|
Issue |
Title |
|
No 3 (2023) |
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors |
Abstract
PDF (Rus)
|
A. V. Vasilyev |
|
No 3 (2022) |
Mathematical model of a steganographic system based on key information in the form of stegosets |
Abstract
PDF (Rus)
|
E. A. Blinova |
|
No 2 (2022) |
Evaluation of the influence of the probability of erasing binary symbols «0» on the probability of erroneous data registration in a quantum-cryptographic communication channel |
Abstract
PDF (Rus)
|
A. M. Timofeev |
|
No 4 (2021) |
Approbation of the stochastic group virus protection model |
Abstract
PDF (Rus)
|
R. Y. Sharykin |
|
No 3 (2021) |
Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms |
Abstract
PDF (Eng)
|
A. A. Prihozhy |
|
No 3 (2021) |
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks |
Abstract
PDF (Rus)
|
M. L. Radziukevich |
|
No 3 (2021) |
Authenticated encryption mode with blocks skipping |
Abstract
PDF (Eng)
|
A. V. Sokolov, D. A. Isakov |
|
No 2 (2020) |
The digital watermarking algorithm using discrete chaotic maps |
Abstract
PDF (Rus)
|
A. V. Sidorenko, I. V. Shakinko |
|
No 1 (2020) |
Syndrome spectrums of error orbits in RS-codes |
Abstract
PDF (Rus)
|
V. A. Lipnitski, S. I. Semyonov |
|
No 2 (2019) |
Generation a shared secret using artificial neural networks |
Abstract
PDF (Rus)
|
U. F. Holikau, M. L. Radziukevich |
|
No 1 (2019) |
The influence of the time of single photon transmission of information on the reliability of its reception in a quantum cryptographic communication channel |
Abstract
PDF (Rus)
|
A. M. Timofeev |
|
No 3 (2018) |
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES |
Abstract
PDF (Rus)
|
S. N. Petrov, D. V. Ahramenko, S. M Goroshko, T. A. Pulko |
|
No 2 (2018) |
PROPERTIES OF GROUPS G OF DOUBLE ERRORS AND ITS INVARIANTS IN BCH CODES |
Abstract
PDF (Rus)
|
V. A. Lipnitskij, A. V. Serada |
|
No 2 (2018) |
THE CLASS OF PERFECT TERNARY ARRAYS |
Abstract
PDF (Rus)
|
A. V. Sokolov, O. N. Zhdanov |
|
No 1 (2018) |
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT |
Abstract
PDF (Rus)
|
K. O. Zakharova |
|
No 4 (2017) |
USING THE ADAPTED DLP SYSTEM FOR BLOCKING INFORMATION LEAKS |
Abstract
PDF (Rus)
|
T. A. Andryianava, S. B. Salomatin |
|
No 3 (2017) |
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK |
Abstract
PDF (Rus)
|
T. A. Andryianava, S. B. Salomatin |
|
No 3 (2017) |
NONLINEAR NYBERG CONSTRUCTION TRANSFORMS OVER ISOMORPHIC REPRESENTATIONS OF FIELDS GALOIS |
Abstract
PDF (Rus)
|
A. V. Sokolov, O. N. Zhdanov |
|
No 3 (2017) |
HETEROGENIOUS BLOCKED ALL-PAIRS SHORTEST PATHS ALGORITHM |
Abstract
PDF (Rus)
|
A. A. Prihozhy, O. N. Karasik |
|
No 2 (2017) |
HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS |
Abstract
PDF (Rus)
|
A. V. Sidorenko, I. V. Shakinko |
|
No 1 (2017) |
A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR |
Abstract
PDF (Rus)
|
O. N. Zhdanov, A. V. Sokolov |
|
No 2 (2016) |
IMAGE ENCRYPTION ALGORITHM USING TWO-DIMENSIONAL CHAOTIC MAPS |
Abstract
PDF (Rus)
|
A. V. Sidorenko, I. V. Shakinko, Yu. V. Sidorenko |
|
No 2 (2016) |
CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK |
Abstract
PDF (Rus)
|
U. F. Holikau, V. L. Pivovarov |
|
No 1 (2016) |
SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS |
Abstract
PDF (Rus)
|
A. V. Sokolov, O. N. Zhdanov, O. A. Ayvazian |
|
No 4 (2015) |
PROCESSOR-ORIENTED NONLINEAR TRANSFORM BASED ON THE FULL CLASSES OF ISOMORPHIC AND AUTOMORPHIC REPRESENTATIONS OF GALOIS FIELDS GF(512) AND GF(1024) |
Abstract
PDF (Rus)
|
A. V. Sokolov |
|
No 3 (2015) |
DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS |
Abstract
PDF (Rus)
|
A. V. Sidorenko, L. A. Zhukovets |
|
1 - 26 of 26 Items |
|