Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Ya., Vаsylenko, V. S., Vаsylenko, M. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105249 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)