Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Applied cryptography"
Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems
- Year: 2021
- Issue: 2
- 0
- 80
- Pages: 89-96
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
- Year: 2021
- Issue: 2
- 3
- 84
- Pages: 82-88
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 84
- Pages: 86-95
Two-component real-time steganographic system of information embedding in the least significant bits of audio signal
- Year: 2021
- Issue: 4
- 0
- 77
- Pages: 72-78
Authentication and key establishment in WSN based on key pre-distribution
- Year: 2021
- Issue: 4
- 0
- 76
- Pages: 61-71
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 80
- Pages: 51-60
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 123
- Pages: 74-84
A model of a distributed storage system for private keys of crypto wallets
- Year: 2024
- Issue: 2
- 2
- 112
- Pages: 117-129
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 177
- Pages: 85-95
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 190
- Pages: 68-76
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 206
- Pages: 58-67
Decimation of M-sequences as a way to obtain primitive polynomials
- Year: 2023
- Issue: 1
- 0
- 204
- Pages: 72-78
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 4
- 274
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 2
- 263
- Pages: 97-105
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 2
- 292
- Pages: 165-179