Voir la notice de l'article provenant de la source Math-Net.Ru
@article{INTO_2022_214_a6, author = {V. E. Mutsenek}, title = {The scenario of using a social network as a source of key material for the one-time pad}, journal = {Itogi nauki i tehniki. Sovremenna\^a matematika i e\"e prilo\v{z}eni\^a. Temati\v{c}eskie obzory}, pages = {60--68}, publisher = {mathdoc}, volume = {214}, year = {2022}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/INTO_2022_214_a6/} }
TY - JOUR AU - V. E. Mutsenek TI - The scenario of using a social network as a source of key material for the one-time pad JO - Itogi nauki i tehniki. Sovremennaâ matematika i eë priloženiâ. Tematičeskie obzory PY - 2022 SP - 60 EP - 68 VL - 214 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/INTO_2022_214_a6/ LA - ru ID - INTO_2022_214_a6 ER -
%0 Journal Article %A V. E. Mutsenek %T The scenario of using a social network as a source of key material for the one-time pad %J Itogi nauki i tehniki. Sovremennaâ matematika i eë priloženiâ. Tematičeskie obzory %D 2022 %P 60-68 %V 214 %I mathdoc %U http://geodesic.mathdoc.fr/item/INTO_2022_214_a6/ %G ru %F INTO_2022_214_a6
V. E. Mutsenek. The scenario of using a social network as a source of key material for the one-time pad. Itogi nauki i tehniki. Sovremennaâ matematika i eë priloženiâ. Tematičeskie obzory, Algebra, Geometry, and Combinatorics, Tome 214 (2022), pp. 60-68. http://geodesic.mathdoc.fr/item/INTO_2022_214_a6/
[1] Avdonin I. A., Budko M. B., Grozov V. A., “Organizatsiya zaschity dannykh, peredavaemykh mezhdu bespilotnym letatelnym apparatom i nazemnoi stantsiei upravleniya, na osnove shifra Vernama”, Nauch.-tekhn. vestn. inform. tekhnol. mekh. opt., 2016, no. 5, 850–855
[2] Artamoshkin M., Otbor priznakov polzovatelya sotsialnoi seti dlya postroeniya modeli mashinnogo obucheniya. https://blog.zverit.com/
[3] Grebennikov V. V., Amerikanskaya kriptologiya. Istoriya spetssvyazi, Litres: Samizdat, M., 2019
[4] Duzhnikova A. S., “Sotsialnye seti: sovremennye tendentsii i tipy polzovaniya”, Monitoring obschestvennogo mneniya., 2010, no. 5 (99), 238–251
[5] Zhukov K. D., “Obzor atak na AES-128: k pyatnadtsatiletiyu standarta AES”, Prikl. diskr. mat., 2017, no. 35, 48–62 | Zbl
[6] Abiodun E. O., Aman J., Oludare I. A., Humaira A., “An enhanced practical difficulty of one-time pad algorithm resolving the key management and distribution problem”, Lect. Notes Eng. Comput. Sci., Proc. Int. Multiconf. of Engineers and Computer Scientists (Hong Kong, March 14–16, 2018), 2018, 409–415
[7] Bansimba G. R., Babindamana R. F., Peter A. G., “A new approach in one time pad key management”, Res. J. Math. Comput. Sci., 3:17 (2019), 1–8
[8] Blackledge J. et al., “Secrecy and randomness: encoding cloud data locally using a one-time pad”, Int. J. Adv. Security., 10:3–4 (2017), 167–181
[9] Brosas D. G., Sison A. M., Medina R. P., “Strengthening the Vernam cipher algorithm using multilevel encryption techniques”, Int. J. Sci. Technol. Res., 8:10 (2019), 601–606
[10] Brosas D. G., Sison A. M., Medina R. P., Hernandez A., “Analysis of the randomness performance of the proposed stream cipher based cryptographic algorithm”, 11th IEEE Control and System Graduate Research Colloquium (Shah Alam, Malaysia, 2020), 2020, 76–81
[11] Chandrakar S., Tiwari S., Shree Jain B., “An innovative approach for implementation of one-time pads”, Int. J. Comput. Appl., 89:13 (2014), 35–37
[12] Dent A. W., “Implementation attack against EPOC-2 public-key cryptosystem”, Electr. Lett., 2002, no. 38, 412–413 | DOI
[13] Devipriya M., Sasikala G., “A new technique for one time pad security scheme with complement method”, Int. J. Adv. Res. Comput. Sci. Software Eng., 5:6 (2015), 220–223
[14] Limaye S., Thadathil R.., “Influence of social media on behavior patterns”, Proc. Natl. Conf. on Research In Information Technology And Management (Bangalore, 2016), 2016, 1–4 | Zbl
[15] Pelosi M. J., Kessler G., Brown M. S. S., “One-time pad encryption steganography system”, Proc. Conf. “Annual ADFSL Conference on Digital Forensics, Security and Law” (Daytona Beach, Florida, 2016), 2016, 131–154
[16] Tang S., Liu F., “A one-time pad encryption algorithm based on one-way hash and conventional block cipher”, Proc. 2 Int. Conf. on Consumer Electronics, Communications and Networks, 2012, 72–74
[17] Upadhyay G., Nene M. J., “One time pad generation using quantum superposition states”, Proc. IEEE Int. Conf. on Recent Trends in Electronics, Information, and Communication Technology (Bangalore, 2016), 2016, 1882–1886
[18] Wang X., Yin Y. L., Yu H., “Finding collisions in the full SHA-1”, Adv. Cryptology., 3621 (2005), 17–36 | MR | Zbl
[19] Zhou Y., Feng D., Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing, Cryptology ePrint Archive, Report 2005/388. https://ia.cr/2005/388