RS-analysis in information security of streaming encryption's systems
Saved in:
| Date: | 2013 |
|---|---|
| Main Author: | O. A. Niemkova |
| Format: | Article |
| Language: | English |
| Published: |
2013
|
| Series: | Socio-economic problems of the modern period of Ukraine |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000800595 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Elements of nonlinear analysis of information streams.
by: A. N. Grajvoronskaja, et al.
Published: (2017)
by: A. N. Grajvoronskaja, et al.
Published: (2017)
Elements of nonlinear analysis of information streams
by: Lande, D. V., et al.
Published: (2017)
by: Lande, D. V., et al.
Published: (2017)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, D.
Published: (2015)
by: Zhuravlev, D.
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Towards practical private information retrieval from homomorphic encryption
by: D. Zhuravlev
Published: (2015)
by: D. Zhuravlev
Published: (2015)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
An Analysis of News Streams in Research of the Home Informative Field
by: A. Berehelskyi, et al.
Published: (2015)
by: A. Berehelskyi, et al.
Published: (2015)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020)
by: O. M. Yunak, et al.
Published: (2020)
Application of commutative rings with unity for construction of symmetric encryption system
by: S. L. Kryvyi
Published: (2022)
by: S. L. Kryvyi
Published: (2022)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
Meiosis analysis in soft winter wheat varieties – carriers of wheat-rye translocations 1BL.1RS and 1AL.1RS
by: I. I. Lialko, et al.
Published: (2018)
by: I. I. Lialko, et al.
Published: (2018)
Группы RS-автоматных преобразований
by: Олийнык, А.С.
Published: (2010)
by: Олийнык, А.С.
Published: (2010)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Risks to Ukraine's energy security through the prism of Nord Stream 2 gas pipeline project
by: E. Morhunova
Published: (2021)
by: E. Morhunova
Published: (2021)
Optimization NTRU Similar Algorithm for Asymmetric Encryption with the "Inconvenient Parameters"
by: O. H. Kachko, et al.
Published: (2017)
by: O. H. Kachko, et al.
Published: (2017)
Information Technology in the Computer Systems of Accounting: Issues of Organizing the Data and Data Streams
by: O. V. Adamyk
Published: (2016)
by: O. V. Adamyk
Published: (2016)
Identification of genotypes with recombinant arm 1RS in bread wheat segregating F5 populations from crosses between carriers of 1BL.1RS AND 1AL.1RS
by: N. O. Kozub, et al.
Published: (2022)
by: N. O. Kozub, et al.
Published: (2022)
Parallel distributed system for social networks streaming data analysis
by: Yu. Doroshenko, et al.
Published: (2015)
by: Yu. Doroshenko, et al.
Published: (2015)
Parallel distributed system for social networks streaming data analysis
by: Doroshenko, А.Yu., et al.
Published: (2017)
by: Doroshenko, А.Yu., et al.
Published: (2017)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Organization of Informative Streams of Controlling in the Management of Trade Networks
by: M. V. Tarasiuk
Published: (2010)
by: M. V. Tarasiuk
Published: (2010)
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017)
by: A. N. Aleksejchuk, et al.
Published: (2017)
Z*-semilocal modules and the proper class RS
by: E. Tьrkmen
Published: (2019)
by: E. Tьrkmen
Published: (2019)
The Information Component in the Structure of the Enterprise's Economic Security
by: O. D. Borzenkova, et al.
Published: (2017)
by: O. D. Borzenkova, et al.
Published: (2017)
Study of association between polymorphisms in the PSMB5 (rs11543947) and PSMA3 (rs2348071) genes and multiple sclerosis in Latvians
by: Kalnina, J., et al.
Published: (2014)
by: Kalnina, J., et al.
Published: (2014)
Study of association between polymorphisms in the PSMB5 (rs11543947) and PSMA3 (rs2348071) genes and multiple sclerosis in Latvians
by: J. Kalnina, et al.
Published: (2014)
by: J. Kalnina, et al.
Published: (2014)
On information security issues as a direction of Ukraine's information policy in war
by: S. O. Dorohykh
Published: (2022)
by: S. O. Dorohykh
Published: (2022)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Features of the Formation of a Subsystem of Information Provision of the Enterprise's Financial Security System
by: H. M. Azarenkova, et al.
Published: (2020)
by: H. M. Azarenkova, et al.
Published: (2020)
Seed set and other productivity traits in common wheat F1 plants with the 1BL/1RS and 1AL/1RS translocations
by: I. O. Sozinov, et al.
Published: (2016)
by: I. O. Sozinov, et al.
Published: (2016)
Similar Items
-
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022) -
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019) -
Elements of nonlinear analysis of information streams.
by: A. N. Grajvoronskaja, et al.
Published: (2017) -
Elements of nonlinear analysis of information streams
by: Lande, D. V., et al.
Published: (2017) -
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)