Features of the generation of Fibonacci Gp(l)-matrices – keys for the implementation of cryptographic conversion
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | Yu. I. Hrytsiuk, Yu. Hrytsiuk |
| Format: | Article |
| Language: | English |
| Published: |
2016
|
| Series: | Information extraction and processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000531434 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Super Fibonacci Graceful Graphs and Fibonacci Cubes
by: M. F. Semeniuta
Published: (2020)
by: M. F. Semeniuta
Published: (2020)
Super Fibonacci Graceful Graphs and Fibonacci Cubes
by: Semeniuta, M.F.
Published: (2020)
by: Semeniuta, M.F.
Published: (2020)
Designing generators of Poisson pulse sequences based on the additive Fibonacci generators
by: V. N. Maksymovych, et al.
Published: (2017)
by: V. N. Maksymovych, et al.
Published: (2017)
A study of characteristics of Fibonacci modified additive generator with lag
by: V. N. Maksymovych, et al.
Published: (2016)
by: V. N. Maksymovych, et al.
Published: (2016)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Fibonacci and super Fibonacci graceful labellings of some types of graphs
by: M. F. Semenjuta
Published: (2021)
by: M. F. Semenjuta
Published: (2021)
Fibonacci cycles hypothesis
by: S. Rohovskyi
Published: (2015)
by: S. Rohovskyi
Published: (2015)
Operational and strategic situation in Ukraine at the beginning of spring of 1944. The plans of counterparts
by: V. Hrytsiuk
Published: (2012)
by: V. Hrytsiuk
Published: (2012)
Place and value of the Korsun-Shevchenko battle in Dnipro-Carpathians strategic offensive operation
by: V. Hrytsiuk
Published: (2010)
by: V. Hrytsiuk
Published: (2010)
Operations on encirclement of the groupings of German troops in Ukraine
by: V. Hrytsiuk
Published: (2011)
by: V. Hrytsiuk
Published: (2011)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
The Generalized Fibonacci Oscillator as an Open Quantum System
by: Fagnola, Franco, et al.
Published: (2022)
by: Fagnola, Franco, et al.
Published: (2022)
Algorithm of the Automated Events Classification Process in the Information Space
by: V. V. Hrytsiuk
Published: (2020)
by: V. V. Hrytsiuk
Published: (2020)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
$q$-Numbers of quantum groups, Fibonacci numbers, and orthogonal polynomials
by: Kachurik, I. I., et al.
Published: (1998)
by: Kachurik, I. I., et al.
Published: (1998)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Spectral properties of the Fibonacci superlattices created of the graphene armchair nanoribbons
by: A. N. Korol, et al.
Published: (2016)
by: A. N. Korol, et al.
Published: (2016)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Generalized gamma-generating matrices
by: E. O. Sukhorukova
Published: (2015)
by: E. O. Sukhorukova
Published: (2015)
Fibonacci lengths of all finite p-groups of exponent p²
by: Ahmadi, B., et al.
Published: (2013)
by: Ahmadi, B., et al.
Published: (2013)
Some remarks for analytic functions related to Fibonacci polynomials and their applications
by: Düzenli, Timur, et al.
Published: (2026)
by: Düzenli, Timur, et al.
Published: (2026)
Use of Taylor polynomial for numerical integration of table functions of two variables
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
by: Yu. I. Hrytsiuk, et al.
Published: (2016)
Synthesis Models and Methods of Cryptographic Signals and their Optimization by Time Complexity Criterion
by: I. D. Horbenko, et al.
Published: (2017)
by: I. D. Horbenko, et al.
Published: (2017)
"Soldier doesn't need unnecessary property...": material and living conditions of Red Army soldiers in 1939–1945
by: V. Hrytsiuk, et al.
Published: (2013)
by: V. Hrytsiuk, et al.
Published: (2013)
The cryptographic strength of combinational hashing the authentication data in Internet-payment system
by: O. V. Kliuvak
Published: (2013)
by: O. V. Kliuvak
Published: (2013)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
d-Gaussian Fibonacci, d-Gaussian Lucas polynomials and their matrix representations
by: E. Özkan, et al.
Published: (2023)
by: E. Özkan, et al.
Published: (2023)
Fibonacci lengths of all finite p-groups of exponent p2
by: B. Ahmadi, et al.
Published: (2013)
by: B. Ahmadi, et al.
Published: (2013)
Fibonacci lengths of all finite $p$-groups of exponent $p^2$
by: Ahmadi, B., et al.
Published: (2013)
by: Ahmadi, B., et al.
Published: (2013)
$d$-Gaussian Fibonacci, $d$-Gaussian Lucas polynomials and their matrix representations
by: Özkan, E., et al.
Published: (2023)
by: Özkan, E., et al.
Published: (2023)
Factorization of generalized г-generating matrices
by: O. Sukhorukova
Published: (2017)
by: O. Sukhorukova
Published: (2017)
Factorization of generalized γ-generating matrices
by: Sukhorukova, O.
Published: (2017)
by: Sukhorukova, O.
Published: (2017)
Key features Stolypin's agrarian reforms
by: Yu. Borysov
Published: (2016)
by: Yu. Borysov
Published: (2016)
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Особенности процесса самоассоциации дезоксигексануклеотида 5'-d(GpCpApTpGpC) и его комплексообразования с антрациклиновым антибиотиком дауномицином в водном растворе
by: Веселков, А.Н., et al.
Published: (2004)
by: Веселков, А.Н., et al.
Published: (2004)
The Greatest Military Operation in Ukrainian Lands (Commemorating the 70th Anniversary of Nazi Occupants' Proscription from Ukraine)
by: V. M. Hrytsiuk, et al.
Published: (2014)
by: V. M. Hrytsiuk, et al.
Published: (2014)
Generated set of matrices divisors and its propertiess
by: V. P. Shchedryk
Published: (2013)
by: V. P. Shchedryk
Published: (2013)
Similar Items
-
Super Fibonacci Graceful Graphs and Fibonacci Cubes
by: M. F. Semeniuta
Published: (2020) -
Super Fibonacci Graceful Graphs and Fibonacci Cubes
by: Semeniuta, M.F.
Published: (2020) -
Designing generators of Poisson pulse sequences based on the additive Fibonacci generators
by: V. N. Maksymovych, et al.
Published: (2017) -
A study of characteristics of Fibonacci modified additive generator with lag
by: V. N. Maksymovych, et al.
Published: (2016) -
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)