Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
The use of block cryptographic transformation by using the number system in residual classes for the tasks of providing privacy of information objects of the automated systems is offered.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Матов, О. Я., Василенко, В. С., Василенко, М. Ю. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/311901 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
Colour class domination numbers of some classes of graphs
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
by: Venkatakrishnan, Yanamandram B., et al.
Published: (2018)
Twisted conjugacy classes of Automorphisms of Baumslag-Solitar groups
by: Fel’shtyn, Alexander, et al.
Published: (2018)
by: Fel’shtyn, Alexander, et al.
Published: (2018)
Recursive method for constructing linear convolution algorithms of various lengths using hypercomplex number systems.
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
Construction and research of operators of a Hermite interlineation of functions two variables on system of not intersected lines with preservation of differential class
by: Сергієнко, І. В., et al.
Published: (2016)
by: Сергієнко, І. В., et al.
Published: (2016)
On Stone sublattices of the lattice of totally local Fitting classes
by: Skiba, Alexander N., et al.
Published: (2018)
by: Skiba, Alexander N., et al.
Published: (2018)
Structure of an algoritsm for quick two-dimensional convolution by means of isomorphing hypercomplex numerical systems
by: Kalinovsky, Ya. A., et al.
Published: (2018)
by: Kalinovsky, Ya. A., et al.
Published: (2018)
A genetic method for solving the problem on educational classes scheduling
by: Федорченко, Є. М., et al.
Published: (2024)
by: Федорченко, Є. М., et al.
Published: (2024)
Influence of the residual anomaly features on the detail of 2D density models
by: Kozlenko, M. V., et al.
Published: (2022)
by: Kozlenko, M. V., et al.
Published: (2022)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Algorithm for Transforming Representations of Numbers in Systems of Residual Classes
by: Ju. D. Polisskij
Published: (2020)
by: Ju. D. Polisskij
Published: (2020)
Kinetics of thermolisis and burning of solid biofuel particles. Part 3. Burning out rate of cokeash residue of wood and straw pellets
by: Zhovmir, M.
Published: (2016)
by: Zhovmir, M.
Published: (2016)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
The theoretical foundations of the modified perfect form of residual classes system
by: Ja. N. Nikolajchuk, et al.
Published: (2016)
by: Ja. N. Nikolajchuk, et al.
Published: (2016)
KINETICS OF THERMOLYSIS AND BURNING OF SOLID BIOFUEL PARTICLES. PART 4. INFLUENCE OF PELLETS ANISOTROPY ON OXIDATION RATE OF CARBON FROM COKEASH RESIDUE IN AXIAL AND RADIAL DIRECTIONS
by: Zhovmir, M.
Published: (2017)
by: Zhovmir, M.
Published: (2017)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Generalized analysis of matrix representations for associative hypercomplex number systems used in power engineering
by: Klipkov, S. I.
Published: (2014)
by: Klipkov, S. I.
Published: (2014)
Constructing representations of the logarithmic function in the same class of commutative hypercomplex numerical systems of fourth dimension
by: Kalinovskiy, J. A., et al.
Published: (2016)
by: Kalinovskiy, J. A., et al.
Published: (2016)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Computing characteristics of one class of non-commutative hypercomplex number systems of 4-dimension
by: Kalinovsky, Ya. O., et al.
Published: (2014)
by: Kalinovsky, Ya. O., et al.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Transformation of pseudo-numbers of the residual class system with all even modules into the numbers of the system
by: Ju. D. Polisskij
Published: (2018)
by: Ju. D. Polisskij
Published: (2018)
A method of selecting hyper complex numbers systems for modeling digital reversible filters
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
On certain approaches to implementation of some problem operations in the residue class system
by: Ju. D. Polisskij
Published: (2017)
by: Ju. D. Polisskij
Published: (2017)
About one approach to execution of complicated operations in the system of residual classes
by: Ju. D. Polisskij
Published: (2015)
by: Ju. D. Polisskij
Published: (2015)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Camina groups with few conjugacy classes
by: Cangelmi, Leonardo, et al.
Published: (2018)
by: Cangelmi, Leonardo, et al.
Published: (2018)
Similar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)