Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | S. V. Mitin |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001152218 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Application of commutative rings with unity for construction of symmetric encryption system
by: S. L. Kryvyi
Published: (2022)
by: S. L. Kryvyi
Published: (2022)
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: Ustimenko, V.A.
Published: (2018)
by: Ustimenko, V.A.
Published: (2018)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: D. Zhuravlev
Published: (2015)
by: D. Zhuravlev
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, D.
Published: (2015)
by: Zhuravlev, D.
Published: (2015)
Adsorption of symmetric random copolymer onto symmetric random surface: the annealed case
by: Polotsky, A.A.
Published: (2015)
by: Polotsky, A.A.
Published: (2015)
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)
by: O. A. Niemkova
Published: (2013)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
AXIALLY SYMMETRIC MODES IN AN OPEN RESONATOR
by: Kuzmychov, I. K., et al.
Published: (2025)
by: Kuzmychov, I. K., et al.
Published: (2025)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020)
by: O. M. Yunak, et al.
Published: (2020)
The Calculating of the Amount of Forming Polynomials for the Nonlinear Feedback Shift Registers with Nonlinearity of Random Order
by: N. A. Polujanenko
Published: (2017)
by: N. A. Polujanenko
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
On the space of open maps of the Cantor set
by: K. M. Koporkh, et al.
Published: (2021)
by: K. M. Koporkh, et al.
Published: (2021)
Open ended axially symmetric systems. Results and perspectives
by: Burdakov, A.V., et al.
Published: (2006)
by: Burdakov, A.V., et al.
Published: (2006)
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Estimates for sums of independent random values in symmetrical spaces
by: Braverman , M. Sh., et al.
Published: (2025)
by: Braverman , M. Sh., et al.
Published: (2025)
The amount of impurity elements in diamond-containing soot and detonation nanodiamonds upon nitric acid treatment
by: Ju. Dolmatov
Published: (2018)
by: Ju. Dolmatov
Published: (2018)
Key expression as a text creating signs of the artistic discourse
by: V. Kononenko
Published: (2014)
by: V. Kononenko
Published: (2014)
Similar Items
-
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015) -
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015) -
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023) -
Application of commutative rings with unity for construction of symmetric encryption system
by: S. L. Kryvyi
Published: (2022) -
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)