Articolul precedent |
Articolul urmator |
646 1 |
Ultima descărcare din IBN: 2020-09-29 11:24 |
SM ISO690:2012 BALABANOV, Anatolii, AGAFONOV, Anatolii, IZVOREANU, Bartolomeu, FIODOROV, Ion, COJUHARI, Irina, MORARU, Dumitru. The use of Cryptographic Techniques RSA-m to Protect the Information in Real Time. In: Information Technologies and Security: 2012, 15-16 octombrie 2012, Chișinău. Chișinău, Republica Moldova: Consiliul Naţional pentru Acreditare şi Atestare, 2012, pp. 266-277. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Information Technologies and Security 2012 | ||||||
Conferința "Information Technologies and Security" Chișinău, Moldova, 15-16 octombrie 2012 | ||||||
|
||||||
Pag. 266-277 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
In this paper the authors propose an advanced algorithm of RSA (modernized "kriptolock"). This algorithm is proposed to use for encoding the information with a short term of secrecy, when the attack are encrypted blocks of discrete analog signal, whereby the decoding of the information flow in real summer time is almost impossible. |
||||||
Cuvinte-cheie cryptographic, Systems, asymmetric, algorithm, RSA, information, secrecy, signal |
||||||
|
Dublin Core Export
<?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:oai_dc='http://www.openarchives.org/OAI/2.0/oai_dc/' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd'> <dc:creator>Balabanov, A.</dc:creator> <dc:creator>Agafonov, A.</dc:creator> <dc:creator>Izvoreanu, B.A.</dc:creator> <dc:creator>Fiodorov, I.P.</dc:creator> <dc:creator>Cojuhari, I.B.</dc:creator> <dc:creator>Moraru, D.</dc:creator> <dc:date>2012</dc:date> <dc:description xml:lang='en'><p>In this paper the authors propose an advanced algorithm of RSA (modernized "kriptolock"). This algorithm is proposed to use for encoding the information with a short term of secrecy, when the attack are encrypted blocks of discrete analog signal, whereby the decoding of the information flow in real summer time is almost impossible.</p></dc:description> <dc:source>Information Technologies and Security () 266-277</dc:source> <dc:subject>cryptographic</dc:subject> <dc:subject>Systems</dc:subject> <dc:subject>asymmetric</dc:subject> <dc:subject>algorithm</dc:subject> <dc:subject>RSA</dc:subject> <dc:subject>information</dc:subject> <dc:subject>secrecy</dc:subject> <dc:subject>signal</dc:subject> <dc:title>The use of Cryptographic Techniques RSA-m to Protect the Information in Real Time</dc:title> <dc:type>info:eu-repo/semantics/article</dc:type> </oai_dc:dc>