Code-based Cryptosystem for Post-quantum Application
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | O. O. Kuznetsov, A. I. Pushkarov, Yu. I. Horbenko |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Technical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813793 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: Ustimenko, V.A.
Published: (2018)
by: Ustimenko, V.A.
Published: (2018)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
QUANTUM-CHEMICAL CALCULATIONS OF CURCUMIN AND SOME METAL COMPLEXES BASED ON IT
by: Horbenko , Artur, et al.
Published: (2025)
by: Horbenko , Artur, et al.
Published: (2025)
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017)
by: O. S. Pustovit, et al.
Published: (2017)
Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
by: A. N. Aleksejchuk, et al.
Published: (2021)
by: A. N. Aleksejchuk, et al.
Published: (2021)
Application of Multi-Delimiter Codes to Natural Language Text Archiving
by: A. V. Anisimov, et al.
Published: (2020)
by: A. V. Anisimov, et al.
Published: (2020)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Small Business development in the applicable tax code
by: L. І. Novik, et al.
Published: (2014)
by: L. І. Novik, et al.
Published: (2014)
Requirements and Security Models for Post-quantum Cryptography Analysis
by: O. V. Potii, et al.
Published: (2017)
by: O. V. Potii, et al.
Published: (2017)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Application of nest code for comparative economic evaluation of energy systems
by: Ju. G. Kutsan, et al.
Published: (2018)
by: Ju. G. Kutsan, et al.
Published: (2018)
Cognitive base as a core of cultural code
by: A. S. Synytsia
Published: (2017)
by: A. S. Synytsia
Published: (2017)
Error correcting code based on finite automaton and representation of numbers in the two-base numeration system
by: Zavadskyi, I.O.
Published: (2025)
by: Zavadskyi, I.O.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Semisimple group codes and dihedral codes
by: Dutra, Flaviana S., et al.
Published: (2018)
by: Dutra, Flaviana S., et al.
Published: (2018)
Homo Post-Soveticus: An Attempt of Analysis on the Base of Post Keynesian and Old Institutionalist Approaches
by: Rozmainsky, I.
Published: (2018)
by: Rozmainsky, I.
Published: (2018)
Homo Post-Soveticus: An Attempt of Analysis on the Base of Post Keynesian and Old Institutionalist Approaches
by: I. Rozmainsky
Published: (2018)
by: I. Rozmainsky
Published: (2018)
Main features of application of Article 336 of the Criminal Code of Ukraine nowadays
by: S. P. Kuchevska
Published: (2015)
by: S. P. Kuchevska
Published: (2015)
Austrian Civil Code in 1797 and its application in Eastern Galicia: some debatable issues
by: I. Y. Boiko
Published: (2015)
by: I. Y. Boiko
Published: (2015)
Innovation Approaches to the Construction of Bioinformation Systems with Databases: Keys Based on Genetic Codes
by: O. M. Klyuchko, et al.
Published: (2024)
by: O. M. Klyuchko, et al.
Published: (2024)
A survey of systematic methods for code-based test data generation
by: V. A. Volkov, et al.
Published: (2017)
by: V. A. Volkov, et al.
Published: (2017)
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017)
by: A. N. Aleksejchuk, et al.
Published: (2017)
Monte-Carlo Serpent code validation based on the experimental data from research subcritical facility
by: O. R. Trofymenko, et al.
Published: (2018)
by: O. R. Trofymenko, et al.
Published: (2018)
Optimization of CMCU with code sharing
by: O. O. Barkalov, et al.
Published: (2021)
by: O. O. Barkalov, et al.
Published: (2021)
Linguocultural codes
by: M. V. Pimenova
Published: (2017)
by: M. V. Pimenova
Published: (2017)
Similar Items
-
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017) -
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017) -
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017) -
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017) -
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)