Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Larisa Cherckesova"'
Publikováno v:
E3S Web of Conferences. 389:07013
This work is devoted to the development of a modification of the post-quantum public-key cryptosystem NTRUEncrypt. Given that two main requirements for modern cryptographic algorithms are resistance to attacks (including quantum attacks) and performa
Publikováno v:
E3S Web of Conferences. 389:07020
This article is devoted to the implementation of a steganographic software tool for hiding infor-mation in MPEG video files. The method of least significant bits was used to hide the data, and error-correcting coding with binary cyclic codes was used
Autor:
Kristina Kolodyazhnaya, Ekaterina Melnik, Olga Safaryan, Pavel Razumov, Veronika Kravchenko, Larisa Cherckesova, Anna Krutko
Publikováno v:
XIV International Scientific Conference “INTERAGROMASH 2021" ISBN: 9783030816186
This article addresses issues related to the modification of the McEliece cryptosystem. The software development presented in this article is crypto stability, the original McEliece algorithm is post-quantum, unlike its counterparts. The theoretical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6abc5b9ae6185ece36b0da5fa750198
https://doi.org/10.1007/978-3-030-81619-3_24
https://doi.org/10.1007/978-3-030-81619-3_24
Autor:
Parviz Sharifov, Veronika Kravchenko, Olga Safaryan, Pavel Razumov, Daria Belchikova, Larisa Cherckesova, Zalina Kiyashova
Publikováno v:
XIV International Scientific Conference “INTERAGROMASH 2021" ISBN: 9783030816186
The article discusses issues related to the post-quantum public key cryptosystem based on algebraic coding—the Niederreiter cryptographic system. Comparison of this cryptosystem with others that are also based on linear codes. The value, uniqueness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3fb86a9c8aa12587853ba17f7fb449c7
https://doi.org/10.1007/978-3-030-81619-3_19
https://doi.org/10.1007/978-3-030-81619-3_19
Autor:
Alexander Buglak, Michael Babayan, Olga Safaryan, Nikita Gordov, Larisa Cherckesova, Irina A. Pilipenko
Publikováno v:
XIV International Scientific Conference “INTERAGROMASH 2021" ISBN: 9783030816186
In today’s world, optimization is what needs to be talked about. The explosive growth of the Internet and communication technologies has made the widespread use of images inevitable. The special characteristics of the image, such as high bit rate w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ab0cd74a5499dab677c23f53042aae57
https://doi.org/10.1007/978-3-030-81619-3_17
https://doi.org/10.1007/978-3-030-81619-3_17
Autor:
Olga Safaryan, Pavel Razumov, Kristina Rysyatova, Nikita G. Lyashenko, Lydia Chemerigina, Veronika Kravchenko, Larisa Cherckesova
Publikováno v:
XIV International Scientific Conference “INTERAGROMASH 2021" ISBN: 9783030816186
This article discusses the questions related to the modification of SIDH (Supersingular Isogeny Diffie-Hellman Key Exchange) cryptoalgorithm. SIDH is a post-quantum algorithm which can be used to establish a shared secret key between two parties. Sin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b309ad227d1c375f236f299b3bb8fa4
https://doi.org/10.1007/978-3-030-81619-3_18
https://doi.org/10.1007/978-3-030-81619-3_18
Autor:
Larisa Cherckesova, Veronika Kravchenko, Artem Mironenko, Olga Safaryan, Pavel Razumov, Irina A. Pilipenko
Publikováno v:
XIV International Scientific Conference “INTERAGROMASH 2021" ISBN: 9783030816186
XIV International Scientific Conference “INTERAGROMASH 2021"
XIV International Scientific Conference “INTERAGROMASH 2021"
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb92aee57024a7eb741622cce242dcf7
https://doi.org/10.1007/978-3-030-81619-3_20
https://doi.org/10.1007/978-3-030-81619-3_20
Publikováno v:
Proceedings of the International Scientific and Practical Conference on Computer and Information Security.
Publikováno v:
E3S Web of Conferences, Vol 273, p 08049 (2021)
The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was mad
Autor:
Denis A. Korochentsev, Tatyana Nikishina, Irina Reshetnikova, Olga Safaryan, Larisa Cherckesova
Publikováno v:
E3S Web of Conferences, Vol 273, p 08048 (2021)
The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor. Software development, project architecture, testing and other creat