Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Saule Nyssanbayeva"'
Publikováno v:
Computation, Vol 12, Iss 6, p 125 (2024)
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures. The proposed Syrga2 scheme belongs to the class of multi-use signatures wit
Externí odkaz:
https://doaj.org/article/606bed529b3b495e864556437dbd1dd7
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 67, Iss No 2, Pp 235-240 (2021)
The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and genera
Externí odkaz:
https://doaj.org/article/9c258bcbb25a4fa99269948fec058b0a
Autor:
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva, Dilmukhanbet Dyusenbayev
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 10173 (2022)
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 alg
Externí odkaz:
https://doaj.org/article/82835704354a4f30a1a7573d6661d36f
Autor:
Olga Ussatova, Saule Nyssanbayeva
Publikováno v:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, Vol 9, Iss 2 (2019)
The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a s
Externí odkaz:
https://doaj.org/article/9edd2ffb3308469aaaedd429c3d5716b
Publikováno v:
Open Engineering. 12:570-577
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algo
Publikováno v:
SERIES PHYSICO-MATHEMATICAL. 5:100-110
Autor:
Kairat Sakan, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, Dilmukhanbet Dyusenbayev
Publikováno v:
Eastern-European Journal of Enterprise Technologies; Vol. 2 No. 9 (116) (2022): Information and controlling system; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construc
Publikováno v:
Вестник КазНУ. Серия математика, механика, информатика, Vol 101, Iss 1, Pp 87-95 (2019)
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is c
Autor:
Rustem Biyashev, N.A. Kapalova, K.T. Algazy, D.S. Dyusenbayev, Maksat Kalimoldayev, Saule Nyssanbayeva
Publikováno v:
Scopus-Elsevier
Autor:
Ludmila Babenko, Nursulu Kapalova, Rustem Biyashev, Kunbolat Algazy, Saule Nyssanbayeva, Evgeniya Ishchukova
Publikováno v:
SIN
Currently, the Republic of Kazakhstan is creating a new standard for symmetric data encryption. Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan), which is one of the candi