Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://repository.hneu.edu.ua/handle/123456789/33052
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorYevseiev S.-
dc.contributor.authorGavrilova A.-
dc.contributor.authorTomashevsky B.-
dc.contributor.authorSamadov Firuz-
dc.date.accessioned2024-06-19T12:05:24Z-
dc.date.available2024-06-19T12:05:24Z-
dc.date.issued2018-
dc.identifier.citationYevseiev S. Research of crypto-code designs construction for using in post quantum cryptography / S. Yevseiev, A. Gavrilova, B. Tomashevsky [etc.] // Управління розвитком. – № 4 (Т. 4). – С. 26-39.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/33052-
dc.description.abstractThe article analyzes construction of crypto-code designs (CCDs) on the basis of asymmetric MacAlice and Niederreiter crypto-code systems on elliptical (EC) and modified elliptic codes (MEC), which, in the conditions of post-quantum cryptography, allow to provide a guaranteed level of crypto stability, to counteract the modern Attacks and attack by V. Sidelnikov on the theoretical code schemes of McEliece and Niederreiter. Schemes of hybrid crypto-code designs constraction the lossy codes are addressed. Methods of constructing mechanisms of confidentiality and integrity of banking information resources under hybrid threats to security components (information security, cybersecurity, information security) are proposed. Using of a lossy code is suggested to this end. Lossy Code allow you to increase the speed of code changes by reducing the power of the field when causing damage to open text and reducing the amount of data transferred by causing harm to the cipher text. The methods of constructing unprofitable codes and approaches for use in hybrid KKK of McEliece and Niederreiter on modified elliptic codes are considered. Practical algorithms for the use of the MV2 mechanism in McEliece’s CCD and Niederreiter’s modified elliptic codes are proposed, which allows the implementation of the CCD hybrid scheme. The comparative results of the study of stability and power capacity with respect to their practical use in automated banking systems are presented.ru_RU
dc.language.isouk_UAru_RU
dc.publisherХНЕУ ім. С. Кузнецяru_RU
dc.subjectMcEliece’ crypto-code designsru_RU
dc.subjectNiederreiter’s crypto-code designsru_RU
dc.subjectelliptic codesru_RU
dc.subjectmodified elliptical codesru_RU
dc.subjecthybrid crypto-code designsru_RU
dc.titleResearch of crypto-code designs construction for using in post quantum cryptographyru_RU
dc.typeArticleru_RU
Располагается в коллекциях:№ 4

Файлы этого ресурса:
Файл Описание РазмерФормат 
євсєєв.pdf1,07 MBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.