Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Yury O Chernyshev"'
Publikováno v:
Advanced Engineering Research, Vol 17, Iss 1, Pp 144-159 (2017)
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of t
Externí odkaz:
https://doaj.org/article/aae3ee659f1a4b9abbff18010ade700e
Publikováno v:
Вестник Донского государственного технического университета, Vol 11, Iss 9, Pp 1544-1554 (2018)
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered. The algorithms of ant and bee colonies for the composite numbe
Externí odkaz:
https://doaj.org/article/9125c803d67f40e7bac7619d6ffdd549
Publikováno v:
Вестник Донского государственного технического университета, Vol 12, Iss 5, Pp 68-76 (2018)
The problem areas requiring the intellectual support for solving optimization tasks are considered. The adaptive algorithm of the optimization tasks solution support on the basis of the linguistic commands is deve loped. Both a ccurate and fuzzy para
Externí odkaz:
https://doaj.org/article/00bd4dd213df412388ab4f6a5858a225
Publikováno v:
Advanced Engineering Research, Vol 17, Iss 1, Pp 144-159 (2017)
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of t
Autor:
Alexander N. Ryazanov, Alexander Sergeyevich Sergeyev, Yury O. Chernyshev, Nikolay N. Ventsov
Publikováno v:
Advanced Engineering Research, Vol 15, Iss 3, Pp 65-72 (2015)
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the pos
Publikováno v:
Advanced Engineering Research, Vol 12, Iss 5, Pp 68-76 (2012)
Вестник Донского государственного технического университета, Vol 12, Iss 5, Pp 68-76 (2018)
Вестник Донского государственного технического университета, Vol 12, Iss 5, Pp 68-76 (2018)
The problem areas requiring the intellectual support for solving optimization tasks are considered. The adaptive algorithm of the optimization tasks solution support on the basis of the linguistic commands is deve loped. Both a ccurate and fuzzy para
Publikováno v:
Advanced Engineering Research, Vol 11, Iss 5, Pp 715-722 (2011)
Вестник Донского государственного технического университета, Vol 11, Iss 5, Pp 715-722 (2018)
Вестник Донского государственного технического университета, Vol 11, Iss 5, Pp 715-722 (2018)
The optimum problem of the allocation of tasks for executing in the cluster is considered. Task control algorithms are elaborated. The algorithms validation is done in the performance of the transportation problem on the local network cluster. The da
Publikováno v:
Вестник Донского государственного технического университета, Vol 11, Iss 5, Pp 715-722 (2018)
The optimum problem of the allocation of tasks for executing in the cluster is considered. Task control algorithms are elaborated. The algorithms validation is done in the performance of the transportation problem on the local network cluster. The da
Externí odkaz:
https://doaj.org/article/427b65cf97fa43f98966db7e0314e525
Publikováno v:
Advanced Engineering Research, Vol 15, Iss 3, Pp 65-72 (2015)
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the pos
Externí odkaz:
https://doaj.org/article/c03fa06be6a74a93bc72e7799bd0b52d
Publikováno v:
Advanced Engineering Research, Vol 11, Iss 9, Pp 1544-1554 (2011)
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered. The algorithms of ant and bee colonies for the composite numbe
Externí odkaz:
https://doaj.org/article/5cfc1109c63648ab8cbf93b822134294