Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

МЕТОД СИНТЕЗУ ВИСОКОЯКІСНИХ S-БЛОКІВ НА ОСНОВІ ФУНКЦІЙ БАГАТОЗНАЧНОЇ ЛОГІКИ.

Subjects: BOOLEAN functions; MANY-valued logic; CIPHERS

  • Source: Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2022, Vol. 12 Issue 3, p219-225, 7p

Record details

×
Academic Journal

ПРОЕКТУВАННЯ ЗАХИСНИХ СИСТЕМ НА БАЗІ ФРАКТАЛЬНИХ АЛГОРИТМІВ.

Subjects: ALGORITHMS; COMPUTER crimes; DIGITAL signatures

  • Source: Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov; 2021, Vol. 13 Issue 2, p41-49, 9p

Record details

×
Academic Journal

МОДИФІКАЦІЯ АЛГОРИТМУ ХЕШ-СТЕГАНОГРАФІЇ

Subjects: DIGITAL images; VISUAL perception; CRYPTOGRAPHY

  • Source: Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2019, Vol. 9 Issue 1/2, p69-76, 8p

Record details

×
Academic Journal

Review of current methods of quantum and post-quantum cryptography.

Subjects: INFORMATION technology security; QUANTUM cryptography; QUANTUM computers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p236-241, 6p

Record details

×
Academic Journal

Synthesis of elementary transposition functions controlled by information.

Subjects: CRYPTOGRAPHY research; PERMUTATIONS; COMPUTER security software

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p242-247, 6p

Record details

×
Academic Journal

Steganographic algorithm robust against noise imposition.

Subjects: CRYPTOGRAPHY; ALGORITHMS; RANDOM noise theory

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p71-75, 5p

Record details

×
Academic Journal

Experimental research of bitwise method for information hiding in vector images.

Subjects: CRYPTOGRAPHY; VECTOR graphics; CURVES

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p66-70, 5p

Record details

×
Academic Journal

Stacks of quantum cryptography protocols.

Subjects: QUANTUM cryptography; QUBITS; COMPUTER network protocols

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p48-54, 7p

Record details

×
Academic Journal

PES32-16 network consisting of sixteen round functions.

Subjects: CRYPTOGRAPHY; ALGORITHMS; BLOCK ciphers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p43-47, 5p

Record details

×
Academic Journal

Modern methods of computer steganography systematization.

Subjects: CRYPTOGRAPHY; INFORMATION technology security; LIE detectors & detection

  • Source: Ukrainian Scientific Journal of Information Security; 2013, Vol. 19 Issue 3, p209-217, 9p

Record details

×
Academic Journal

INFORMATION SECURITY IN TELEMEDICINE SYSTEMS BASED ON FUZZY LOGIC.

Subjects: TELEMEDICINE; FUZZY systems; INFORMATION resources

  • Source: Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2013, Vol. 3 Issue 1, p91-97, 7p

Record details

×
Academic Journal

POSSIBILITY OF DIGITAL SIGNING BASED ON RECURRENT SEQUENCES.

Subjects: RECURSIVE sequences (Mathematics); DIGITAL signatures; COMPUTATIONAL complexity

  • Source: Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2013, Vol. 3 Issue 1, p13-21, 9p

Record details

×
  • 1-27 of  27 results for ""CRYPTOGRAPHY""