Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Applied cryptography"
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 58-67
DECIMATION OF M-SEQUENCES AS A WAY TO OBTAIN PRIMITIVE POLYNOMIALS
- Year: 2023
- Issue: 1
- 0
- 15
- Pages: 72-78
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 1
- 60
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 0
- 54
- Pages: 97-105
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 0
- 81
- Pages: 165-179