Zobrazeno 1 - 5
of 5
pro vyhledávání: '"M. L. Radziukevich"'
Autor:
M. L. Radziukevich
Publikováno v:
Sistemnyj Analiz i Prikladnaâ Informatika, Vol 0, Iss 3, Pp 51-58 (2021)
This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two
Externí odkaz:
https://doaj.org/article/cf1866c65c3e4499931c42b8f5514872
Autor:
M. L. Radziukevich, V. F. Golikov
Publikováno v:
Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, Vol 19, Iss 1, Pp 79-87 (2021)
А combined method for forming a cryptographic key is proposed in the article. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimin
Externí odkaz:
https://doaj.org/article/3f25ae63384c4e3aa1edf290bc9237f0
Autor:
M. L. Radziukevich, V. F. Golikov
Publikováno v:
Informatika, Vol 17, Iss 1, Pp 102-108 (2020)
The main options for the formation of a shared secret using synchronized artificial neural networks and possible patterns of behavior of a cryptanalyst are considered. To solve the problem of increasing the confidentiality of the generated shared sec
Externí odkaz:
https://doaj.org/article/5d7460d0f8154c4db4512a53e0bb0da2
Autor:
U. F. Holikau, M. L. Radziukevich
Publikováno v:
Sistemnyj Analiz i Prikladnaâ Informatika, Vol 0, Iss 2, Pp 49-56 (2019)
In the Kanter’s and Kinsella’s works is proposes the use of two synchronized artificial neural networks (SANN) connected by opening communication channel to confidential formation of a common cryptographic key. At the same time, there are few que
Externí odkaz:
https://doaj.org/article/2aa19f3a13e3459db7d16a854c717a56
Autor:
V. F. Golikov, M. L. Radziukevich
Publikováno v:
Informatika, Vol 17, Iss 1, Pp 102-108 (2020)
The main options for the formation of a shared secret using synchronized artificial neural networks and possible patterns of behavior of a cryptanalyst are considered. To solve the problem of increasing the confidentiality of the generated shared sec