Hash Functions are Based on Three-Dimensional Stochastic Transformations
The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defi...
Saved in:
| Published in: | IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference pp. 202 - 205 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.01.2019
|
| Subjects: | |
| ISSN: | 2376-6565 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!