Articles by keywords "Cryptography"
Oblivious signature scheme based on isogenies of supersingular elliptic curves
- Year: 2023
- Issue: 4
- 1
- 133
- Pages: 116-121
On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2
- Year: 2025
- Issue: 4
- 15
- 310
- Pages: 89-101
About masking method in aggregate signature protocol based on isogenies of elliptic curve
- Year: 2024
- Issue: Спецвыпуск
- 0
- 274
- Pages: 56-64
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 317
- Pages: 74-84
A model of a distributed storage system for private keys of crypto wallets
- Year: 2024
- Issue: 2
- 2
- 288
- Pages: 117-129
Lattice-based commitement scheme for proving linear relations over hidden values
- Year: 2025
- Issue: Спецвыпуск
- 0
- 412
- Pages: 23-33
Integration of guidance-based recovery mechanism into the learning with errors-based digital signature
- Year: 2025
- Issue: Спецвыпуск
- 3
- 413
- Pages: 10-22
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 4
- 474
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 2
- 467
- Pages: 97-105