Articles from section "Applied cryptography"

Error of approximation of chi-square distribution by normal distribution as a function of sample size

Applied cryptography
  • Year: 2026
  • Issue: 1
  • 13
  • 296
  • Pages: 134-151

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 6
  • 576
  • Pages: 116-121

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 524
  • Pages: 71-88

FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 490
  • Pages: 64-70

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 5
  • 570
  • Pages: 45-54

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • Year: 2023
  • Issue: 2
  • 5
  • 725
  • Pages: 82-91

Blockchain in 5G networks: perfomance comparison of private and public blockchain

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 611
  • Pages: 55-62

Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 628
  • Pages: 44-54

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 2
  • 549
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 1
  • 536
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 28
  • 823
  • Pages: 89-101

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 11
  • 618
  • Pages: 76-88

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 0
  • 653
  • Pages: 89-96

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • Year: 2021
  • Issue: 2
  • 3
  • 700
  • Pages: 82-88

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 720
  • Pages: 86-95

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 627
  • Pages: 72-78

Authentication and key establishment in WSN based on key pre-distribution

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 1
  • 650
  • Pages: 61-71

Development of a data hashing method based on cellular automation and its advantages

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 704
  • Pages: 51-60

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 6
  • 741
  • Pages: 74-84

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 680
  • Pages: 117-129

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 705
  • Pages: 85-95

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 715
  • Pages: 77-84

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 750
  • Pages: 68-76

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 740
  • Pages: 58-67

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • Year: 2023
  • Issue: 1
  • 0
  • 739
  • Pages: 72-78

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 7
  • 929
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 844
  • Pages: 97-105

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 16
  • 956
  • Pages: 180-191

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 2
  • 871
  • Pages: 165-179