Перегляд за автором "Kachko, O. G."
Зараз показано 1 - 3 з 3
Результатів на сторінку
Варіанти сортування
Публікація General parameters for NTRU PRIME UKRAINE 5 – 7 stabvility levels calculation(ХНУРЭ, 2018) Gorbenko, I. D.; Alekseychuk, A. N.; Kachko, O. G.; Yesina, M. V.; Bobukh, V. A.; Kandy, S. O.; Ponomar, V. A.The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed in the paper. The experimental confirmation of the built-in system-wide parameters and keys of cryptographic transformations such as asymmetric cipher and the key encapsulation protocol of 6-7 stability levels based on transformations in the ring of polynomials over the finite fields is presented. Also in the work there are types of attacks that are possible with respect to the specified cryptographic transformations.Публікація Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form(ХНУРЭ, 2018) Gorbenko, I. D.; Kachko, O. G.; Gorbenko, Yu. I.; Stelnik, I. V.; Kandy, S. O.; Yesina, M. V.The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed in the paper. The experimental confirmation of the built-in system-wide parameters and keys of cryptographic transformations such as asymmetric cipher for a special form of setting the Product Form polynomial was performed. The experimential confirmation of the build in system-wide parameters for 7-7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack is given.Публікація Optimization of NTRU Prime asymmetric encryption algorithm(ХНУРЭ, 2017) Kachko, O. G.; Gorbenko, Yu. I.; Esina, M. V.; Akolzina, O. S.The results of algorithms optimization for the post-quantum mechanism of asymmetric encryption NTRU Prime are given. Namely: module reduction, blinding polynomial calculation, encryption and decryption algorithms. A comparative analysis of different polynomials multiplications is also given