On new multivariate cryptosystems based on hidden Eulerian equations
Saved in:
| Date: | 2017 |
|---|---|
| Main Author: | V. A. Ustimenko |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Reports of the National Academy of Sciences of Ukraine |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000819838 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On new key exchange multivariate protocols based on pseudorandom walks on incidence structures
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
On multivariate public key based on a pair of transformation with density gap
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, Vasyl
Published: (2018)
by: Ustimenko, Vasyl
Published: (2018)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: V. A. Ustimenko
Published: (2014)
by: V. A. Ustimenko
Published: (2014)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: Ustimenko, V.A.
Published: (2014)
by: Ustimenko, V.A.
Published: (2014)
Conditional and hidden infinite-dimensional symmetries of wave equations
by: I. Yehorchenko, et al.
Published: (2022)
by: I. Yehorchenko, et al.
Published: (2022)
Multivariate scaling based on pseudo-inverse operations
by: Ju. V. Krak, et al.
Published: (2019)
by: Ju. V. Krak, et al.
Published: (2019)
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Hidden Symmetries of Stochastic Models
by: Aneva, B.
Published: (2007)
by: Aneva, B.
Published: (2007)
Determining analytical dependency of direct solar radiation incidence angle over free oriented solar panel as a function of zenith, azimuth and Eulerian angle
by: I. M. Khomenko, et al.
Published: (2012)
by: I. M. Khomenko, et al.
Published: (2012)
Differential invariants, hidden and conditional symmetry
by: I. A. Yehorchenko
Published: (2021)
by: I. A. Yehorchenko
Published: (2021)
Attributed transition systems with hidden transitions
by: V. V. Skobelev
Published: (2017)
by: V. V. Skobelev
Published: (2017)
Physiologic aspects of designing hidden information systems based on visible optical radiation
by: V. V. Brailovskij, et al.
Published: (2015)
by: V. V. Brailovskij, et al.
Published: (2015)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Factorial Fractional Hidden Markov Models
by: Aggoun, L.
Published: (2012)
by: Aggoun, L.
Published: (2012)
The hidden harmfulness of the apple ermine moth
by: Sh. Mansur
Published: (1997)
by: Sh. Mansur
Published: (1997)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
Experience of drilling of hidden-directed and horizontal boreholes
by: Ye. R. Mrozek, et al.
Published: (2019)
by: Ye. R. Mrozek, et al.
Published: (2019)
Statistical Analysis of Radiophysical Processes with Hidden Periodicities
by: Mikhajlishin, V. Yu., et al.
Published: (2012)
by: Mikhajlishin, V. Yu., et al.
Published: (2012)
The sacral and profane: what is hidden over hundreds of religions?
by: V. Volkovskyi
Published: (2016)
by: V. Volkovskyi
Published: (2016)
Chebyshev approximation of multivariable functions with the interpolation
by: P. Malachivskyy, et al.
Published: (2022)
by: P. Malachivskyy, et al.
Published: (2022)
Orthogonality Relations for Multivariate Krawtchouk Polynomials
by: Mizukawa, H.
Published: (2011)
by: Mizukawa, H.
Published: (2011)
A model of infectious disease spread with hidden carriers
by: P. S. Knopov, et al.
Published: (2021)
by: P. S. Knopov, et al.
Published: (2021)
Bloking Modification of Gibbs Sampling for Recognition of Hidden Markov Fields
by: E. V. Vodolazskij, et al.
Published: (2018)
by: E. V. Vodolazskij, et al.
Published: (2018)
Multivariate convergence-targeted operator for the genetic algorithm
by: O. Shadura, et al.
Published: (2017)
by: O. Shadura, et al.
Published: (2017)
Multivariate convergence-targeted operator for the genetic algorithm
by: Shadura, O., et al.
Published: (2017)
by: Shadura, O., et al.
Published: (2017)
Analysis of the possibility of use of Tobin coefficient for evaluation hidden assets
by: V. F. Horiachuk, et al.
Published: (2018)
by: V. F. Horiachuk, et al.
Published: (2018)
Pade approximants for some classes of multivariate functions
by: A. P. Holub, et al.
Published: (2017)
by: A. P. Holub, et al.
Published: (2017)
Similar Items
-
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018) -
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018) -
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015) -
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)