dc.contributor.author | Казміревський, В. В. | uk |
dc.date.accessioned | 2024-03-21T14:08:56Z | |
dc.date.available | 2024-03-21T14:08:56Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Казміревський В. В. The research of infeasibility to linear and differential cryptoanalysis of hashing functions [Electronic resource] / В. В. Казміревський // Матеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р. – Електрон. текст. дані. – 2022. – Режим доступу: https://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16094. | uk |
dc.identifier.uri | http://ir.lib.vntu.edu.ua//handle/123456789/40585 | |
dc.description.abstract | Linear and differential cryptological analysis of hashing algorithms was considered and analyzed. The general structure of the hash code was considered. With the use of this structure, possible attacks on hash functions was considered. The infeasibility of a number of hashing algorithms has been studied. | en |
dc.language.iso | en | en |
dc.publisher | ВНТУ | uk |
dc.relation.ispartof | Матеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р. | uk |
dc.relation.uri | https://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16094 | |
dc.subject | hash function | en |
dc.subject | cryptanalysis | en |
dc.subject | prototype | en |
dc.subject | algorithm | en |
dc.subject | linear cryptanalysis | en |
dc.subject | differential cryptanalysis | en |
dc.title | The research of infeasibility to linear and differential cryptoanalysis of hashing functions | en |
dc.type | Thesis | |
dc.identifier.udc | 004.056 | |
dc.relation.references | Anton Kudin, Bogdan Kovalenko. Differential analysis of hashing functions and block ciphers: a generalized approach.
URL: http://jrnl.nau.edu.ua/index.php/Infosecurity/ article/view/8734 (date of application: 18.05.2022). | en |
dc.relation.references | Cabinet of Ministers of Ukraine - 22 state bodies were affected by the cyber attack on January 14, - State Special Service.
(б.д.). b.d.). Home | Cabinet of Ministers of Ukraine. https://www.kmu.gov.ua/news/vid-kiberataki-14-sichnya-postrazhdali-22-
derzhavnih-organi-derzhspeczvyazku (date of application: 18.05.2022) | en |
dc.relation.references | Cabinet of Ministers of Ukraine - On cyber attacks on the sites of military structures and state banks. (b.d.). Home | cabinet
of Ministers of Ukraine. https://www.kmu.gov.ua/news/shchodo-kiberataki-na-sajti-vijskovih-struktur-ta-derzhavnih-bankiv (date of
application: 18.05.2022) | en |
dc.relation.references | Gaеtan Leurent. Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning. URL:
https://www.iacr.org/archive/eurocrypt2016 /96650217/96650217.pdf (date of application: 18.05.2022). | en |
dc.relation.references | Howard M. Heys. A Tutorial on Linear and Differential Cryptanalysis. URL: https://ioactive.com/wpcontent/uploads/2015/07/ldc_tutorial.pdf (date of application: 18.05.2022). | en |
dc.relation.references | Vitaliy Kazmirevs’kiy Analysis of methods of cryptanalysis of hash functions: materials of the L scientific and technical
conference of the Faculty of Information Technology and Computer Engineering, Vinnytsia, 2021. URL: https://conferences.
vntu.edu.ua/index.php/all-fitki/all-fitki-2021/paper/ view/12543 (date of application: 18.05.2022). | en |
dc.relation.references | Yurii Baryshev, Volodymyr Luzhetsky Methods and means of fast multichannel data hashing in computer systems: a
monograph on the general. ed. Volodymyr Luzhetsky. Vinnytsia, VNTU, 2016. 144 p. | en |