Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 5259

Страница 4 из 526

Amplified spontaneous emission at nv centers in diamond under optical pumping sources for quantum cryptography problems, physical implementation of q-bits (quantum logic elements

CRYPTOGRAPHY ON THE STEEL HIGHWAYS: INTERCEPTION OF REPORTS, DECRYPTION AND PROTECTION OF INFORMATION IN THE ACTIVITIES OF RAILWAY GENDARMES, the critical importance of communication increased the importance of cryptography and cryptanalysis. To encrypt

ENCRYPTING DATA USING PSEUDORANDOM NUMBER GENERATORS AND CRYPTOGRAPHYENCRYPTING DATA USING PSEUDORANDOM NUMBER GENERATORS AND CRYPTOGRAPHY

Towards an operad-based cryptography: Applications of commutative operads-key cryptography. Commutative operads were introduced by S.N. Tronin in 2006. They are a special case of algebraic

Towards an operad-based cryptography: Applications of commutative operads-key cryptography. Commutative operads were introduced by S.N. Tronin in 2006. They are a special case of algebraic

Some new platforms for algebraic cryptography and one method of increasing the security groupoids and the commutative operads in algebraic cryptography. Also, we introduce a general method

Application of composition primitive polynomials for implementation of large-scale S-boxesCryptography

Some new platforms for algebraic cryptography and one method of increasing the security groupoids and the commutative operads in algebraic cryptography. Also, we introduce a general method

On the Design of Error Detection and Correction Cryptography SchemesThe paper introduces the method of modifying cryptography encryption and decryption units which

About Asymmetric Execution of the Asymmetric ElGamal Ciphercryptography

Страница 4 из 526