Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
The use of block cryptographic transformation by using the number system in residual classes for the tasks of providing privacy of information objects of the automated systems is offered.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Матов, О. Я., Василенко, В. С., Василенко, М. Ю. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/311901 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Implicit linear difference equation over residue class rings
by: Heneralov, Mykola V., et al.
Published: (2024)
by: Heneralov, Mykola V., et al.
Published: (2024)
Recursive method for constructing linear convolution algorithms of various lengths using hypercomplex number systems.
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
Structure of an algoritsm for quick two-dimensional convolution by means of isomorphing hypercomplex numerical systems
by: Kalinovsky, Ya. A., et al.
Published: (2018)
by: Kalinovsky, Ya. A., et al.
Published: (2018)
Methods for visualization of classes and interconnections of object-relational database Caché
by: Gaidarzhy, V. I., et al.
Published: (2017)
by: Gaidarzhy, V. I., et al.
Published: (2017)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Influence of the residual anomaly features on the detail of 2D density models
by: Kozlenko, M. V., et al.
Published: (2022)
by: Kozlenko, M. V., et al.
Published: (2022)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
Generalized analysis of matrix representations for associative hypercomplex number systems used in power engineering
by: Klipkov, S. I.
Published: (2014)
by: Klipkov, S. I.
Published: (2014)
Kinetics of thermolisis and burning of solid biofuel particles. Part 3. Burning out rate of cokeash residue of wood and straw pellets
by: Zhovmir, M.
Published: (2016)
by: Zhovmir, M.
Published: (2016)
Development of geographic information systems as a technological innovation strategy
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
A method of selecting hyper complex numbers systems for modeling digital reversible filters
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
KINETICS OF THERMOLYSIS AND BURNING OF SOLID BIOFUEL PARTICLES. PART 4. INFLUENCE OF PELLETS ANISOTROPY ON OXIDATION RATE OF CARBON FROM COKEASH RESIDUE IN AXIAL AND RADIAL DIRECTIONS
by: Zhovmir, M.
Published: (2017)
by: Zhovmir, M.
Published: (2017)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
The majority classes’ reducing method of imbalanced datasets
by: Kavrin, D. A., et al.
Published: (2018)
by: Kavrin, D. A., et al.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Reproducing of the humidity curve of power transformers oil using adaptive neuro-fuzzy systems
by: Vasilevskij, V.V., et al.
Published: (2021)
by: Vasilevskij, V.V., et al.
Published: (2021)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Modeling the precipitation kinetics in systems with strong heterophase fluctuations
by: Turkin, A.A., et al.
Published: (2007)
by: Turkin, A.A., et al.
Published: (2007)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Construction of High-Dimensional Isomorphic Hypercomplex Number Systems
by: Боярінова, Ю. Є., et al.
Published: (2012)
by: Боярінова, Ю. Є., et al.
Published: (2012)
Criteria Conceived Commutative Hypercomplex Number Systems Direct Sum of Low-Dimensional Systems
by: Kalinovsky, J. А.
Published: (2012)
by: Kalinovsky, J. А.
Published: (2012)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Method of hypercomplex numbers systems generation for modeling digital reversible filters of 4th order
by: Kalinovsky, Ya. A., et al.
Published: (2019)
by: Kalinovsky, Ya. A., et al.
Published: (2019)
Application of non-canonical hypercomplex numerical systems to optimize total parametric sensitivity of reversible digital filters
by: Kalinovsky, Ya. O., et al.
Published: (2014)
by: Kalinovsky, Ya. O., et al.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Isomorphism of Commutative Hypercomplex Number Systems and Representations of Exponential Functions in Them
by: Каліновський, Я. О., et al.
Published: (2012)
by: Каліновський, Я. О., et al.
Published: (2012)
Density of states of interacting two-level systems in amorphous solids in the mean random field approximation
by: Borisenko, A.A.
Published: (2007)
by: Borisenko, A.A.
Published: (2007)
Similar Items
-
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)