MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the re...
Main Authors: | A. Beletsky, D. Stecenko |
---|---|
Format: | Article |
Language: | English |
Published: |
Kherson State University
2010-07-01
|
Series: | Ìnformacìjnì Tehnologìï v Osvìtì |
Subjects: | |
Online Access: | http://ite.kspu.edu/webfm_send/689 |
Similar Items
-
The Symmetrical Block Rsb-32 Encryption Algorithm With Dynamic Encryption Settings.
by: A. Beletsky, et al.
Published: (2009-11-01) -
SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS
by: Mirkhon Nurullaev, et al.
Published: (2020-01-01) -
Deniable encryption protocols based on probabilistic public-key encryption
by: Nikolay Moldovyan, et al.
Published: (2017-04-01) -
Key Assignment Schemes with Authenticated Encryption, revisited
by: Jeroen Pijnenburg, et al.
Published: (2020-07-01) -
Attacking Pairing-Free Attribute-Based Encryption Schemes
by: Javier Herranz
Published: (2020-01-01)