Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quasigroups and their applications in cryptography
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
[КНИГА][B] Elements of quasigroup theory and applications
V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …
technology, in the broader context of the relations between the human made and the natural …
[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain
A blockchain, or in other words a chain of transaction blocks, is a distributed database that
maintains an ordered chain of blocks that reliably connect the information contained in them …
maintains an ordered chain of blocks that reliably connect the information contained in them …
Design of crypto primitives based on quasigroups
S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …
primitives built into the various protocols used for secure communication. Let us mention …
Латинские квадраты и их применение в криптографии
МЭ Тужилин - Прикладная дискретная математика, 2012 - cyberleninka.ru
В настоящее время в качестве множества M обычно берется множество натуральных
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …
π-Cipher: Authenticated Encryption for Big Data
In today's world of big data and rapidly increasing telecommunications, using secure
cryptographic primitives that are parallelizable and incremental is becoming ever more …
cryptographic primitives that are parallelizable and incremental is becoming ever more …
[PDF][PDF] Isotopy of Latin squares in cryptography
OGM Sýs - Tatra Mt. Math. Publ, 2010 - sciendo.com
We present a new algorithm for a decision problem if two Latin squares are isotopic. Our
modification has the same complexity as Miller's algorithm, but in many practical situations is …
modification has the same complexity as Miller's algorithm, but in many practical situations is …
Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers
K Zhang, J Guan, B Hu - China Communications, 2018 - ieeexplore.ieee.org
In lightweight cryptographic primitives, round functions with only simple operations XOR,
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …
Algorithms for Checking Some Properties of n-Quasigroups
AV Galatenko, AE Pankratiev… - … and Computer Software, 2022 - Springer
Efficient algorithms for checking some properties of n-quasigroups that are important from
the cryptography point of view are described. These are the properties of polynomial …
the cryptography point of view are described. These are the properties of polynomial …
Constructing -bit permutations, -bit involutions and -bit orthomorphisms with almost optimal cryptographic parameters
RA De La Krus Khimenes - Математические вопросы криптографии, 2021 - mathnet.ru
Nonlinear bijective transformations are crucial components in the design of many symmetric
ciphers. To construct permutations having cryptographic properties close to the optimal ones …
ciphers. To construct permutations having cryptographic properties close to the optimal ones …