Материалов:
1 081 645

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 28962

Страница 1 из 2897

USING DETERMINISTIC GENETIC ALGORITHM TO PROVIDE SECURED CRYPTOSYSTEMThis paper gives an example of applying deterministic genetic algorithm in symmetric encryption

Using frequency analysis and Grover's algorithm to implement known ciphertext attack on symmetric ciphersIn this paper we construct quantum circuit implementing known ciphertext attack on symmetric cipher

Public key cryptosystems and their application in digital signature algorithms they are implemented. It compares symmetric and asymmetric signature methods, describes the use of open key digital

Using frequency analysis and Grover's algorithm to implement known ciphertext attack on symmetric ciphersIn this paper we construct quantum circuit implementing known ciphertext attack on symmetric cipher

SIBCiphers - symmetric iterative block ciphers with functional keysSIBCiphers - symmetric iterative block ciphers with functional keys

Overview and Performance Analysis of Encryption Algorithms with symmetric and asymmetric keys is presented. Factors ensuring the achievement of efficiency, flexibility

On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys cryptographic primitives, symmetric and asymmetric, as well as cryptographic protocols using short (low

NEARLY SYMMETRICAL AND ANTI-SYMMETRICAL SPACES WITH AFFINE CONNECTIONNEARLY SYMMETRICAL AND ANTI-SYMMETRICAL SPACES WITH AFFINE CONNECTION

Authenticated encryption mode with blocks skippingBlock symmetric ciphers are one of the most important components of modern information security

Эффективность устранения ошибок в бинарных последовательностях при разнесенном формировании криптографического ключа general key for symmetric cryptosystems.

Страница 1 из 2897