Algebraic Combinatorics of application for problems coding and cryptography
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | O. S. Pustovit, V. O. Ustymenko |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical modelling in economy |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000844039 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Combinatorics on Equaffine Words for Design Lexicographic Codes of Augmented Reality
by: O. A. Gudaev
Published: (2014)
by: O. A. Gudaev
Published: (2014)
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
The Combinatorics of Associated Laguerre Polynomials
by: Kim, J.S., et al.
Published: (2015)
by: Kim, J.S., et al.
Published: (2015)
On the subset combinatorics of G-spaces
by: Protasov, I., et al.
Published: (2014)
by: Protasov, I., et al.
Published: (2014)
On the subset combinatorics of G-spaces
by: I. Protasov, et al.
Published: (2014)
by: I. Protasov, et al.
Published: (2014)
Requirements and Security Models for Post-quantum Cryptography Analysis
by: O. V. Potii, et al.
Published: (2017)
by: O. V. Potii, et al.
Published: (2017)
Recent progress in Subset Combinatorics of Groups
by: Protasov, I.V., et al.
Published: (2017)
by: Protasov, I.V., et al.
Published: (2017)
Recent progress in Subset Combinatorics of Groups
by: I. V. Protasov, et al.
Published: (2017)
by: I. V. Protasov, et al.
Published: (2017)
Actual Issues Analysis Regarding Perspective Public-Key Cryptography
by: Yu. I. Horbenko, et al.
Published: (2019)
by: Yu. I. Horbenko, et al.
Published: (2019)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, Vasyl
Published: (2018)
by: Ustimenko, Vasyl
Published: (2018)
Anagrammatism and Cryptography in Mykhayl Semenko's Lyrical Poetry
by: I. M. Shatova
Published: (2018)
by: I. M. Shatova
Published: (2018)
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
Combinatorics of irreducible Gelfand-Tsetlin sl(3)-modules
by: Ramirez, L.E.
Published: (2012)
by: Ramirez, L.E.
Published: (2012)
Combinatorics of irreducible Gelfand-Tsetlin \(sl(3)\)-modules
by: Ramirez, Luis Enrique
Published: (2018)
by: Ramirez, Luis Enrique
Published: (2018)
Compatibility vs combinatorics for the development of the history of ukrainian language
by: H. M. Dydyk-Meush
Published: (2019)
by: H. M. Dydyk-Meush
Published: (2019)
Combinatorics of irreducible Gelfand-Tsetlin sl(3)-modules
by: L. E. Ramirez
Published: (2012)
by: L. E. Ramirez
Published: (2012)
Aspects of the Topology and Combinatorics of Higgs Bundle Moduli Spaces
by: Rayan, S.
Published: (2018)
by: Rayan, S.
Published: (2018)
Algebraic patterns of binary code vulnerabilities
by: V. M. Yakovlev
Published: (2020)
by: V. M. Yakovlev
Published: (2020)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
On semisimple algebra codes: generator theory
by: Martınez-Moro, E.
Published: (2007)
by: Martınez-Moro, E.
Published: (2007)
The active dictionary of lexical combinatorics as a means of optimizing language learning
by: V. M. Trub
Published: (2021)
by: V. M. Trub
Published: (2021)
Combinatorics of partial wreath power of finite inverse symmetric semigroup ISd
by: Kochubinska, Y.
Published: (2007)
by: Kochubinska, Y.
Published: (2007)
Nakajima quiver varieties, affine crystals and combinatorics of Auslander-Reiten quivers
by: Kus, D., et al.
Published: (2023)
by: Kus, D., et al.
Published: (2023)
On Some Quadratic Algebras I 1/2: Combinatorics of Dunkl and Gaudin Elements, Schubert, Grothendieck, Fuss-Catalan, Universal Tutte and Reduced Polynomials
by: Kirillov, A.N.
Published: (2016)
by: Kirillov, A.N.
Published: (2016)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Small Business development in the applicable tax code
by: L. І. Novik, et al.
Published: (2014)
by: L. І. Novik, et al.
Published: (2014)
Algebraic modeling and its application
by: O. O. Letychevskyi
Published: (2021)
by: O. O. Letychevskyi
Published: (2021)
Application of Multi-Delimiter Codes to Natural Language Text Archiving
by: A. V. Anisimov, et al.
Published: (2020)
by: A. V. Anisimov, et al.
Published: (2020)
Application of nest code for comparative economic evaluation of energy systems
by: Ju. G. Kutsan, et al.
Published: (2018)
by: Ju. G. Kutsan, et al.
Published: (2018)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Gray codes in combinatorial optimization problems
by: V. A. Vasjanin, et al.
Published: (2019)
by: V. A. Vasjanin, et al.
Published: (2019)
Validation of WWER-440/213 Thermohydraulic Model for TRACE Computer Code Based on RNPP-1 Incident Data
by: S. E. Yanovskyi, et al.
Published: (2019)
by: S. E. Yanovskyi, et al.
Published: (2019)
On New Stream Algorithms for Generation of Documents Dijests with High Avalanche Effect
by: V. O. Ustymenko, et al.
Published: (2019)
by: V. O. Ustymenko, et al.
Published: (2019)
Similar Items
-
Combinatorics on Equaffine Words for Design Lexicographic Codes of Augmented Reality
by: O. A. Gudaev
Published: (2014) -
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015) -
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, V.
Published: (2015) -
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: V. Ustimenko
Published: (2015) -
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)