Cryptographic properties of the new national encryption standard of Ukraine
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | A. N. Aleksejchuk, L. V. Kovalchuk, A. S. Shevtsov, S. V. Jakovlev |
| Format: | Article |
| Language: | English |
| Published: |
2016
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000502500 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
Synthesis Models and Methods of Cryptographic Signals and their Optimization by Time Complexity Criterion
by: I. D. Horbenko, et al.
Published: (2017)
by: I. D. Horbenko, et al.
Published: (2017)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Application of commutative rings with unity for construction of symmetric encryption system
by: S. L. Kryvyi
Published: (2022)
by: S. L. Kryvyi
Published: (2022)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Development of the national standard of Ukraine on steel ingots
by: V. A. Strygun, et al.
Published: (2017)
by: V. A. Strygun, et al.
Published: (2017)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: D. Zhuravlev
Published: (2015)
by: D. Zhuravlev
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, D.
Published: (2015)
by: Zhuravlev, D.
Published: (2015)
RS-analysis in information security of streaming encryption's systems
by: O. A. Niemkova
Published: (2013)
by: O. A. Niemkova
Published: (2013)
Features of the generation of Fibonacci Gp(l)-matrices – keys for the implementation of cryptographic conversion
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
Standard and New Wheeled Steel
by: V. A. Loktionov-Remizovskij, et al.
Published: (2019)
by: V. A. Loktionov-Remizovskij, et al.
Published: (2019)
The New National Standard of Ukraine for the Formation of Organizational and Administrative Documentation: History of Development, Analysis of Main Changes and Issues of Implementation of the Standard
by: O. Zahoretska
Published: (2022)
by: O. Zahoretska
Published: (2022)
New international standard of cataloguing
by: N. V. Strishenets
Published: (2014)
by: N. V. Strishenets
Published: (2014)
The Problems of Investment Property Valuation According to National and International Accounting Standards
by: S. L. Bezruchuk, et al.
Published: (2019)
by: S. L. Bezruchuk, et al.
Published: (2019)
Practical Estimates of Block Cipher New Standards Modifications Resistance to Integer Differencial Cryptanalisys
by: L. V. Kovalchuk, et al.
Published: (2017)
by: L. V. Kovalchuk, et al.
Published: (2017)
Problems of Accounting for Investment Property according to both National and International Standards
by: V. V. Chudovets, et al.
Published: (2016)
by: V. V. Chudovets, et al.
Published: (2016)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Assessment of the Compliance of the National Standards in the Field of Social Protection of the Unemployed in Ukraine with the Requirements of the International Standards
by: N. O. Poliak, et al.
Published: (2017)
by: N. O. Poliak, et al.
Published: (2017)
Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
by: O. H. Kachko, et al.
Published: (2017)
by: O. H. Kachko, et al.
Published: (2017)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020)
by: O. M. Yunak, et al.
Published: (2020)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Similar Items
-
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019) -
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022) -
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015) -
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)