Cryptanalysis of some stream ciphers based on n-ary groupoids
Close
Articolul precedent
Articolul urmator
392 3
Ultima descărcare din IBN:
2022-01-31 19:27
Căutarea după subiecte
similare conform CZU
004.056+512.548+519.7 (1)
Computer science and technology. Computing. Data processing (4184)
Algebra (410)
Mathematical cybernetics (94)
SM ISO690:2012
MALYUTINA, Nadezhda. Cryptanalysis of some stream ciphers based on n-ary groupoids. In: Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători, Ed. Ediția IX, 15 iunie 2020, Chișinău. Chișinău, Republica Moldova: Tipogr. „Biotehdesign”, 2020, Ediția 9, Vol.1, pp. 35-40. ISBN 978-9975-108-66-9.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători
Ediția 9, Vol.1, 2020
Conferința "Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători"
Ediția IX, Chișinău, Moldova, 15 iunie 2020

Cryptanalysis of some stream ciphers based on n-ary groupoids

CZU: 004.056+512.548+519.7

Pag. 35-40

Malyutina Nadezhda
 
State University „Dimitrie Cantemir”
 
 
Disponibil în IBN: 30 octombrie 2020


Rezumat

This article is a continuation ofthe work presented in [2].We demonstrate that Vojvoda attacks [9,10] on Markovski cipher [4,6] can be modified on generalized Markovski cipher based on i-invertible n-ary groupoids [1,7,8].We describe the attacks on generalized Markovski algorithm using the selected ciphertext and the plaintext.

Cerif XML Export

<?xml version='1.0' encoding='utf-8'?>
<CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'>
<cfResPubl>
<cfResPublId>ibn-ResPubl-112690</cfResPublId>
<cfResPublDate>2020</cfResPublDate>
<cfVol>Ediția 9, Vol.1</cfVol>
<cfStartPage>35</cfStartPage>
<cfISBN>978-9975-108-66-9</cfISBN>
<cfURI>https://ibn.idsi.md/ro/vizualizare_articol/112690</cfURI>
<cfTitle cfLangCode='EN' cfTrans='o'>Cryptanalysis of some stream ciphers based on n-ary groupoids</cfTitle>
<cfAbstr cfLangCode='EN' cfTrans='o'><p>This article is a continuation ofthe work presented in [2].We demonstrate that Vojvoda attacks [9,10] on Markovski cipher [4,6] can be modified on generalized Markovski cipher based on i-invertible n-ary groupoids [1,7,8].We describe the attacks on generalized Markovski algorithm using the selected ciphertext and the plaintext.</p></cfAbstr>
<cfResPubl_Class>
<cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId>
<cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId>
<cfStartDate>2020T24:00:00</cfStartDate>
</cfResPubl_Class>
<cfResPubl_Class>
<cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId>
<cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId>
<cfStartDate>2020T24:00:00</cfStartDate>
</cfResPubl_Class>
<cfPers_ResPubl>
<cfPersId>ibn-person-58398</cfPersId>
<cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId>
<cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId>
<cfStartDate>2020T24:00:00</cfStartDate>
</cfPers_ResPubl>
</cfResPubl>
<cfPers>
<cfPersId>ibn-Pers-58398</cfPersId>
<cfPersName_Pers>
<cfPersNameId>ibn-PersName-58398-3</cfPersNameId>
<cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId>
<cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId>
<cfStartDate>2020T24:00:00</cfStartDate>
<cfFamilyNames>Malyutina</cfFamilyNames>
<cfFirstNames>Nadezhda</cfFirstNames>
<cfFamilyNames>Малютина</cfFamilyNames>
<cfFirstNames>Надежда</cfFirstNames>
</cfPersName_Pers>
</cfPers>
</CERIF>