Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
For the tasks of ensuring confidentiality of the information objects of automated systems it has been considered the approaches to the evaluation of cryptographic resistance of proposed cryptographic transformations through the use of residual classes. Fig.: 2. Refs: 5 titles.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Mаtоv, О. Ya., Vаsylenko, V. S., Vаsylenko, M. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/105249 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
A genetic method for solving the problem on educational classes scheduling
by: Федорченко, Є. М., et al.
Published: (2024)
by: Федорченко, Є. М., et al.
Published: (2024)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
EVALUATION OF POWER TRANSFORMER INSULATION RESIDUAL LIFE BASED ON ITS INDIVIDUAL LIFE CYCLE CHARACTERISTICS
by: Poliakov, M. A., et al.
Published: (2014)
by: Poliakov, M. A., et al.
Published: (2014)
Recurrent-and-Parallel GMDH Algorithms for High-Performance Computing
by: Stepashko, V.S., et al.
Published: (2019)
by: Stepashko, V.S., et al.
Published: (2019)
Аналіз систем підтримки розумного будинку
by: Глибовець, А.М., et al.
Published: (2019)
by: Глибовець, А.М., et al.
Published: (2019)
Automatic Speech Recognition For Ukrainian Broadcast Media Transcribing
by: Sazhok, M.M., et al.
Published: (2019)
by: Sazhok, M.M., et al.
Published: (2019)
On Stone sublattices of the lattice of totally local Fitting classes
by: Skiba, Alexander N., et al.
Published: (2018)
by: Skiba, Alexander N., et al.
Published: (2018)
AdvisOnt: Семантизація сервісів агродорадництва для валідації результатів неформального та інформального навчання. I
by: Строкань, О.В., et al.
Published: (2021)
by: Строкань, О.В., et al.
Published: (2021)
AdvisOnt: Семантизація сервісів агродорадництва для валідації результатів неформального та інформального навчання. II
by: Строкань, О.В., et al.
Published: (2021)
by: Строкань, О.В., et al.
Published: (2021)
Reproducing of the humidity curve of power transformers oil using adaptive neuro-fuzzy systems
by: Vasilevskij, V.V., et al.
Published: (2021)
by: Vasilevskij, V.V., et al.
Published: (2021)
Integer Norm for Difference Assessment of the Frame Elements Considering the White Balance
by: Ivashchenko, M.V., et al.
Published: (2019)
by: Ivashchenko, M.V., et al.
Published: (2019)
Технологія акустичного моніторингу, виявлення та локалізації об’єктів у контрольованому просторі
by: Волков, О.Є., et al.
Published: (2020)
by: Волков, О.Є., et al.
Published: (2020)
Development of a Digital Twin of The Technological Process of Consumable Pattern Casting Using Production Data
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
The Digital Twin and Optimization of Cast Metal Structures in Additive Manufacturing
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Reactive Programming Paradigm for Development User Intrfaces
by: Bulgakova, O.S., et al.
Published: (2019)
by: Bulgakova, O.S., et al.
Published: (2019)
The Examples of Digitalization of Foundry Production: Virtual Engineering, Digital Twin, Additive Technologies
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Метод виявлення іменних груп в україномовних текстах
by: Погорілий, С.Д., et al.
Published: (2019)
by: Погорілий, С.Д., et al.
Published: (2019)
Ontology Application to Construct Inductive Modeling Tools with Intelligent Interface
by: Pidnebesna, H.A., et al.
Published: (2020)
by: Pidnebesna, H.A., et al.
Published: (2020)
Information Technology of Video Data Processing for Traffic Intensity Monitoring
by: Stelmakh, O.P., et al.
Published: (2020)
by: Stelmakh, O.P., et al.
Published: (2020)
Similar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)