Quasigroups and their applications in cryptography
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …
[图书][B] Elements of quasigroup theory and applications
V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …
technology, in the broader context of the relations between the human made and the natural …
[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain
A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
A blockchain, or in other words a chain of transaction blocks, is a distributed database that
maintains an ordered chain of blocks that reliably connect the information contained in them …
maintains an ordered chain of blocks that reliably connect the information contained in them …
Design of crypto primitives based on quasigroups
S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …
primitives built into the various protocols used for secure communication. Let us mention …
π-Cipher: Authenticated Encryption for Big Data
In today's world of big data and rapidly increasing telecommunications, using secure
cryptographic primitives that are parallelizable and incremental is becoming ever more …
cryptographic primitives that are parallelizable and incremental is becoming ever more …
[PDF][PDF] Isotopy of Latin squares in cryptography
We present a new algorithm for a decision problem if two Latin squares are isotopic. Our
modification has the same complexity as Miller's algorithm, but in many practical situations is …
modification has the same complexity as Miller's algorithm, but in many practical situations is …
[HTML][HTML] Латинские квадраты и их применение в криптографии
МЭ Тужилин - Прикладная дискретная математика, 2012 - cyberleninka.ru
В настоящее время в качестве множества M обычно берется множество натуральных
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …
Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers
K Zhang, J Guan, B Hu - China Communications, 2018 - ieeexplore.ieee.org
In lightweight cryptographic primitives, round functions with only simple operations XOR,
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …
О порождении -квазигрупп с помощью правильных семейств функций
АВ Галатенко, ВА Носов, АЕ Панкратьев… - Дискретная …, 2023 - mathnet.ru
Конечные квазигруппы и n-квазигруппы являются перспективной платформой для
реализации криптоалгоритмов. Одна из актуальных задач заключается в эффективном …
реализации криптоалгоритмов. Одна из актуальных задач заключается в эффективном …
Constructing -bit permutations, -bit involutions and -bit orthomorphisms with almost optimal cryptographic parameters
RA De La Krus Khimenes - Математические вопросы криптографии, 2021 - mathnet.ru
Nonlinear bijective transformations are crucial components in the design of many symmetric
ciphers. To construct permutations having cryptographic properties close to the optimal ones …
ciphers. To construct permutations having cryptographic properties close to the optimal ones …