Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Dilmukhanbet Dyusenbayev"'
Publikováno v:
Scientific Journal of Astana IT University, Pp 107-119 (2024)
One of the most important issues in the design of cryptographic algorithms is studying their cryptographic strength. Among the factors determining the reliability of cryptographic algorithms, a good pseudorandom sequence generator, which is used for
Externí odkaz:
https://doaj.org/article/95df9b56189b4f04b1dcfc5c10655572
Publikováno v:
Computers, Vol 13, Iss 1, p 26 (2024)
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the
Externí odkaz:
https://doaj.org/article/b4db2549d71e48c39f8660fb27cd064e
Publikováno v:
Cogent Engineering, Vol 9, Iss 1 (2022)
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems. This method is based on modular arithmetic, that is, exponentiation modulo polynomial in extended G
Externí odkaz:
https://doaj.org/article/d00f1f4f73a24c59b4d6d33df3d6c06a
Publikováno v:
Computation, Vol 10, Iss 11, p 198 (2022)
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transfo
Externí odkaz:
https://doaj.org/article/8c2d88d3b81b46dd8b48f84562814c13
Autor:
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva, Dilmukhanbet Dyusenbayev
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 10173 (2022)
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 alg
Externí odkaz:
https://doaj.org/article/82835704354a4f30a1a7573d6661d36f
Autor:
Kairat Sakan, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, Dilmukhanbet Dyusenbayev
Publikováno v:
Eastern-European Journal of Enterprise Technologies; Vol. 2 No. 9 (116) (2022): Information and controlling system; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construc
Publikováno v:
Open Engineering, Vol 6, Iss 1 (2016)
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number syst
Publikováno v:
Scopus-Elsevier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::26d4a6dd53b5296b7d123a76555d6fdc
http://www.scopus.com/inward/record.url?eid=2-s2.0-85137403195&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85137403195&partnerID=MN8TOARS