International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 189

Research Paper | Computer Science & Engineering | Russia | Volume 1 Issue 1, October 2012


Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko


Abstract: Noise-resistant modular cryptographic system that functions in polynomial residue classes is considered in this article. An algorithm for bases expansion of the cryptographic system is suggested. An estimation of interference-stability of proposed cryptographic system in relation to the traditional system is presented.


Keywords: Chinese Remainder Theorem, cryptanalyst, cryptography, cryptosystem, modular arithmetic, polynomial residue classes, Galois fields, interference coding


Edition: Volume 1 Issue 1, October 2012,


Pages: 5 - 9


How to Cite this Article?

O. Finko, D. Samoylenko, "Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSR10120103, Volume 1 Issue 1, October 2012, 5 - 9

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'cryptanalyst'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Similar Articles with Keyword 'cryptography'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'cryptosystem'

Downloads: 101

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'Chinese'

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1158 - 1164

Chinese Sign Language Alpha-Numeric Character Classification using Neural Network

R. B. Mapari, G. U. Kharat

Share this Article

Similar Articles with Keyword 'Remainder'

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Downloads: 149

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 572 - 575

Detecting Overlapping Nodes in MLM Chain Network

Sukhada Vader, Mugdha Kirkire, Rajvardhan Babar

Share this Article

Similar Articles with Keyword 'Theorem'

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1876 - 1882

Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment

Dr. K. Suresh Babu, Gardas Pavani

Share this Article
Top