A combined data encryption method with identification of their sender
Information security is a particularly important factor as new information technologies are widely introduced, various kinds of branched information and computer systems. Encryption is an effective method of protecting information from unauthorized access when it is transmitted over open communicati...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Волошко, А. В., Лутчин , Т. М. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/235158 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Decision tree method for identification and classification of information signals
by: Волошко, А. В., et al.
Published: (2022)
by: Волошко, А. В., et al.
Published: (2022)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Functionally oriented model of adaptive short-term forecasting of electrical load
by: Voloshko, A. V., et al.
Published: (2016)
by: Voloshko, A. V., et al.
Published: (2016)
Automated method for determination of geological horizons nonconformity according to three-dimensional seismic data
by: Gryn’, D. M.
Published: (2019)
by: Gryn’, D. M.
Published: (2019)
Forecast of time series using their segmentation based on wavelet analysis of scalogram
by: Voloshko, A. V., et al.
Published: (2016)
by: Voloshko, A. V., et al.
Published: (2016)
PROPERTY STUDY OF OJ 287 AND BL LAC VARIABILITY IN OPTICALAND RADIO RANGES
by: Sukharev, A. L., et al.
Published: (2019)
by: Sukharev, A. L., et al.
Published: (2019)
Application of wavelet analysis for updating Heinrich events age
by: Danova, T.E., et al.
Published: (2015)
by: Danova, T.E., et al.
Published: (2015)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
A sender in child's book as literary-publishing communication
by: E. Ohar
Published: (2014)
by: E. Ohar
Published: (2014)
Modified method of searching keywords and keyterms in text data
by: Bukhalenkov, D.O., et al.
Published: (2024)
by: Bukhalenkov, D.O., et al.
Published: (2024)
Analyis of periodical variability of insolation and soil temperature in the Crimea
by: Volvach, A. E., et al.
Published: (2019)
by: Volvach, A. E., et al.
Published: (2019)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Wavelet packet analysis for rotor bar breakage in an inverter induction motor
by: Abu Ibaid, O. Z. I., et al.
Published: (2023)
by: Abu Ibaid, O. Z. I., et al.
Published: (2023)
CATALOG OF VARIABILITY PERIODS OF EXTRAGALACTIC RADIO SOURCES AT CENTIMETER WAVELENGTHS
by: Ryabov, M. I., et al.
Published: (2016)
by: Ryabov, M. I., et al.
Published: (2016)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Algorithms of correlation methods for comprehensive interpretation of gravimetric and seismic data
by: Isgandarov, Elkhan
Published: (2025)
by: Isgandarov, Elkhan
Published: (2025)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
A method of adaptive binarization of halftone images with additional processing on use of signal-to-noise ratio
by: Egorov, P. M., et al.
Published: (2020)
by: Egorov, P. M., et al.
Published: (2020)
From Triple Bottom Line Logic to ESG Operationalisation: Developing a Sustainable Business Model Framework for the Construction Sector
by: Butkevics , Janis
Published: (2026)
by: Butkevics , Janis
Published: (2026)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Photovoltaic system faults detection using fractional multiresolution signal decomposition
by: Lanani, A., et al.
Published: (2024)
by: Lanani, A., et al.
Published: (2024)
PREDOMINANT TRAVELING IONOSPHERIC DISTURBANCES OVER EASTERN EUROPE DURING LOW LEVELS OF SOLAR AND GEOMAGNETIC ACTIVITIES USING INCOHERENT SCATTER RADAR DATA
by: Aksonova, K. D., et al.
Published: (2020)
by: Aksonova, K. D., et al.
Published: (2020)
Separation of data sources and extraction of target components of the electrophysiological time series on the example of fetal ECG
by: Білобородова, Т. О., et al.
Published: (2023)
by: Білобородова, Т. О., et al.
Published: (2023)
UNBALANCED LOAD FLOW WITH HYBRID WAVELET TRANSFORM AND SUPPORT VECTOR MACHINE BASED ERROR-CORRECTING OUTPUT CODES FOR POWER QUALITY DISTURBANCES CLASSIFICATION INCLUDING WIND ENERGY
by: Rahmani, Ala eddine, et al.
Published: (2019)
by: Rahmani, Ala eddine, et al.
Published: (2019)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Identification of the native language of a person
by: Lazorenko, Yа.S., et al.
Published: (2023)
by: Lazorenko, Yа.S., et al.
Published: (2023)
An analysis of ways to improve the speed performance of algorithms for combining images in a combined correlation-extremal navigation systems of aircrafts
by: Mezentsev, A. V., et al.
Published: (2017)
by: Mezentsev, A. V., et al.
Published: (2017)
Research specialties’ kinship level identification based on data from Dimensions
by: Shtovba, S.D., et al.
Published: (2024)
by: Shtovba, S.D., et al.
Published: (2024)
Similar Items
-
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021) -
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)