Показати скорочену інформацію

dc.contributor.authorКазміревський, В. В.uk
dc.date.accessioned2024-03-21T14:08:56Z
dc.date.available2024-03-21T14:08:56Z
dc.date.issued2022
dc.identifier.citationКазміревський В. В. The research of infeasibility to linear and differential cryptoanalysis of hashing functions [Electronic resource] / В. В. Казміревський // Матеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р. – Електрон. текст. дані. – 2022. – Режим доступу: https://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16094.uk
dc.identifier.urihttp://ir.lib.vntu.edu.ua//handle/123456789/40585
dc.description.abstractLinear and differential cryptological analysis of hashing algorithms was considered and analyzed. The general structure of the hash code was considered. With the use of this structure, possible attacks on hash functions was considered. The infeasibility of a number of hashing algorithms has been studied.en
dc.language.isoenen
dc.publisherВНТУuk
dc.relation.ispartofМатеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р.uk
dc.relation.urihttps://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16094
dc.subjecthash functionen
dc.subjectcryptanalysisen
dc.subjectprototypeen
dc.subjectalgorithmen
dc.subjectlinear cryptanalysisen
dc.subjectdifferential cryptanalysisen
dc.titleThe research of infeasibility to linear and differential cryptoanalysis of hashing functionsen
dc.typeThesis
dc.identifier.udc004.056
dc.relation.referencesAnton Kudin, Bogdan Kovalenko. Differential analysis of hashing functions and block ciphers: a generalized approach. URL: http://jrnl.nau.edu.ua/index.php/Infosecurity/ article/view/8734 (date of application: 18.05.2022).en
dc.relation.referencesCabinet of Ministers of Ukraine - 22 state bodies were affected by the cyber attack on January 14, - State Special Service. (б.д.). b.d.). Home | Cabinet of Ministers of Ukraine. https://www.kmu.gov.ua/news/vid-kiberataki-14-sichnya-postrazhdali-22- derzhavnih-organi-derzhspeczvyazku (date of application: 18.05.2022)en
dc.relation.referencesCabinet of Ministers of Ukraine - On cyber attacks on the sites of military structures and state banks. (b.d.). Home | cabinet of Ministers of Ukraine. https://www.kmu.gov.ua/news/shchodo-kiberataki-na-sajti-vijskovih-struktur-ta-derzhavnih-bankiv (date of application: 18.05.2022)en
dc.relation.referencesGaеtan Leurent. Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning. URL: https://www.iacr.org/archive/eurocrypt2016 /96650217/96650217.pdf (date of application: 18.05.2022).en
dc.relation.referencesHoward M. Heys. A Tutorial on Linear and Differential Cryptanalysis. URL: https://ioactive.com/wpcontent/uploads/2015/07/ldc_tutorial.pdf (date of application: 18.05.2022).en
dc.relation.referencesVitaliy Kazmirevs’kiy Analysis of methods of cryptanalysis of hash functions: materials of the L scientific and technical conference of the Faculty of Information Technology and Computer Engineering, Vinnytsia, 2021. URL: https://conferences. vntu.edu.ua/index.php/all-fitki/all-fitki-2021/paper/ view/12543 (date of application: 18.05.2022).en
dc.relation.referencesYurii Baryshev, Volodymyr Luzhetsky Methods and means of fast multichannel data hashing in computer systems: a monograph on the general. ed. Volodymyr Luzhetsky. Vinnytsia, VNTU, 2016. 144 p.en


Файли в цьому документі

Thumbnail

Даний документ включений в наступну(і) колекцію(ї)

Показати скорочену інформацію