图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v78.i4.40
pages 327-340

CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY

I. D. Gorbenko
V. Karazin National University of Kharkiv, 4 Svoboda Sq., Kharkiv, 61022, Ukraine; Kharkiv National University of Radio Electronics, 14, Nauka Ave., Kharkiv, 61166, Ukraine
A. N. Alekseychuk
Institute for Special Communications and Information Protection of the National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 4 Verkhnokliuchova St., Kyiv 03056, Ukraine
O. G. Kachko
Kharkiv National University of Radio Electronics, 14 Nauka Ave., Kharkiv 61166, Ukraine
M. V. Yesina
V. Karazin National University of Kharkiv, 4 Svoboda Sq., Kharkiv 61022, Ukraine
I. V. Stelnik
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
S. O. Kandy
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
V. A. Bobukh
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine
V. A. Ponomar
Institute of Information Technologies, 12 Bakulina St., Kharkiv 61166, Ukraine

ABSTRACT

The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys for cryptographic transformations such as asymmetric ciphers and the key encapsulation protocol was performed. The experimental confirmation of the built-in system-wide parameters and keys of cryptographic transformations such as asymmetric cipher and the key encapsulation protocol of 6 – 7 stability levels based on transformations in the ring of polynomials over the finite fields is presented. The types of attacks that are possible with respect to the specified cryptographic transformations are also presented in this work.


Articles with similar content:

METHODS OF BUILDING GENERAL PARAMETERS AND KEYS FOR NTRU PRIME UKRAINE OF 5TH – 7TH LEVELS OF STABILITY. PRODUCT FORM
Telecommunications and Radio Engineering, Vol.78, 2019, issue 7
S. O. Kandy, M. V. Yesina, O. G. Kachko, I. D. Gorbenko, Yu. I. Gorbenko, I. V. Stelnik
ASYMMETRIC NONLINEAR BENDING ANALYSIS OF POLYMERIC COMPOSITE ANNULAR PLATES REINFORCED WITH GRAPHENE NANOPLATELETS
International Journal for Multiscale Computational Engineering, Vol.17, 2019, issue 1
Reza Ansari, R. Gholami
Geometric and Variational Model Order Reduction Methods. Comparative Analysis
Journal of Automation and Information Sciences, Vol.50, 2018, issue 1
Vyacheslav F. Gubarev, Vladislav V. Fatenko
ELASTIC PROPERTIES OF QUASIPERIODIC COMPOSITES WITH ACCOUNT FOR CORRELATION FUNCTIONS OF THE STRUCTURE
Nanoscience and Technology: An International Journal, Vol.2, 2011, issue 3
A. A. Pankov
VIBRATIONAL ANALYSIS OF HYBRID FABRIC-REINFORCED POLYMER MATRIX CURVED COMPOSITE BEAMS
Composites: Mechanics, Computations, Applications: An International Journal, Vol.9, 2018, issue 3
Kunj Jain, B. Santosh Kumar, S. Ayyappan, Gopalan Venkatachalam, S. Vimalanand