Articolul precedent |
Articolul urmator |
392 3 |
Ultima descărcare din IBN: 2022-01-31 19:27 |
Căutarea după subiecte similare conform CZU |
004.056+512.548+519.7 (1) |
Computer science and technology. Computing. Data processing (4184) |
Algebra (410) |
Mathematical cybernetics (94) |
SM ISO690:2012 MALYUTINA, Nadezhda. Cryptanalysis of some stream ciphers based on n-ary groupoids. In: Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători, Ed. Ediția IX, 15 iunie 2020, Chișinău. Chișinău, Republica Moldova: Tipogr. „Biotehdesign”, 2020, Ediția 9, Vol.1, pp. 35-40. ISBN 978-9975-108-66-9. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători Ediția 9, Vol.1, 2020 |
||||||
Conferința "Tendințe contemporane ale dezvoltării științei: viziuni ale tinerilor cercetători" Ediția IX, Chișinău, Moldova, 15 iunie 2020 | ||||||
|
||||||
CZU: 004.056+512.548+519.7 | ||||||
Pag. 35-40 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
This article is a continuation ofthe work presented in [2].We demonstrate that Vojvoda attacks [9,10] on Markovski cipher [4,6] can be modified on generalized Markovski cipher based on i-invertible n-ary groupoids [1,7,8].We describe the attacks on generalized Markovski algorithm using the selected ciphertext and the plaintext. |
||||||
|
Cerif XML Export
<?xml version='1.0' encoding='utf-8'?> <CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'> <cfResPubl> <cfResPublId>ibn-ResPubl-112690</cfResPublId> <cfResPublDate>2020</cfResPublDate> <cfVol>Ediția 9, Vol.1</cfVol> <cfStartPage>35</cfStartPage> <cfISBN>978-9975-108-66-9</cfISBN> <cfURI>https://ibn.idsi.md/ro/vizualizare_articol/112690</cfURI> <cfTitle cfLangCode='EN' cfTrans='o'>Cryptanalysis of some stream ciphers based on n-ary groupoids</cfTitle> <cfAbstr cfLangCode='EN' cfTrans='o'><p>This article is a continuation ofthe work presented in [2].We demonstrate that Vojvoda attacks [9,10] on Markovski cipher [4,6] can be modified on generalized Markovski cipher based on i-invertible n-ary groupoids [1,7,8].We describe the attacks on generalized Markovski algorithm using the selected ciphertext and the plaintext.</p></cfAbstr> <cfResPubl_Class> <cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId> <cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId> <cfStartDate>2020T24:00:00</cfStartDate> </cfResPubl_Class> <cfResPubl_Class> <cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId> <cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId> <cfStartDate>2020T24:00:00</cfStartDate> </cfResPubl_Class> <cfPers_ResPubl> <cfPersId>ibn-person-58398</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2020T24:00:00</cfStartDate> </cfPers_ResPubl> </cfResPubl> <cfPers> <cfPersId>ibn-Pers-58398</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-58398-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2020T24:00:00</cfStartDate> <cfFamilyNames>Malyutina</cfFamilyNames> <cfFirstNames>Nadezhda</cfFirstNames> <cfFamilyNames>Малютина</cfFamilyNames> <cfFirstNames>Надежда</cfFirstNames> </cfPersName_Pers> </cfPers> </CERIF>