et al.
Published: (2019)
by: Stepashko, V.S., et al.
Published: (2019)
Метод виявлення іменних груп в україномовних текстах
by: Погорілий, С.Д., et al.
Published: (2019)
by: Погорілий, С.Д., et al.
Published: (2019)
EVALUATION OF POWER TRANSFORMER INSULATION RESIDUAL LIFE BASED ON ITS INDIVIDUAL LIFE CYCLE CHARACTERISTICS
by: Poliakov, M. A., et al.
Published: (2014)
by: Poliakov, M. A., et al.
Published: (2014)
Automatic Speech Recognition For Ukrainian Broadcast Media Transcribing
by: Sazhok, M.M., et al.
Published: (2019)
by: Sazhok, M.M., et al.
Published: (2019)
Integer Norm for Difference Assessment of the Frame Elements Considering the White Balance
by: Ivashchenko, M.V., et al.
Published: (2019)
by: Ivashchenko, M.V., et al.
Published: (2019)
Algorithm for Transforming Representations of Numbers in Systems of Residual Classes
by: Ju. D. Polisskij
Published: (2020)
by: Ju. D. Polisskij
Published: (2020)
"Розумний" цех в структурі розумного підприємства
by: Лещенко, В.А., et al.
Published: (2020)
by: Лещенко, В.А., et al.
Published: (2020)
Development of a Digital Twin of The Technological Process of Consumable Pattern Casting Using Production Data
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
The Digital Twin and Optimization of Cast Metal Structures in Additive Manufacturing
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Цифрова бізнес-модель промислового підприємства виробів
by: Музальова, В.О., et al.
Published: (2021)
by: Музальова, В.О., et al.
Published: (2021)
Криптосемантична система захисту текстової інформації
by: Одарченко, Р.С., et al.
Published: (2020)
by: Одарченко, Р.С., et al.
Published: (2020)
Ontology Application to Construct Inductive Modeling Tools with Intelligent Interface
by: Pidnebesna, H.A., et al.
Published: (2020)
by: Pidnebesna, H.A., et al.
Published: (2020)
The Tools for Intelligent Data Analysis, Modeling and Forecasting Of Social and Economic Processes
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
"Розумне" підприємство – основні властивості та напрямки розвитку
by: Мейтус, В.Ю., et al.
Published: (2020)
by: Мейтус, В.Ю., et al.
Published: (2020)
Reproducing of the humidity curve of power transformers oil using adaptive neuro-fuzzy systems
by: Vasilevskij, V.V., et al.
Published: (2021)
by: Vasilevskij, V.V., et al.
Published: (2021)
Similar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)