A course in number theory and cryptography
A course in number theory and cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Introduction to Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fundamentals of Computer Security
Fundamentals of Computer Security
Cryptography: An Introduction
Another Look at "Provable Security"
Journal of Cryptology
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
Automation and Remote Control
Hi-index | 0.00 |
New algebraic structures differing from the existing ones in new kinds of operations over finite sets of m-dimensional vectors (m 驴 2) with discrete components were developed to construct information authentication algorithms for the automatic control systems. The operation of vector multiplication including multiplication and summation of the coordinates of the multiplied vectors modulo simple number p was defined. Depending on the structure of module p, dimensionality m, and value of the "extension" coefficients defined in terms of the rules of multiplication of the base vectors, the vector spaces were shown to include high-order finite groups or be extended fields that can be efficiently used to construct effective algorithms of electronic digital signature.