Articles by keywords "cryptography"

About masking method in aggregate signature protocol based on isogenies of elliptic curve

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 108
  • Pages: 56-64

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 131
  • Pages: 74-84

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 122
  • Pages: 117-129

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 229
  • Pages: 44-56

Lattice-based commitement scheme for proving linear relations over hidden values

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 226
  • Pages: 23-33

Integration of guidance-based recovery mechanism into the learning with errors-based digital signature

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 236
  • Pages: 10-22

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 4
  • 284
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 272
  • Pages: 97-105