Publication schedule
  • №1 March 2026

Articles from section "Applied cryptography"

Error of approximation of chi-square distribution by normal distribution as a function of sample size

Applied cryptography
  • Year: 2026
  • Issue: 1
  • 1
  • 14
  • Pages: 134-151

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 5
  • 361
  • Pages: 116-121

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 349
  • Pages: 71-88

FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 318
  • Pages: 64-70

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 3
  • 376
  • Pages: 45-54

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • Year: 2023
  • Issue: 2
  • 5
  • 457
  • Pages: 82-91

Blockchain in 5G networks: perfomance comparison of private and public blockchain

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 419
  • Pages: 55-62

Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 423
  • Pages: 44-54

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 2
  • 371
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 364
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 21
  • 589
  • Pages: 89-101

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 10
  • 422
  • Pages: 76-88

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 0
  • 465
  • Pages: 89-96

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 508
  • Pages: 82-88

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 515
  • Pages: 86-95

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 452
  • Pages: 72-78

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 466
  • Pages: 61-71

Development of a data hashing method based on cellular automation and its advantages

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 503
  • Pages: 51-60

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 2
  • 535
  • Pages: 74-84

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 509
  • Pages: 117-129

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 527
  • Pages: 85-95

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 552
  • Pages: 77-84

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 564
  • Pages: 68-76

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 566
  • Pages: 58-67

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • Year: 2023
  • Issue: 1
  • 0
  • 571
  • Pages: 72-78

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 6
  • 718
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 675
  • Pages: 97-105

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 15
  • 748
  • Pages: 180-191

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 2
  • 707
  • Pages: 165-179