M. Yesina, M. Karpinski, V. Ponomar, Y. Gorbenko, T. Gancarczyk, Uliana Yatsykovska
{"title":"关键封装机制的比较分析","authors":"M. Yesina, M. Karpinski, V. Ponomar, Y. Gorbenko, T. Gancarczyk, Uliana Yatsykovska","doi":"10.1109/IDAACS.2019.8924373","DOIUrl":null,"url":null,"abstract":"The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclusions are made and recommendations on the use of the cryptographic primitives' estimation methods are provided. Also the paper is devoted to the comparative analysis of candidates for the post-quantum key encapsulation standard according to the determined estimation technique. During the analysis, the technique of comparing cryptographic algorithms on the basis of expert estimations using the combination of conditional and unconditional criteria by the analytic hierarchy process was used.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparative Analysis of Key Encapsulation Mechanisms\",\"authors\":\"M. Yesina, M. Karpinski, V. Ponomar, Y. Gorbenko, T. Gancarczyk, Uliana Yatsykovska\",\"doi\":\"10.1109/IDAACS.2019.8924373\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclusions are made and recommendations on the use of the cryptographic primitives' estimation methods are provided. Also the paper is devoted to the comparative analysis of candidates for the post-quantum key encapsulation standard according to the determined estimation technique. During the analysis, the technique of comparing cryptographic algorithms on the basis of expert estimations using the combination of conditional and unconditional criteria by the analytic hierarchy process was used.\",\"PeriodicalId\":415006,\"journal\":{\"name\":\"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDAACS.2019.8924373\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAACS.2019.8924373","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Analysis of Key Encapsulation Mechanisms
The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclusions are made and recommendations on the use of the cryptographic primitives' estimation methods are provided. Also the paper is devoted to the comparative analysis of candidates for the post-quantum key encapsulation standard according to the determined estimation technique. During the analysis, the technique of comparing cryptographic algorithms on the basis of expert estimations using the combination of conditional and unconditional criteria by the analytic hierarchy process was used.