Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://repository.hneu.edu.ua/handle/123456789/22714
Полная запись метаданных
Поле DC | Значение | Язык |
---|---|---|
dc.contributor.author | Korol O. G. | - |
dc.contributor.author | Havrylova A. A. | - |
dc.contributor.author | Yevseiev S. P. | - |
dc.date.accessioned | 2020-02-21T10:09:10Z | - |
dc.date.available | 2020-02-21T10:09:10Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Korol O. Practical UMAC algorithms based on crypto code designs / O. Korol, A. Havrylova, S. Yevseiev // Przetwarzanie, transmisja I bezpieczenstwo informacji : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. – Bielskо-Bialа, 2019. – Tom 2. – S. 221–232. | ru_RU |
dc.identifier.uri | http://repository.hneu.edu.ua/handle/123456789/22714 | - |
dc.description.abstract | A study was carried out on the use of an improved UMAC algorithm in post-quantum cryptography based on the formation of a substrate on the third layer of the hash code generation by the McElise crypto-code system on elliptic codes. The paper considers a practical algorithm for generating a hash code based on an example implementation of a cascading UMAC hash algorithm with the McElise crypto-code construction on elliptic codes. Using a crypto-code design allows you to save the universality of the hash code at the output of the algorithm, which allows its use in large databases as an identifier. In addition, in the context of the implementation of a full-scale quantum computer, US NIST experts consider crypto-code systems as one of the effective post-quantum cryptography algorithms. This approach allows you to implement the UMAC modification on various modifications of crypto-code structures and to ensure the formation of authentication profiles of different strength and length. | ru_RU |
dc.language.iso | en | ru_RU |
dc.subject | UMAC hashing algorithm | ru_RU |
dc.subject | McElice crypto code constructions | ru_RU |
dc.subject | elliptic codes | ru_RU |
dc.title | Practical UMAC algorithms based on crypto code designs | ru_RU |
dc.type | Article | ru_RU |
Располагается в коллекциях: | Статті (КІТ) |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
Korol O. Practical UMAC algorithms based on crypto code designs.pdf | 3,5 MB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.