Optimized hash functions for integrity control and data recovery in embedded systems

Rozlomii, I. O. and Yarmilko, A. and Naumenko, S. (2023) Optimized hash functions for integrity control and data recovery in embedded systems. Materials of the ХI International Scientific Conference «Information-Management Systems and Technologies». pp. 31-34.

[img] Text
Theses_9.pdf

Download (128kB)

Abstract

The method of constructing a generalized cryptographic hashing method for integrity control and data recovery with the introduction of minimal redundancy is discusses. It is suggested to use a hash code system to control data integrity. They are built according to rules similar to the rules for building linear redundant codes. The method has the potential to be implemented in embedded systems, in particular, in IoT systems.

Item Type: Article
Uncontrolled Keywords: Data integrity control ; data recovery ; hash function ; matrix crypto transformations ; redundant codes
Subjects: Комп'ютерні науки
Комп'ютерні науки
Divisions: Факультет обчислювальної техніки, інтелектуальних та управляючих систем
Depositing User: Наукова Бібліотека
Date Deposited: 22 Feb 2024 14:08
Last Modified: 22 Feb 2024 14:08
URI: https://eprints.cdu.edu.ua/id/eprint/6024

Actions (login required)

View Item View Item