Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Ya., Vаsylenko, V. S., Vаsylenko, M. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105249 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
A genetic method for solving the problem on educational classes scheduling
by: Федорченко, Є. М., et al.
Published: (2024)
by: Федорченко, Є. М., et al.
Published: (2024)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
On Stone sublattices of the lattice of totally local Fitting classes
by: Skiba, Alexander N., et al.
Published: (2018)
by: Skiba, Alexander N., et al.
Published: (2018)
EVALUATION OF POWER TRANSFORMER INSULATION RESIDUAL LIFE BASED ON ITS INDIVIDUAL LIFE CYCLE CHARACTERISTICS
by: Poliakov, M. A., et al.
Published: (2014)
by: Poliakov, M. A., et al.
Published: (2014)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Algorithm for Transforming Representations of Numbers in Systems of Residual Classes
by: Ju. D. Polisskij
Published: (2020)
by: Ju. D. Polisskij
Published: (2020)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Camina groups with few conjugacy classes
by: Cangelmi, Leonardo, et al.
Published: (2018)
by: Cangelmi, Leonardo, et al.
Published: (2018)
Colour class domination numbers of some classes of graphs
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
Groups of nilpotency class \(2\) of order \(p^4\) as additive groups of local nearrings
by: Raievska, Iryna, et al.
Published: (2024)
by: Raievska, Iryna, et al.
Published: (2024)
Analysis of the influence of load inductance on nonlinear distortions of a class D amplifier caused by «dead time»
by: Naida, S. A., et al.
Published: (2021)
by: Naida, S. A., et al.
Published: (2021)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Формування ?-SiC на поверхні por-Si/mono-Si за механізмом Странського – Крастанова
by: Suchikova, Y. O., et al.
Published: (2022)
by: Suchikova, Y. O., et al.
Published: (2022)
Reproducing of the humidity curve of power transformers oil using adaptive neuro-fuzzy systems
by: Vasilevskij, V.V., et al.
Published: (2021)
by: Vasilevskij, V.V., et al.
Published: (2021)
Transformation of pseudo-numbers of the residual class system with all even modules into the numbers of the system
by: Ju. D. Polisskij
Published: (2018)
by: Ju. D. Polisskij
Published: (2018)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Building and research of operator approximation of functions of two variables with preservation of class Cr(R2) for traces of derivatives to a fixed order in the specified line
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Building and research of operator approximation of functions of two variables with preservation of class Cr(R2) for traces of derivatives to a fixed order in the specified line
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of an interlineation of functions of three variables on system of not intersected curves in a cylindrical frame with preservation of a class of differentiability
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of an interlineation of functions of three variables on system of not intersected curves in a cylindrical frame with preservation of a class of differentiability
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Class structure of electromechanical energy converter models with UML-diagrams application
by: Pliugin, V. E.
Published: (2014)
by: Pliugin, V. E.
Published: (2014)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
On inverse subsemigroups of the semigroup of orientation-preserving or orientation-reversing transformations
by: Catarino, Paula, et al.
Published: (2015)
by: Catarino, Paula, et al.
Published: (2015)
Twisted conjugacy classes of Automorphisms of Baumslag-Solitar groups
by: Fel’shtyn, Alexander, et al.
Published: (2018)
by: Fel’shtyn, Alexander, et al.
Published: (2018)
Similar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)