Synthesis Models and Methods of Cryptographic Signals and their Optimization by Time Complexity Criterion
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | I. D. Horbenko, O. A. Zamula |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Physical and mathematical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813934 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Optimization of Discreet Complex Signals Search with Necessary Properties for Application in Modern Information and Communication Systems
by: I. D. Horbenko, et al.
Published: (2019)
by: I. D. Horbenko, et al.
Published: (2019)
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Synthesis of electric system in time domain by searching optimization method
by: V. G. Jagup, et al.
Published: (2015)
by: V. G. Jagup, et al.
Published: (2015)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Regularized Methods of Noisy Signals Differentiation in Real Time
by: Sterten, Jo, et al.
Published: (2017)
by: Sterten, Jo, et al.
Published: (2017)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Regularized Methods of Noisy Signals Differentiation in Real Time
by: Sterten, Jo, et al.
Published: (2017)
by: Sterten, Jo, et al.
Published: (2017)
On one optimality criterion in isolating a weak additive signal against a background of random noise of arbitrary nature
by: Gatkіn, N. G., et al.
Published: (1970)
by: Gatkіn, N. G., et al.
Published: (1970)
On estimates of minima of criterion functions in optimization on combinations
by: Emets, O. A., et al.
Published: (1999)
by: Emets, O. A., et al.
Published: (1999)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Prediction of the melting time of complex ferroalloys by the method of physical and chemical modeling
by: A. F. Petrov, et al.
Published: (2019)
by: A. F. Petrov, et al.
Published: (2019)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Integral Criterion of the Non-uniformity of Stress Distribution for the Topology Optimization of 2D-Models
by: I. V. Yanchevskyi, et al.
Published: (2021)
by: I. V. Yanchevskyi, et al.
Published: (2021)
Features of the generation of Fibonacci Gp(l)-matrices – keys for the implementation of cryptographic conversion
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
On one criterion of constancy of a complex function
by: Safonov, V. M., et al.
Published: (1999)
by: Safonov, V. M., et al.
Published: (1999)
Integral Criterion of the Non-uniformity of Stress Distribution for the Topology Optimization of 2D-Models
by: Янчевский, И. В., et al.
Published: (2021)
by: Янчевский, И. В., et al.
Published: (2021)
Integral Criterion of the Non-uniformity of Stress Distribution for the Topology Optimization of 2D-Models
by: Янчевский, И. В., et al.
Published: (2021)
by: Янчевский, И. В., et al.
Published: (2021)
Corrosion points sizing by smoothness criterion for signal envelope of light diffuse reflection sensor
by: I. B. Ivasiv
Published: (2016)
by: I. B. Ivasiv
Published: (2016)
Applying the concept of generating polynomials to the antenna synthesis problem by power criterion
by: M. I. Andriychuk, et al.
Published: (2014)
by: M. I. Andriychuk, et al.
Published: (2014)
Decrease of time of model synthesis in intellectual monitoring systems
by: Avramenko, A.S., et al.
Published: (2019)
by: Avramenko, A.S., et al.
Published: (2019)
METHOD FOR EVALUATING THE RESILIENCE CRITERION DURING ITS OPTIMIZATION IN A LOCAL ENERGY SYSTEM WITH CHP
by: Khodakivskyi, Vitalii
Published: (2026)
by: Khodakivskyi, Vitalii
Published: (2026)
The validity of the trial as a criterion of optimal civil legal proceedings
by: Kh. A. Dzhavadov
Published: (2016)
by: Kh. A. Dzhavadov
Published: (2016)
Schumann resonance background signal synthesized in time
by: I. G. Kudintseva, et al.
Published: (2017)
by: I. G. Kudintseva, et al.
Published: (2017)
On the acceleration of optimization methods for the problem of synthesis of multilayer optical coatings
by: O. V. Mitsa, et al.
Published: (2021)
by: O. V. Mitsa, et al.
Published: (2021)
Criterion for choosing multifactor experiment design for studying of complex processes
by: S. V. Tynyna, et al.
Published: (2017)
by: S. V. Tynyna, et al.
Published: (2017)
Polyesterification and complex formation in synthesis of titanates by sol–gel method
by: O. M. Suslov, et al.
Published: (2014)
by: O. M. Suslov, et al.
Published: (2014)
Adaptation of Accident Modelling of "Not Design” for WWERs Nuclear Fuel Based on Criterion Method
by: A. D. Berezovskij, et al.
Published: (2015)
by: A. D. Berezovskij, et al.
Published: (2015)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Stability kernel of vector optimization problems under perturbations of criterion functions
by: T. T. Lebiedieva, et al.
Published: (2021)
by: T. T. Lebiedieva, et al.
Published: (2021)
Optimizing Losses in the Management of Information Expences of Processing Enterprise
by: O. V. Zamula
Published: (2015)
by: O. V. Zamula
Published: (2015)
Construction of a model of deformation and short-time damageability for a laminate composite on the basis of the deformation criterion of microstrength
by: L. P. Khoroshun
Published: (2014)
by: L. P. Khoroshun
Published: (2014)
Automatic Recognition, Understanding and Synthesis of Speech Signals in Ukraine
by: T. K. Vintsiuk, et al.
Published: (2018)
by: T. K. Vintsiuk, et al.
Published: (2018)
Seismic coherence in the presence of signal time-delay fluctuations
by: Tyapkin, Yu. K., et al.
Published: (2018)
by: Tyapkin, Yu. K., et al.
Published: (2018)
Modelling of time-dependent problems of search of optimal routes: overview
by: L. F. Hulianytskyi, et al.
Published: (2017)
by: L. F. Hulianytskyi, et al.
Published: (2017)
Stochastic model of an optimal single-component economics of growth in nonlinear ecological-economic criterion with Wiener and Poisson processes
by: M. V. Bojchuk, et al.
Published: (2015)
by: M. V. Bojchuk, et al.
Published: (2015)
Similar Items
-
Optimization of Discreet Complex Signals Search with Necessary Properties for Application in Modern Information and Communication Systems
by: I. D. Horbenko, et al.
Published: (2019) -
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015) -
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019) -
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017) -
Synthesis of electric system in time domain by searching optimization method
by: V. G. Jagup, et al.
Published: (2015)