Composite matrix cipher based on perfect binary arrays

被引:1
|
作者
Mazurkov M.I. [1 ]
机构
[1] Odessa National Polytechnic University, Odessa
来源
Mazurkov, M.I. | 1600年 / Allerton Press Incorporation卷 / 56期
关键词
709 Electrical Engineering; General - 716.3 Radio Systems and Equipment;
D O I
10.3103/S0735272713030047
中图分类号
学科分类号
摘要
A composite matrix cipher consisting of four partial ciphers and based on perfect binary arrays has been proposed. This cipher possesses an easily controlled level of data protection from unauthorized access and other practically acceptable computational properties. © 2013 Allerton Press, Inc.
引用
收藏
页码:133 / 140
页数:7
相关论文
共 50 条
  • [31] Operation algorithms and block diagrams of codecs of orthogonal codes based on perfect binary arrays
    Mazurkov M.I.
    Gerasimenko M.Yu.
    Radioelectronics and Communications Systems, 2007, 50 (12) : 674 - 679
  • [32] Asymmetric Binary Plasmon Resonator Arrays for Perfect Trapping of Light
    Guo, Ling
    Sun, Zhijun
    PLASMONICS, 2017, 12 (02) : 315 - 320
  • [33] Asymmetric Binary Plasmon Resonator Arrays for Perfect Trapping of Light
    Ling Guo
    Zhijun Sun
    Plasmonics, 2017, 12 : 315 - 320
  • [34] 2-DIMENSIONAL PERFECT BINARY ARRAYS WITH 64 ELEMENTS
    BOMER, L
    ANTWEILER, M
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (02) : 411 - 414
  • [36] Cubical binary arrays with perfect odd-periodic autocorrelation
    Lüke, HD
    SIGNAL PROCESSING, 2004, 84 (01) : 125 - 132
  • [37] ON THE CONCEPT OF A epsilon-PERFECT CIPHER
    Zubov, A. Yu.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2016, 33 (03): : 45 - 52
  • [38] Matrix Power Cipher
    Luksys, Kestutis
    Sakalauskas, Eligijus
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (04): : 349 - 355
  • [39] Design of AES based on dual cipher and composite field
    Wu, SY
    Lu, SC
    Laih, CS
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 25 - 38
  • [40] On perfect Arrays
    Matsufuji, S
    Tanada, Y
    Fujimoto, A
    Suehiro, N
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 433 - 433