Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Applied cryptography"
Oblivious signature scheme based on isogenies of supersingular elliptic curves
- Year: 2023
- Issue: 4
- 2
- 180
- Pages: 116-121
IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY
- Year: 2022
- Issue: 4
- 0
- 190
- Pages: 71-88
AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS
- Year: 2022
- Issue: 3
- 3
- 198
- Pages: 45-54
Bitcoin Core cryptocurrency wallet cryptographic security analysis
- Year: 2023
- Issue: 2
- 4
- 246
- Pages: 82-91
Blockchain in 5G networks: perfomance comparison of private and public blockchain
- Year: 2021
- Issue: 3
- 0
- 240
- Pages: 55-62
Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?
- Year: 2021
- Issue: 3
- 0
- 241
- Pages: 44-54
REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK
- Year: 2022
- Issue: 2
- 0
- 205
- Pages: 35-50
ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE
- Year: 2022
- Issue: 2
- 0
- 213
- Pages: 30-34
On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2
- Year: 2025
- Issue: 4
- 15
- 364
- Pages: 89-101
Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems
- Year: 2021
- Issue: 2
- 0
- 304
- Pages: 89-96
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
- Year: 2021
- Issue: 2
- 3
- 326
- Pages: 82-88
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 332
- Pages: 86-95
Two-component real-time steganographic system of information embedding in the least significant bits of audio signal
- Year: 2021
- Issue: 4
- 0
- 295
- Pages: 72-78
Authentication and key establishment in WSN based on key pre-distribution
- Year: 2021
- Issue: 4
- 0
- 300
- Pages: 61-71
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 328
- Pages: 51-60
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 359
- Pages: 74-84
A model of a distributed storage system for private keys of crypto wallets
- Year: 2024
- Issue: 2
- 2
- 346
- Pages: 117-129
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 372
- Pages: 85-95
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 410
- Pages: 68-76
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 419
- Pages: 58-67
Decimation of M-sequences as a way to obtain primitive polynomials
- Year: 2023
- Issue: 1
- 0
- 417
- Pages: 72-78
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 4
- 519
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 2
- 510
- Pages: 97-105
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 2
- 546
- Pages: 165-179