Please use this identifier to cite or link to this item: https://repository.hneu.edu.ua/handle/123456789/22714
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKorol O. G.-
dc.contributor.authorHavrylova A. A.-
dc.contributor.authorYevseiev S. P.-
dc.date.accessioned2020-02-21T10:09:10Z-
dc.date.available2020-02-21T10:09:10Z-
dc.date.issued2019-
dc.identifier.citationKorol O. Practical UMAC algorithms based on crypto code designs / O. Korol, A. Havrylova, S. Yevseiev // Przetwarzanie, transmisja I bezpieczenstwo informacji : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. – Bielskо-Bialа, 2019. – Tom 2. – S. 221–232.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/22714-
dc.description.abstractA study was carried out on the use of an improved UMAC algorithm in post-quantum cryptography based on the formation of a substrate on the third layer of the hash code generation by the McElise crypto-code system on elliptic codes. The paper considers a practical algorithm for generating a hash code based on an example implementation of a cascading UMAC hash algorithm with the McElise crypto-code construction on elliptic codes. Using a crypto-code design allows you to save the universality of the hash code at the output of the algorithm, which allows its use in large databases as an identifier. In addition, in the context of the implementation of a full-scale quantum computer, US NIST experts consider crypto-code systems as one of the effective post-quantum cryptography algorithms. This approach allows you to implement the UMAC modification on various modifications of crypto-code structures and to ensure the formation of authentication profiles of different strength and length.ru_RU
dc.language.isoenru_RU
dc.subjectUMAC hashing algorithmru_RU
dc.subjectMcElice crypto code constructionsru_RU
dc.subjectelliptic codesru_RU
dc.titlePractical UMAC algorithms based on crypto code designsru_RU
dc.typeArticleru_RU
Appears in Collections:Статті (КІТ)

Files in This Item:
File Description SizeFormat 
Korol O. Practical UMAC algorithms based on crypto code designs.pdf3,5 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.