Theoretical Model of a Multi-Key Steganography System access apart from keys that deposite information we propose to use additional
cryptography keys.
Overview and Performance Analysis of Encryption Algorithms. In this paper general overview of
cryptography, information security and the comparison of algorithms
ОБЕСПЕЧЕНИЕ БЕЗОПАСНОСТИ В СИСТЕМАХ ИНТЕРНЕТА ВЕЩЕЙ МЕТОДОМ МАЛОЙ КРИПТОГРАФИИ of Things is proposed, the basis of which is the use of low-resource
cryptography. The interaction between
Problems, solutions and experience of the first international student's Olympiad in cryptographyAgievich, S. V.,
Kolomeec, N.,
Nikova, Svetla,
Preneel, Bart,
Rijmen, Vincent,
Shushuev, G.,
Tokareva, N. N.,
Vitkup, V.,
Gorodilova, A. Problems, solutions and experience of the first international student's Olympiad in
cryptography Meteor time transfer and meteor cryptographyMeteor time transfer and meteor
cryptography Введение в эллиптическую криптографиюIntroduction to elliptical
cryptography