최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Open engineering, v.6 no.1, 2016년, pp. -
Nyssanbayeva, Saule , Kalimoldayev, Maksat , Magzom, Miras
AbstractThe purpose of research - studying the possibilities of practical application of the encryption algorithm based on nonpositional polynomial notations using nested Feistel network. In this paper, a mathematical model of non-conventional encryption algorithm with recursive Feistel network and the encryption mode is described.
[1] Pohst M., Zassenhaus H., Algorithmic algebraic number theory, Cambridge University Press, New York, 198910.1017/CBO9780511661952
10.1007/s10559-012-9428-5 [2] Biyashev R., Nyssanbayeva S., Algorithm for creation a digital signature with error detection and correction, Cybern. Syst. Anal., 2012, 4, 489-49710.1007/s10559-012-9428-5
10.1038/scientificamerican0573-15 [3] Feistel H., Cryptography and Computer Privacy, Sci. Am., 1973, 228, 5, 15-2310.1038/scientificamerican0573-15
[4] Bassham L., Burr W., Dworkin M., Foti J., Roback E., Report on the development of the Advanced Encryption Standard (AES), NIST, U.S. Department of Commerce, 2000
[5] Matsui M., Tokita T., MISTY, KASUMI and Camellia cipher algorithm development. Mitsubishi Electr. Ad., 2002, 100, 1-8
[6] Kapalova N., Nyssanbayeva S., Khakimov R., Irreducible polynomials over the field GF (2n), Proceedings of "KAKHAK" scientifictechnical society (Almaty, Kazakhstan), 2013, 1, 17-28
[7] Biyashev R., Nyssanbayeva S., Begimbayeva Ye., Magzom M., Building modified modular cryptographic systems, Int. J. APMAIN, 2015, 9, 103-109
[10] Schneier B., Kelsey J., Unbalanced Feistel networks and block cipher design, Proceedings of the Third International Workshop on Fast Software Encryption (21-23 February 1996, Cambridge, UK), Springer-Verlag, 1996, 121-14410.1007/3-540-60865-6_49
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.