Investigation of geometry of placement of points of pseudo-random codes in Euclidean space
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2016, Vol 3, Issue 3
Abstract
Analysis of the reasons of crisis of error-correcting coding. Grounded prospects for application of pseudorandom codes and developed their mathematical model. Considered comparative probabilistic characteristics of equal-length and normal casual codes. The evaluation of the properties of the simplest equal-length pseudo-random codes, which were received by method of the linear congruent generation. Proposed of recommendations on the choice of parameters of linear congruent generators code symbols.
Authors and Affiliations
Tamila Lavrovska
Code-based schemes for digital signatures
This article is devoted to the features of construction and use of electronic digital signature schemes based on the use of error-correcting codes, namely the most common scheme, which is based on this approach, CFS and...
THE CONCEPT OF PROCESSING INTEGER DATA REPRESENTED IN THE SYSTEM OF RESIDUE CLASSES
The coding of residues number witch submitted the appropriate modules of residual classes system (RCS), made with data from complete system of the smallest non-negative residues (CSSNR) was show in the article. In this a...
Method of 3D-steganography
In this work, a new direction of technical steganography related to the concealment of information in the process of layer-by-layer creation (cultivation) of a solid-state object using various 3D-printing technologies wa...
О некоторых особенностях криптографических валют и их роли в современных финансовых системах
В работе представлена аргументация относительно места криптовалют в современной мировой финансовой системе. На основании прямых и косвенных данных показано, что криптовалюта всех видов содержит в себе определенные ри...
The research of block ciphers non-injective key schedules properties
The considers non-injective key schedules used in many known block ciphers ("Kalyna", FOX, Twofish, etc.). It is estimated the probability of matching of round keys (formed by non-injective key schedule) set and encrypti...