Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Kapalova, Nursulu A."'
Publikováno v:
Open Engineering, Vol 12, Iss 1, Pp 570-577 (2022)
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algo
Externí odkaz:
https://doaj.org/article/50438fbe65584b699f9aa66c93cc432d
Autor:
Khompysh, Ardabek, Algazy, Kunbolat, Kapalova, Nursulu, Sakan, Kairat, Dyusenbayev, Dilmukhanbet
Publikováno v:
Scientific Journal of Astana IT University; Jun2024, Vol. 18, p107-119, 13p
Autor:
Khompysh, Ardabek1,2 ardabek@mail.ru, Kapalova, Nursulu1 nkapalova@mail.ru, Algazy, Kunbolat1 kunbolat@mail.ru, Dyusenbayev, Dilmukhanbet1 dimash_dds@mail.ru, Sakan, Kairat1,2 kairat_sks@mail.ru
Publikováno v:
Cogent Engineering. 2022, Vol. 9 Issue 1, p1-13. 13p.
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Dec2023, Vol. 13 Issue 6, p6817-6826, 10p
Publikováno v:
Interdisciplinary Conference on Mechanics, Computers & Electrics (ICMECE); Oct2023, p121-127, 7p
Publikováno v:
Eastern-European Journal of Enterprise Technologies; Vol. 3 No. 9 (123) (2023): Information and controlling system; 6-19
Eastern-European Journal of Enterprise Technologies; Том 3 № 9 (123) (2023): Інформаційно-керуючі системи; 6-19
Eastern-European Journal of Enterprise Technologies; Том 3 № 9 (123) (2023): Інформаційно-керуючі системи; 6-19
Lightweight encryption algorithms are considered a relatively new direction in the development of private key cryptography. This need arose as a result of the emergence of a large number of devices with little computing power and memory. Therefore, i
Autor:
Biyashev, Rustem G.1 brg@ipic.kz, Kapalova, Nursulu A.1 nkapalova@mail.ru, Dyusenbayev, Dilmuhanbet S.1, Algazy, Kunbolat T.1, Wojcik, Waldemar2 waldemar.wojcik@pollub.pl, Smolarz, Andrzej2 a.smolarz@pollub.pl
Publikováno v:
International Journal of Electronics & Telecommunications. 2021, Vol. 67 Issue 1, p127-132. 6p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kapalova, Nursulu1 (AUTHOR) nkapalova@mail.ru, Khompysh, Ardabek2 (AUTHOR) ardabek@mail.ru, Arici, Müslüm1,3 (AUTHOR) muslumarici@gmail.com, Algazy, Kunbolat1,2 (AUTHOR) kunbolat@mail.ru, Pham, Duc4 (AUTHOR)
Publikováno v:
Cogent Engineering. Jan2020, Vol. 7 Issue 1, p1-21. 21p.
Publikováno v:
Open Engineering, Vol 6, Iss 1 (2016)
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number syst
Externí odkaz:
https://doaj.org/article/c95c525fe1044d399f81c167b134f25c