THE IMPLEMENTATION OF STRICT STABLE CRYPTOGRAPHIC CODING OPERATIONS
Main Article Content
Abstract
Article Details
References
Venbo, Mao (2005), Modern cryptography: theory and practice, Publishing house «Vylyams», Moscow, 768 p.
Yakovlev, A.V., Bezbogov, A.A., Rodin, V.V. and Shamkin, V.N. (2006), Cryptographic protection of information, Publishing house TGTU, Tambov, 140 p.
Malec, I.O. (2011), “The role and problems of functioning of telecommunication systems in emergency situations”, Bulletin of Lviv Polytechnic National University, vol. 710: Computer Science and Information Technology, pp. 74–78.
Babenko, V.G., Rudnyckyj, S.V. (2012), “Realization of the method of information protection on the basis of matrix operations of cryptographic transformation”, Information Processing Systems, vol. 9 (107), pp. 130–139.
Rudnyckyj, V.M., Myronets, I.V. and Babenko, V.G. (2011), “Systematization of the Complete Set of Logical Functions for the Cryptographic Information Conversion”, Information Processing Systems, vol. 8 (98), pp. 184–188.
Rudnyckyj, V.M., Babenko, V.G. and Zhylyaev, D.A. (2011), “Algebraic structure of the set of logical coding operations”, Science and Technology of the Air Forces of the Armed Forces of Ukraine, vol. 2 (6), pp. 112–114.
Richard, A.M. (2005), Codes: the guide to secrecy from ancient to modern times, Chapman & Hall. CRC, P. 142.
Thomas, W. Cusick and Pantelimon, Stanica (2009), Cryptographic Boolean Functions and Applications, Academic Press, 248 p.
Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2016), “Analysis of two-digit operations of cryptographic coding on the criterion of severe avalanche effect”, Scientific works of the Petro Mohyla Black Sea State University, vol. 271, pp. 74–77.
Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2016), “Synthesis of operations of cryptographic transformation on the criterion of strictly stable coding”, Bulletin of the Engineering Academy of Ukraine, vol. 3, pp. 105–108.
Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Method of synthesis of operations of cryptographic transformation on the criterion of strictly stable coding”, Bulletin of the Cherkasy State Technological University, vol. 1, pp. 5-10.
Babenko, V.G., Lada, N.V. (2014), “Synthesis and analysis of operations of cryptographic addition by module two”, Information Processing Systems, vol. 2 (118), pp. 116–118.
Babenko, V.G., Lada, N.V. (2016), “The technology of the study of operations by module two”, Smart and Young,
vol. 11-12, pp. 49-54.