MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the re...
Saved in:
Main Authors: | A. Beletsky (Author), D. Stecenko (Author) |
---|---|
Format: | Book |
Published: |
Kherson State University,
2010-07-01T00:00:00Z.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS
by: Anatoly Beletsky
Published: (2016) -
The Symmetrical Block Rsb-32 Encryption Algorithm With Dynamic Encryption Settings.
by: A. Beletsky, et al.
Published: (2009) -
Chapter Biometric Keys for the Encryption of Multimodal Signatures
by: Moustakas, Konstantinos
Published: (2011) -
Chapter Biometric Keys for the Encryption of Multimodal Signatures
by: Moustakas, Konstantinos
Published: (2011) -
Trends in Data Protection and Encryption Technologies
Published: (2023)