Articles from section "Applied cryptography"

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 0
  • 80
  • Pages: 89-96

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 84
  • Pages: 82-88

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 84
  • Pages: 86-95

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 77
  • Pages: 72-78

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 76
  • Pages: 61-71

Development of a data hashing method based on cellular automation and its advantages

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 80
  • Pages: 51-60

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 123
  • Pages: 74-84

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 112
  • Pages: 117-129

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 177
  • Pages: 85-95

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 191
  • Pages: 77-84

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 190
  • Pages: 68-76

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 206
  • Pages: 58-67

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • Year: 2023
  • Issue: 1
  • 0
  • 204
  • Pages: 72-78

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 4
  • 274
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 263
  • Pages: 97-105

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 13
  • 318
  • Pages: 180-191

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 2
  • 292
  • Pages: 165-179