Secure and practical randomized stream ciphers based on Reed–Solomon codes
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | A. N. Aleksejchuk, S. V. Grishakov |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000670416 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: V. Ustimenko, et al.
Published: (2023)
by: V. Ustimenko, et al.
Published: (2023)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023)
by: Ustimenko, Vasyl O., et al.
Published: (2023)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
Professor Solomon Isaakovich Pekar
by: V. A. Kochelap
Published: (2018)
by: V. A. Kochelap
Published: (2018)
Practical Estimates of Block Cipher New Standards Modifications Resistance to Integer Differencial Cryptanalisys
by: L. V. Kovalchuk, et al.
Published: (2017)
by: L. V. Kovalchuk, et al.
Published: (2017)
Solomon Beim and nationalism of Crimean Karaites
by: M. M. Martyn
Published: (2020)
by: M. M. Martyn
Published: (2020)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Analysis of chromosome number and speculations on the origin of Arundo donax L. (Giant Reed)
by: A. Bucci, et al.
Published: (2013)
by: A. Bucci, et al.
Published: (2013)
Solomon P. Wasser (on the 70th anniversary of his birth)
by: I. O. Dudka, et al.
Published: (2016)
by: I. O. Dudka, et al.
Published: (2016)
Solomon Pavlovych Wasser (to the 60th Anniversary of His Birth)
by: K. M. Sytnyk, et al.
Published: (2006)
by: K. M. Sytnyk, et al.
Published: (2006)
Professor Solomon Isaakovich Pekar. To the 100th anniversary of his birthday
by: Kochelap, V.A.
Published: (2018)
by: Kochelap, V.A.
Published: (2018)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: Ustimenko, V.A.
Published: (2014)
by: Ustimenko, V.A.
Published: (2014)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: V. A. Ustimenko
Published: (2014)
by: V. A. Ustimenko
Published: (2014)
The Image of Fool in the "Dialogues between Solomon and Marcolf”: profanation or carnivalization?
by: H. O. Pastushuk
Published: (2011)
by: H. O. Pastushuk
Published: (2011)
Morphometric parameters of common reed (Phragmites australis (Cav.) Trin. ex Steud.) in the flood-littoral ecosystems of the lower Danube river
by: T. V. Dvoretskyi, et al.
Published: (2020)
by: T. V. Dvoretskyi, et al.
Published: (2020)
Investigation of the effectiveness of deterministic and pseudo-random interleavers of turbo codes
by: V. M. Vasylenko
Published: (2018)
by: V. M. Vasylenko
Published: (2018)
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)
by: O. A. Niemkova
Published: (2013)
A lightweight Symmetric Block Cipher "Cypress" – Description and the Main Properties
by: Yu. Rodinko
Published: (2017)
by: Yu. Rodinko
Published: (2017)
Upper bounds of maximum values of average differential and linear characteristic probabilities of feistel cipher with adder modulo 2^m
by: Alekseychuk, A., et al.
Published: (2006)
by: Alekseychuk, A., et al.
Published: (2006)
Bacillariophyta of the lower stream of the lower stream of the river Southern Bug (Ukraine)
by: O. S. Tarashchuk
Published: (2004)
by: O. S. Tarashchuk
Published: (2004)
modelling of autonomous navigation for an unmanned aerial vehicle based on video stream
by: D. V. Voloshin
Published: (2016)
by: D. V. Voloshin
Published: (2016)
Cognitive base as a core of cultural code
by: A. S. Synytsia
Published: (2017)
by: A. S. Synytsia
Published: (2017)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Two-stream nonlinear langmuir oscillations
by: Azarenkov, N.A., et al.
Published: (2023)
by: Azarenkov, N.A., et al.
Published: (2023)
Elements of nonlinear analysis of information streams.
by: A. N. Grajvoronskaja, et al.
Published: (2017)
by: A. N. Grajvoronskaja, et al.
Published: (2017)
Surface modification of Nd-Fe-B based materials with pulsed helium plasma streams
by: Bovda, A., et al.
Published: (2005)
by: Bovda, A., et al.
Published: (2005)
Online Medical Data Stream Mining Based on Adaptive Neuro-Fuzzy Approaches
by: I. G. Perova, et al.
Published: (2019)
by: I. G. Perova, et al.
Published: (2019)
Semisimple group codes and dihedral codes
by: Dutra, Flaviana S., et al.
Published: (2018)
by: Dutra, Flaviana S., et al.
Published: (2018)
Elements of nonlinear analysis of information streams
by: Lande, D. V., et al.
Published: (2017)
by: Lande, D. V., et al.
Published: (2017)
Generation of the magnetic field in the compressible plasma streams
by: Kozlov, A.N.
Published: (2008)
by: Kozlov, A.N.
Published: (2008)
Risks to Ukraine's energy security through the prism of Nord Stream 2 gas pipeline project
by: E. Morhunova
Published: (2021)
by: E. Morhunova
Published: (2021)
Shock alloying of metals by cumulative plasma streams
by: Ivanov, L.I., et al.
Published: (2006)
by: Ivanov, L.I., et al.
Published: (2006)
Output stream of a binding neuron
by: Vidybida, A. K., et al.
Published: (2007)
by: Vidybida, A. K., et al.
Published: (2007)
Assessment of spent batteries streams in Ukraine
by: V. Ishchenko
Published: (2021)
by: V. Ishchenko
Published: (2021)
Sodification of social securiti sphere: international practices
by: M. M. Shumylo
Published: (2017)
by: M. M. Shumylo
Published: (2017)
Modelling of gas - laser streams at creation of the equ
by: V. P. Likhoshva, et al.
Published: (2009)
by: V. P. Likhoshva, et al.
Published: (2009)
Synthesis of neural-like networks based on the conversion of cyclic Hamming codes
by: V. N. Opanasenko, et al.
Published: (2017)
by: V. N. Opanasenko, et al.
Published: (2017)
Features of the objective side of the crime of negligence (Article 367 of the Criminal Code) in terms of judicial practice
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
Similar Items
-
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016) -
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019) -
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: V. Ustimenko, et al.
Published: (2023) -
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023) -
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)