Requirements and Security Models for Post-quantum Cryptography Analysis
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | O. V. Potii, K. V. Isirova |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Technical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813807 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Actual Issues Analysis Regarding Perspective Public-Key Cryptography
by: Yu. I. Horbenko, et al.
Published: (2019)
by: Yu. I. Horbenko, et al.
Published: (2019)
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017)
by: O. S. Pustovit, et al.
Published: (2017)
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, Vasyl
Published: (2018)
by: Ustimenko, Vasyl
Published: (2018)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
Anagrammatism and Cryptography in Mykhayl Semenko's Lyrical Poetry
by: I. M. Shatova
Published: (2018)
by: I. M. Shatova
Published: (2018)
Domain engineering approach of software requirements analysis
by: Chebanyuk, O.V., et al.
Published: (2020)
by: Chebanyuk, O.V., et al.
Published: (2020)
Domain engineering approach of software requirements analysis
by: O. V. Chebanyuk, et al.
Published: (2020)
by: O. V. Chebanyuk, et al.
Published: (2020)
Domain engineering approach of software requirements analysis
by: Chebanyuk, O.V., et al.
Published: (2020)
by: Chebanyuk, O.V., et al.
Published: (2020)
The Post-Global Security Space
by: M. V. Kovalchuk
Published: (2015)
by: M. V. Kovalchuk
Published: (2015)
Ensuring food security of Ukraine: post-war context
by: O. V. Shubravska, et al.
Published: (2022)
by: O. V. Shubravska, et al.
Published: (2022)
Modeling of carbon-energy imports to the country's energy sector in view of requirements of its energy security
by: O. V. Stohnii, et al.
Published: (2015)
by: O. V. Stohnii, et al.
Published: (2015)
The Basic elements of the post keynesian analysis of the post-soviet model of Russian capitalism
by: I. Rozmainsky
Published: (2016)
by: I. Rozmainsky
Published: (2016)
The basic elements of the post keynesian analysis of the post-soviet model of Russian capitalism
by: Rozmainsky, I.
Published: (2016)
by: Rozmainsky, I.
Published: (2016)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Agile requirement analysis approach using artificial intelligent technologies
by: Chebanyuk, O.V.
Published: (2024)
by: Chebanyuk, O.V.
Published: (2024)
The Post-Documentary Stage in the Development of Securities Market in Ukraine
by: T. V. Stetsenko
Published: (2015)
by: T. V. Stetsenko
Published: (2015)
Possibilities of Ensuring the Basic Requirements of the Quality of Working Life During the Period of Martial Law and Post-War Recovery
by: L. L. Shamileva, et al.
Published: (2022)
by: L. L. Shamileva, et al.
Published: (2022)
Regulatory documents about wheel for railway rolling stock production requirements analysis
by: I. H. Uzlov, et al.
Published: (2012)
by: I. H. Uzlov, et al.
Published: (2012)
Analysis of technical requirements for heating mains in geothermal heating supply systems
by: Oliinichenko, V.
Published: (2016)
by: Oliinichenko, V.
Published: (2016)
Analysis of technical requirements for heating mains in geothermal heating supply systems
by: V. H. Oliinichenko
Published: (2016)
by: V. H. Oliinichenko
Published: (2016)
Models and tools for effectiveness increase of requirements traceability in agile-software development
by: Tkachuk, M.V., et al.
Published: (2012)
by: Tkachuk, M.V., et al.
Published: (2012)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
The choice of the model of corporate requirements to the competence of a specialist of industrial enterprise
by: V. S. Zaitsev
Published: (2017)
by: V. S. Zaitsev
Published: (2017)
Models and tools for effective-ness increase of requirements traceability in agile-software development
by: M. V. Tkachuk, et al.
Published: (2012)
by: M. V. Tkachuk, et al.
Published: (2012)
Economic security of post-conflict territories: some aspects of legal framework
by: V. A. Ustymenko, et al.
Published: (2020)
by: V. A. Ustymenko, et al.
Published: (2020)
Models and tools for effective-ness increase of requirements traceability in agile-software development
by: Tkachuk, M.V., et al.
Published: (2015)
by: Tkachuk, M.V., et al.
Published: (2015)
Modern legal and normative requirements to welded products
by: Yu. K. Bondarenko, et al.
Published: (2021)
by: Yu. K. Bondarenko, et al.
Published: (2021)
ANALYSIS OF REQUIREMENTS FOR GAS FLOW CONTROL SYSTEMS IN GAS DISTRIBUTION PIPELINES
by: Petrushenko, Sergii, et al.
Published: (2024)
by: Petrushenko, Sergii, et al.
Published: (2024)
Configuration analysis of under-frequency load shedding relays considering european requirements
by: A. O. Steliuk, et al.
Published: (2024)
by: A. O. Steliuk, et al.
Published: (2024)
The method of requirements prioritization in software engineering
by: Nesterenko, O.V.
Published: (2024)
by: Nesterenko, O.V.
Published: (2024)
Analysis of the demand of Ukrainian thermal power plants for steam coal with regard for requirements to fuel quality
by: M. O. Perov, et al.
Published: (2016)
by: M. O. Perov, et al.
Published: (2016)
Hamiltonian analysis of exact integrability of the quantum 3-level superradiance Dicke model
by: Samuliak, R.V.
Published: (1992)
by: Samuliak, R.V.
Published: (1992)
Similar Items
-
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019) -
Actual Issues Analysis Regarding Perspective Public-Key Cryptography
by: Yu. I. Horbenko, et al.
Published: (2019) -
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017) -
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015) -
On the flag geometry of simple group of Lie type and multivariate cryptography
by: V. Ustimenko
Published: (2015)