Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 219

Страница 3 из 22

Theoretical Model of a Multi-Key Steganography System access apart from keys that deposite information we propose to use additional cryptography keys.

Overview and Performance Analysis of Encryption Algorithms. In this paper general overview of cryptography, information security and the comparison of algorithms

ОБЕСПЕЧЕНИЕ БЕЗОПАСНОСТИ В СИСТЕМАХ ИНТЕРНЕТА ВЕЩЕЙ МЕТОДОМ МАЛОЙ КРИПТОГРАФИИ of Things is proposed, the basis of which is the use of low-resource cryptography. The interaction between

Cryptographic quantum hashingquantum cryptography

RSA cryptosystem for dedekind ringsAlgebraic cryptography

Application of composition primitive polynomials for implementation of large-scale S-boxesCryptography

Защита информации : конспект-лекция. Ч. 6 OF CRYPTOGRAPHY

Problems, solutions and experience of the first international student's Olympiad in cryptographyProblems, solutions and experience of the first international student's Olympiad in cryptography

Meteor time transfer and meteor cryptographyMeteor time transfer and meteor cryptography

Введение в эллиптическую криптографиюIntroduction to elliptical cryptography

Страница 3 из 22