Improving methods for generating encryption keys using strange attractors
The urgency of the work is determined by the need to transfer confidential information through open communication channels. Such information can be of two types: symmetric encryption keys and directly informational messages that are encrypted with encryption keys. The article deals with the problem...
Saved in:
| Date: | 2023 |
|---|---|
| Main Authors: | Shevchenko, V.V., Sinitsyn, I.P., Shevchenko, V.L. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2023
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/543 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022)
by: Petrivskyi, V.Y., et al.
Published: (2022)
About one method of retracing on a plane
by: Yalovets, A.L.
Published: (2025)
by: Yalovets, A.L.
Published: (2025)
To the problem of pursuit on the plane
by: Yalovets, A.L.
Published: (2025)
by: Yalovets, A.L.
Published: (2025)
About the method of the nearest point as a method of management of strategies of pursuit/evasion of agents
by: Yalovets, A.L.
Published: (2025)
by: Yalovets, A.L.
Published: (2025)
Problem of creation of groups of agents in prosecution/evasion tasks on a plane
by: Yalovets, A.L.
Published: (2025)
by: Yalovets, A.L.
Published: (2025)
Methods of simulation of behavior of agents in multi-agent system “Navigation”
by: Yalovets, A.L.
Published: (2025)
by: Yalovets, A.L.
Published: (2025)
Algorithm and software for determining a musical genre by lyrics to create a song hit
by: Triantafillu, A.A., et al.
Published: (2021)
by: Triantafillu, A.A., et al.
Published: (2021)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Peculiarities of Computer Modeling of Thought Dissemination in Society on the Example of Student Society
by: Shevchenko, V.V., et al.
Published: (2022)
by: Shevchenko, V.V., et al.
Published: (2022)
Intonation expressiveness of the text at program sounding
by: Shevchenko, V.L., et al.
Published: (2021)
by: Shevchenko, V.L., et al.
Published: (2021)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Identification of the native language of a person
by: Lazorenko, Yа.S., et al.
Published: (2023)
by: Lazorenko, Yа.S., et al.
Published: (2023)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Problem of modelling of maneuvering of agents in prosecution/evasion tasks on a plane
by: Yalovets, A.L.
Published: (2017)
by: Yalovets, A.L.
Published: (2017)
Analysis of storage and display frameworks based on aspect-oriented technologies
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Managing scientific workflows in grid systems
by: Tverdokhlib, E.M., et al.
Published: (2025)
by: Tverdokhlib, E.M., et al.
Published: (2025)
Renaissance of actor model application to the development of parallel and distributed systems
by: Glybovets, M.M., et al.
Published: (2017)
by: Glybovets, M.M., et al.
Published: (2017)
Research of the synchronization patterns and their use in GPGPU
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
Creation of design methods for the CUDA hardware and software platform
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
One approach for advanced internet-programs creation on example of widget-programs developing
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Technological model for the process of adaptive Web service composition engineering and exploiting
by: Slabospitskaya, О.A.
Published: (2017)
by: Slabospitskaya, О.A.
Published: (2017)
Рaradigms of programming assembling type in software engeneering
by: Lavrischeva, E.M.
Published: (2025)
by: Lavrischeva, E.M.
Published: (2025)
Using Petri nets to design parallel applications
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
Principles of modeling GPGPU-applications using Petri nets
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Metods of interaction and coordination in multi-agent system based on fussy logic of higher type
by: Parasiuk, I.N., et al.
Published: (2025)
by: Parasiuk, I.N., et al.
Published: (2025)
V.M. Glushkov Kyiv School of Programming
by: Andon, P.I.
Published: (2025)
by: Andon, P.I.
Published: (2025)
Special attention is given to the project of the Informational System "Planned for Science in the NAPN of Ukraine"
by: Zadorozhna, N.T., et al.
Published: (2015)
by: Zadorozhna, N.T., et al.
Published: (2015)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
On decompilation of VLIW executable files
by: Jakub, K.
Published: (2017)
by: Jakub, K.
Published: (2017)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
Semantic alignment of ontologies meaningful categories with the generalization of descriptive structures
by: Manziuk, E.A., et al.
Published: (2023)
by: Manziuk, E.A., et al.
Published: (2023)
The architecture and functionality of the multi-agent system Navigation
by: Yalovets, A.L.
Published: (2018)
by: Yalovets, A.L.
Published: (2018)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Development support system formation and analysis of annual reports of institutions of NAS of Ukraine
by: Tverdokhlib, Ye.M., et al.
Published: (2017)
by: Tverdokhlib, Ye.M., et al.
Published: (2017)
Similar Items
-
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022) -
About one method of retracing on a plane
by: Yalovets, A.L.
Published: (2025) -
To the problem of pursuit on the plane
by: Yalovets, A.L.
Published: (2025) -
About the method of the nearest point as a method of management of strategies of pursuit/evasion of agents
by: Yalovets, A.L.
Published: (2025) -
Problem of creation of groups of agents in prosecution/evasion tasks on a plane
by: Yalovets, A.L.
Published: (2025)