Výsledky vyhľadávania - "Crypto Code"

  • Zobrazené výsledky 1 - 16 z 16
Upresniť hľadanie
  1. 1
  2. 2
  3. 3

    Research of collision properties of the modified UMAC algorithm on crypto-code constructions Autor Yevseiev, Serhii, Havrylova, Alla, Korol, Olha, Dmitriiev, Oleh, Nesmiian, Oleksii, Yufa, Yevhen, Hrebennikov, Asadi

    ISSN: 2461-4254, 2461-4262
    Vydavateľské údaje: Tallinn Scientific Route OÜ 10.01.2022
    “…The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity…”
    Získať plný text
    Journal Article
  4. 4
  5. 5

    MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES Autor Yevseiev, Serhii, Bakirova, Lala Rustam, Sushchenko, Mariia

    ISSN: 2522-9052
    Vydavateľské údaje: National Technical University "Kharkiv Polytechnic Institute" 01.11.2019
    “…The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of…”
    Získať plný text
    Journal Article
  6. 6

    MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM Autor Tomashevsky, Bogdan, Yevseiev, Serhii, Pohasii, Serhii, Milevskyi, Stanislav

    ISSN: 2522-9052
    Vydavateľské údaje: National Technical University "Kharkiv Polytechnic Institute" 14.09.2022
    “…The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality…”
    Získať plný text
    Journal Article
  7. 7

    Development of Niederriter crypto-code design models on LDPC-codes Autor Погасій, С.С., Мілевський, С.В., Жученко, О.С., Томашевський, Б.П., Рагімова, І.Р., Сергієв, С.В.

    ISSN: 1681-7710, 2518-1696
    Vydavateľské údaje: Ivan Kozhedub Kharkiv National Air Force University 26.12.2021
    Vydané v Sistemi obrobki ìnformacìï (26.12.2021)
    “…The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of…”
    Získať plný text
    Journal Article
  8. 8

    Development of a protocol for a closed mobile internet channel based on post-quantum algorithms Autor Євсєєв, С.П., Погасій, С.С., Хвостенко, В.С.

    ISSN: 1681-7710, 2518-1696
    Vydavateľské údaje: Ivan Kozhedub Kharkiv National Air Force University 24.09.2021
    Vydané v Sistemi obrobki ìnformacìï (24.09.2021)
    “…The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly…”
    Získať plný text
    Journal Article
  9. 9
  10. 10

    Development of digital signature algorithm based on the Niederriter crypto-code system Autor Циганенко, О.С.

    ISSN: 1681-7710, 2518-1696
    Vydavateľské údaje: Ivan Kozhedub Kharkiv National Air Force University 30.09.2020
    Vydané v Sistemi obrobki ìnformacìï (30.09.2020)
    “…The development of computing resources in the post-quantum period calls into question the provision of the required level of stability of symmetric and…”
    Získať plný text
    Journal Article
  11. 11

    MATHEMATICAL MODEL OF THE MODIFIED NIEDERREITER CRYPTO-CODE STRUCTURES Autor Tsyhanenko, Oleksii, Rzayev, Khazail, Mammadova, Tamilla

    ISSN: 2522-9052
    Vydavateľské údaje: National Technical University "Kharkiv Polytechnic Institute" 26.12.2018
    “…Subject of research is the modification of the Niederreiter crypto-code construction on non-binary codes. The purpose of this work is to develop a mathematical…”
    Získať plný text
    Journal Article
  12. 12

    Mathematical Models of Modified Crypto-Code Means of Information Protection Based on Coding Theory Schemes Autor Rzaev, Kh. N.

    ISSN: 0005-1179, 1608-3032
    Vydavateľské údaje: Moscow Pleiades Publishing 01.07.2019
    Vydané v Automation and remote control (01.07.2019)
    “…We develop mathematical models of modified crypto-code means of information protection based on the McEliece coding theory scheme using algebro-geometric block…”
    Získať plný text
    Journal Article
  13. 13

    Post-Quantum Authentication and Authorization Using the Niederreiter Code-Theoretic Scheme Autor Korolov, Roman, Hnatushenko, Volodymyr, Korchenko, Anna, Sokol, Vladyslav, Udovyk, Iryna, Kurtseitov, Tymur

    ISSN: 2770-7962
    Vydavateľské údaje: IEEE 14.11.2025
    “…In today's digital world and continuous exchange of information, protecting data and resources is becoming increasingly important. One of the foundations of…”
    Získať plný text
    Konferenčný príspevok..
  14. 14

    Intelligent Control and Security Systems Models Synthesis Methodology for Critical Infrastructure Objects Autor Yevseiev, Serhii, Hryshchuk, Ruslan, Zakovorotnyi, Oleksandr, Milov, Oleksandr, Kuchuk, Heorhii, Milevskyi, Stanislav

    Vydavateľské údaje: IEEE 21.11.2024
    “…The proposed methodology for the intelligent control and security systems models synthesis of critical infrastructure facilities is based on a fundamentally…”
    Získať plný text
    Konferenčný príspevok..
  15. 15

    Crypto Code Constructions in Post-Quantum Cryptography Autor Tkachov, Andrii, Korol, Olha, Voropay, Natalia, Dunaiev, Sergii, Stetsenko, Vadym, Tomashevsky, Bogdan

    ISSN: 2996-4393
    Vydavateľské údaje: IEEE 23.05.2025
    “…The development of a full-scale quantum computer calls into question the stability of modern cryptosystems. Thus, all asymmetric cryptosystems can be…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Estimating the Efficiency of Using the Modified UMAC Algorithm Autor Havrylova, Alla, Tkachov, Andrii, Qizi, Rahimova Irada Rahim

    Vydavateľské údaje: IEEE 03.10.2022
    “…A complex indicator of the efficiency of the modified UMAC algorithm has been developed. As a method of evaluation, it is proposed to use the method of…”
    Získať plný text
    Konferenčný príspevok..