Articles from section "Applied cryptography"

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 2
  • 180
  • Pages: 116-121

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 190
  • Pages: 71-88

FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 171
  • Pages: 64-70

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 3
  • 198
  • Pages: 45-54

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • Year: 2023
  • Issue: 2
  • 4
  • 246
  • Pages: 82-91

Blockchain in 5G networks: perfomance comparison of private and public blockchain

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 240
  • Pages: 55-62

Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 241
  • Pages: 44-54

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 205
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 213
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 15
  • 364
  • Pages: 89-101

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 4
  • 222
  • Pages: 76-88

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 0
  • 304
  • Pages: 89-96

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 326
  • Pages: 82-88

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 332
  • Pages: 86-95

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 295
  • Pages: 72-78

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 300
  • Pages: 61-71

Development of a data hashing method based on cellular automation and its advantages

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 328
  • Pages: 51-60

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 359
  • Pages: 74-84

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 346
  • Pages: 117-129

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 372
  • Pages: 85-95

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 401
  • Pages: 77-84

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 410
  • Pages: 68-76

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 419
  • Pages: 58-67

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • Year: 2023
  • Issue: 1
  • 0
  • 417
  • Pages: 72-78

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 4
  • 519
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 510
  • Pages: 97-105

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 13
  • 568
  • Pages: 180-191

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 2
  • 546
  • Pages: 165-179