Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Applied cryptography"
Error of approximation of chi-square distribution by normal distribution as a function of sample size
- Year: 2026
- Issue: 1
- 1
- 14
- Pages: 134-151
Oblivious signature scheme based on isogenies of supersingular elliptic curves
- Year: 2023
- Issue: 4
- 5
- 361
- Pages: 116-121
IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY
- Year: 2022
- Issue: 4
- 0
- 349
- Pages: 71-88
AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS
- Year: 2022
- Issue: 3
- 3
- 376
- Pages: 45-54
Bitcoin Core cryptocurrency wallet cryptographic security analysis
- Year: 2023
- Issue: 2
- 5
- 457
- Pages: 82-91
Blockchain in 5G networks: perfomance comparison of private and public blockchain
- Year: 2021
- Issue: 3
- 0
- 419
- Pages: 55-62
Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?
- Year: 2021
- Issue: 3
- 0
- 423
- Pages: 44-54
REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK
- Year: 2022
- Issue: 2
- 2
- 371
- Pages: 35-50
ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE
- Year: 2022
- Issue: 2
- 0
- 364
- Pages: 30-34
On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2
- Year: 2025
- Issue: 4
- 21
- 589
- Pages: 89-101
Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems
- Year: 2021
- Issue: 2
- 0
- 465
- Pages: 89-96
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
- Year: 2021
- Issue: 2
- 3
- 508
- Pages: 82-88
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 515
- Pages: 86-95
Two-component real-time steganographic system of information embedding in the least significant bits of audio signal
- Year: 2021
- Issue: 4
- 0
- 452
- Pages: 72-78
Authentication and key establishment in WSN based on key pre-distribution
- Year: 2021
- Issue: 4
- 0
- 466
- Pages: 61-71
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 503
- Pages: 51-60
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 2
- 535
- Pages: 74-84
A model of a distributed storage system for private keys of crypto wallets
- Year: 2024
- Issue: 2
- 2
- 509
- Pages: 117-129
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 527
- Pages: 85-95
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 564
- Pages: 68-76
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 1
- 566
- Pages: 58-67
Decimation of M-sequences as a way to obtain primitive polynomials
- Year: 2023
- Issue: 1
- 0
- 571
- Pages: 72-78
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 6
- 718
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 2
- 675
- Pages: 97-105
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 2
- 707
- Pages: 165-179