Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | O. H. Kachko, L. V. Makutonina, O. S. Akolzina |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Technical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813788 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
"Human Potential" and "Human Capital": Similarities and Differences
by: T. S. Vakarchuk
Published: (2013)
by: T. S. Vakarchuk
Published: (2013)
Asymmetric of the Characteristics of "Decent Work" Within the Aspects of Regional Human Development
by: M. V. Otkydach
Published: (2020)
by: M. V. Otkydach
Published: (2020)
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020)
by: O. M. Yunak, et al.
Published: (2020)
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)
by: O. A. Niemkova
Published: (2013)
Оптимізація NTRU подібного алгоритму для несиметричного шифрування з «незручними параметрами»
by: Качко, Олена Григорівна, et al.
Published: (2017)
by: Качко, Олена Григорівна, et al.
Published: (2017)
Оптимізація NTRU подібного алгоритму для несиметричного шифрування з "незручними параметрами"
by: Качко, О.Г., et al.
Published: (2017)
by: Качко, О.Г., et al.
Published: (2017)
Algorithm of similarity theory in plant introduction and breeding
by: P. E. Bulakh
Published: (2002)
by: P. E. Bulakh
Published: (2002)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Increasing convergence rate of "Progressive Hedging" decomposition algorithm
by: V. V. Bojko, et al.
Published: (2018)
by: V. V. Bojko, et al.
Published: (2018)
Statistical forecasting of solar radiation based on satellite images. The "displace" algorithm
by: O. V. Ushkalenko, et al.
Published: (2014)
by: O. V. Ushkalenko, et al.
Published: (2014)
Typological Similarity of the Main Characters' behaviour in the novels by J. Fowles "The Collector” and P. Sьskind "Das Parfum”
by: S. V. Isaienko
Published: (2002)
by: S. V. Isaienko
Published: (2002)
Parallel algorithm for search and identification of similar information structures
by: A. P. Sergeev
Published: (2015)
by: A. P. Sergeev
Published: (2015)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Optimizing the Content of the Abstract Database "Ukrayinika Naukova"
by: S. E. Kyrylenko
Published: (2019)
by: S. E. Kyrylenko
Published: (2019)
Obtaining the enoxaparin sodium substance equivalent to the original Clexane® and Lovenox®. the selection of technological parameters and optimization of the "greenness" of the purification stage
by: Y. V. Bovsunovska, et al.
Published: (2023)
by: Y. V. Bovsunovska, et al.
Published: (2023)
Polynomial algorithms of joint discrimination of signals and estimation of their parameters against a background of asymmetrical non-gaussian interferences
by: V. V. Palagin, et al.
Published: (2014)
by: V. V. Palagin, et al.
Published: (2014)
Algorithm of optimization technological parameters of bimetallic casting manufacturing
by: E. G. Aftandiljants, et al.
Published: (2015)
by: E. G. Aftandiljants, et al.
Published: (2015)
"Fuzzy" estimating of the in-flight geometric calibration parameters
by: A. I. Tkachenko
Published: (2019)
by: A. I. Tkachenko
Published: (2019)
"Rejuvenating" effect of phytocomposition "Balm Truskavets" and accompanying change in the parameters of neuroendocrine regulation and gaz disharge visualization
by: H. I. Dubkova, et al.
Published: (2012)
by: H. I. Dubkova, et al.
Published: (2012)
Analysis of the asymmetrically rolling parameters of titanium powder
by: Ju. Prikhodko, et al.
Published: (2015)
by: Ju. Prikhodko, et al.
Published: (2015)
Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
by: A. N. Aleksejchuk, et al.
Published: (2021)
by: A. N. Aleksejchuk, et al.
Published: (2021)
Modeling of optimum influence of parameters of an intellectual system "tar-polystyrene"
by: O. I. Povzun, et al.
Published: (2015)
by: O. I. Povzun, et al.
Published: (2015)
In the Toils of Statistical "Similarities". The Review of the Paper by Yu. V. Dolzhenko and V. V. Tkach "Two Burials of Globular Amphora Culture at Zabolottia 3 Natural Boundary (Archaeological and Anthropological Aspects)", Eminak, 2021, 2
by: I. D. Potiekhina, et al.
Published: (2021)
by: I. D. Potiekhina, et al.
Published: (2021)
Criteria of Similarity of Dynamic Problems of Combinatorial Optimization
by: Тимофієва, Надія Костянтинівна
Published: (2019)
by: Тимофієва, Надія Костянтинівна
Published: (2019)
Criteria of Similarity of Dynamic Problems of Combinatorial Optimization
by: N. K. Tymofiieva
Published: (2019)
by: N. K. Tymofiieva
Published: (2019)
About an optimal control for a "predator-prey" system
by: S. V. Pashko
Published: (2020)
by: S. V. Pashko
Published: (2020)
About activities of PA "Pivdenmash" and DO "Pivdenne"
by: O. H. Luhovskyi
Published: (2014)
by: O. H. Luhovskyi
Published: (2014)
The Categorical Parameters of "Health Care Services" in the Global Space
by: Yu. Povoroznyk
Published: (2016)
by: Yu. Povoroznyk
Published: (2016)
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Mathematical Modelling System Optimization "Tar-Polymer-Wood Hydrolytic Lignin"
by: O. I. Povzun, et al.
Published: (2014)
by: O. I. Povzun, et al.
Published: (2014)
Notes on the relationship between the concepts of "ecosystem", "habitat", "biotope", "ecotope"
by: Ya. P. Didukh, et al.
Published: (2010)
by: Ya. P. Didukh, et al.
Published: (2010)
The Ways to Optimize Costs of Enterprise on the Example of PJSC "Ukrainian Railways"
by: I. V. Nahorna, et al.
Published: (2020)
by: I. V. Nahorna, et al.
Published: (2020)
Similar Items
-
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019) -
"Human Potential" and "Human Capital": Similarities and Differences
by: T. S. Vakarchuk
Published: (2013) -
Asymmetric of the Characteristics of "Decent Work" Within the Aspects of Regional Human Development
by: M. V. Otkydach
Published: (2020) -
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020) -
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)