Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 189 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | Russia | Volume 1 Issue 1, October 2012

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Noise-resistant modular cryptographic system that functions in polynomial residue classes is considered in this article. An algorithm for bases expansion of the cryptographic system is suggested. An estimation of interference-stability of proposed cryptographic system in relation to the traditional system is presented.

Keywords: Chinese Remainder Theorem, cryptanalyst, cryptography, cryptosystem, modular arithmetic, polynomial residue classes, Galois fields, interference coding

Edition: Volume 1 Issue 1, October 2012

Pages: 5 - 9

Share this Article

How to Cite this Article?

O. Finko, D. Samoylenko, "Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR10120103, Volume 1 Issue 1, October 2012, 5 - 9

Enter Your Registered Email Address





Similar Articles with Keyword 'Chinese Remainder Theorem'

Downloads: 109 | Weekly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Downloads: 189 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article

Similar Articles with Keyword 'cryptanalyst'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 120 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Downloads: 126 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1507 - 1513

Encryption and Decryption Using Bit Operations

Gurubasava, Rajesh Budihal

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Downloads: 189 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article

Similar Articles with Keyword 'cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'cryptosystem'

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Downloads: 102 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 104 | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1493 - 1496

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B

Share this Article

Similar Articles with Keyword 'modular arithmetic'

Downloads: 121 | Weekly Hits: ⮙4 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 977 - 979

Development of New Algorithm for Finding Inverse of Modular Multiplication

Dr. J. Thirumaran, S. Raja

Share this Article

Downloads: 189 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article



Top