Hash Functions are Based on Three-Dimensional Stochastic Transformations

The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference pp. 202 - 205
Main Authors: Chugunkov, Ilya V., Ivanov, Michael A., Kliuchnikova, Bogdana V.
Format: Conference Proceeding
Language:English
Published: IEEE 01.01.2019
Subjects:
ISSN:2376-6565
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first