Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | O. M. Yunak, B. M. Strykhaliuk, O. P. Yunak |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Artificial intelligence |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001186949 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Improved Decoding Algorithms for Convolutional Codes
by: K. P. Sosnenko
Published: (2024)
by: K. P. Sosnenko
Published: (2024)
Factorization algorithm for band nonsymmetric matrix factorization on the computers with graphic accelararors
by: Yu. Baranov
Published: (2015)
by: Yu. Baranov
Published: (2015)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Neural network modeling of graphic recognition processes
by: Ye. M. Chichirin, et al.
Published: (2019)
by: Ye. M. Chichirin, et al.
Published: (2019)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Analysis and Modification of Graphic data Compression Algorithms
by: M. K. Bouza
Published: (2020)
by: M. K. Bouza
Published: (2020)
Regularization of the transformation matrix of r-algorithm
by: N. G. Zhurbenko, et al.
Published: (2018)
by: N. G. Zhurbenko, et al.
Published: (2018)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
Prediction of side effects of polypragmation using a graphical neural network
by: V. P. Kuznyak, et al.
Published: (2024)
by: V. P. Kuznyak, et al.
Published: (2024)
Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
by: O. H. Kachko, et al.
Published: (2017)
by: O. H. Kachko, et al.
Published: (2017)
The right to protection against unfair use of the means of individualization: content and features
by: A. O. Pekar
Published: (2020)
by: A. O. Pekar
Published: (2020)
Algorithm for automatic loop parallelization for graphics processing units
by: Yu. Doroshenko, et al.
Published: (2017)
by: Yu. Doroshenko, et al.
Published: (2017)
Algorithm for automatic loop parallelization for graphics processing units
by: Doroshenko, А.Yu., et al.
Published: (2018)
by: Doroshenko, А.Yu., et al.
Published: (2018)
Decoder for quadrature Interference Signals
by: Kosyak, I. V.
Published: (2013)
by: Kosyak, I. V.
Published: (2013)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Algorithm for automatic loop parallelization for graphics processing units
by: Doroshenko, A.Yu., et al.
Published: (2018)
by: Doroshenko, A.Yu., et al.
Published: (2018)
Algorithm for automatic loop parallelization for graphics processing units
by: I. Z. Ashur, et al.
Published: (2018)
by: I. Z. Ashur, et al.
Published: (2018)
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)
by: O. A. Niemkova
Published: (2013)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: D. Zhuravlev
Published: (2015)
by: D. Zhuravlev
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, D.
Published: (2015)
by: Zhuravlev, D.
Published: (2015)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
Antagonistic activity of soil microorganisms as an effective means of plant protection against acremoniosis
by: H. V. Tsekhmister, et al.
Published: (2019)
by: H. V. Tsekhmister, et al.
Published: (2019)
Generation of the generic flowchart of transformation, decoding and thematic interpretation of remote sensing data for geologic objectives solving
by: O. T. Azimov
Published: (2011)
by: O. T. Azimov
Published: (2011)
Graphical means of highlighting the most meaningful stories in the Laurentian chronicle
by: V. Blokhina, et al.
Published: (2023)
by: V. Blokhina, et al.
Published: (2023)
Approximation of double Walsh–Fourier series by means of the matrix transform
by: I. Blahota
Published: (2024)
by: I. Blahota
Published: (2024)
Approximation of double Walsh–Fourier series by means of the matrix transform
by: Blahota, István, et al.
Published: (2024)
by: Blahota, István, et al.
Published: (2024)
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Automated generation of parallel programs for graphics processing units based on algorithm schemes
by: Doroshenko, А.Yu., et al.
Published: (2017)
by: Doroshenko, А.Yu., et al.
Published: (2017)
Reconfigurable the Viterbi decoder on the basis of FPGA Xilinx
by: E. N. Chichirin
Published: (2015)
by: E. N. Chichirin
Published: (2015)
Comparative analysis of construction of the decoder of the convolution code
by: E. P. Sosnenko
Published: (2015)
by: E. P. Sosnenko
Published: (2015)
Protection against unfair competition: regulatory and information aspects
by: Ye. V. Yevtushenko, et al.
Published: (2018)
by: Ye. V. Yevtushenko, et al.
Published: (2018)
Graphics of the prominent figures of the book culture as a mean of book knowledge updating
by: V. I. Vasilev, et al.
Published: (2014)
by: V. I. Vasilev, et al.
Published: (2014)
Phoneme Recognition Output Post-Processing for Word Sequences Decoding
by: M. Sazhok
Published: (2015)
by: M. Sazhok
Published: (2015)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Similar Items
-
Improved Decoding Algorithms for Convolutional Codes
by: K. P. Sosnenko
Published: (2024) -
Factorization algorithm for band nonsymmetric matrix factorization on the computers with graphic accelararors
by: Yu. Baranov
Published: (2015) -
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019) -
Neural network modeling of graphic recognition processes
by: Ye. M. Chichirin, et al.
Published: (2019) -
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)