Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Review of current methods of quantum and post-quantum cryptography.

Subjects: INFORMATION technology security; QUANTUM cryptography; QUANTUM computers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p236-241, 6p

Record details

×
Academic Journal

Synthesis of elementary transposition functions controlled by information.

Subjects: CRYPTOGRAPHY research; PERMUTATIONS; COMPUTER security software

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p242-247, 6p

Record details

×
Academic Journal

Steganographic algorithm robust against noise imposition.

Subjects: CRYPTOGRAPHY; ALGORITHMS; RANDOM noise theory

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p71-75, 5p

Record details

×
Academic Journal

Experimental research of bitwise method for information hiding in vector images.

Subjects: CRYPTOGRAPHY; VECTOR graphics; CURVES

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p66-70, 5p

Record details

×
Academic Journal

Stacks of quantum cryptography protocols.

Subjects: QUANTUM cryptography; QUBITS; COMPUTER network protocols

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p48-54, 7p

Record details

×
Academic Journal

PES32-16 network consisting of sixteen round functions.

Subjects: CRYPTOGRAPHY; ALGORITHMS; BLOCK ciphers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p43-47, 5p

Record details

×
Academic Journal

Modern methods of computer steganography systematization.

Subjects: CRYPTOGRAPHY; INFORMATION technology security; LIE detectors & detection

  • Source: Ukrainian Scientific Journal of Information Security; 2013, Vol. 19 Issue 3, p209-217, 9p

Record details

×
  • 1-10 of  10 results for ""CRYPTOGRAPHY""