Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

КВАНТОВІ ОБЧИСЛЕННЯ: ОГЛЯД ТА АНАЛІ.

  • Source: Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz; 2019, Vol. 55 Issue 1, p14-29, 16p

Record details

×
Academic Journal

МОДИФІКАЦІЯ АЛГОРИТМУ ХЕШ-СТЕГАНОГРАФІЇ

Subjects: DIGITAL images; VISUAL perception; CRYPTOGRAPHY

  • Source: Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2019, Vol. 9 Issue 1/2, p69-76, 8p

Record details

×
Academic Journal

ПРИСКОРЕННЯ МЕТОДУ КВАДРАТИЧНОГО РЕШЕТА НА ОСНОВІ ВИКОРИСТАННЯ УМОВНО В-ГЛАДКИХ ЧИСЕЛ

  • Source: System Research & Information Technologies / Sistemnì Doslìdžennâ ta Ìnformacìjnì Tehnologìï; 2018, Issue 1, p99-106, 8p

Record details

×
Academic Journal

МОДЕЛЮВАННЯ DPA АТАКИ ПЕРШОГО ПОРЯДКУ.

  • Source: Ukrainian Scientific Journal of Information Security; 2016, Vol. 22 Issue 2, p184-195, 12p

Record details

×
Academic Journal

Проблема криптографии: семиотический аспект

  • Source: Hileya: Scientific Bulletin / Gileya; 2015, Issue 101, p298-300, 3p

Record details

×
Academic Journal

On the network PES2m-m, consisting of m round function and its modifications.

  • Source: Ukrainian Scientific Journal of Information Security; 2015, Vol. 21 Issue 1, p52-63, 12p

Record details

×
Academic Journal

Acceleration of Fermat's factorization method by decimation method with use of several bases.

  • Source: Ukrainian Scientific Journal of Information Security; 2015, Vol. 21 Issue 1, p64-68, 5p

Record details

×
Academic Journal

Review of current methods of quantum and post-quantum cryptography.

Subjects: INFORMATION technology security; QUANTUM cryptography; QUANTUM computers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p236-241, 6p

Record details

×
Academic Journal

Synthesis of elementary transposition functions controlled by information.

Subjects: CRYPTOGRAPHY research; PERMUTATIONS; COMPUTER security software

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p242-247, 6p

Record details

×
Academic Journal

PES32-16 network consisting of sixteen round functions.

Subjects: CRYPTOGRAPHY; ALGORITHMS; BLOCK ciphers

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p43-47, 5p

Record details

×
Academic Journal

Stacks of quantum cryptography protocols.

Subjects: QUANTUM cryptography; QUBITS; COMPUTER network protocols

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p48-54, 7p

Record details

×
Academic Journal

Experimental research of bitwise method for information hiding in vector images.

Subjects: CRYPTOGRAPHY; VECTOR graphics; CURVES

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p66-70, 5p

Record details

×
Academic Journal

Steganographic algorithm robust against noise imposition.

Subjects: CRYPTOGRAPHY; ALGORITHMS; RANDOM noise theory

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 1, p71-75, 5p

Record details

×
Academic Journal

COMPLEXITY OF HIDDEN ABELIAN GROUP ACTION PROBLEM IN QUANTUM COMPUTING MODEL.

  • Source: Eastern-European Journal of Enterprise Technologies; 2013, Vol. 5 Issue 4, p45-49, 5p

Record details

×