Intelligent systems with restricted autonomy the autonomous part excluding such changes in the
knowledge base of the first ES that are considered
Shifrator” programme – an information coder based on a “char-cipher there exist various cryptographic codes for its protection. Bellow we discuss a code “a char-
cipher” – a new
Towards an operad-based cryptography: Applications of commutative operads protocols
based on commutative operads. For the protocol of the creation a common secret key, we describe
Towards an operad-based cryptography: Applications of commutative operads protocols
based on commutative operads. For the protocol of the creation a common secret key, we describe
About Asymmetric Execution of the Asymmetric ElGamal Cipher (
ciphers), introduced by A. A. Varfolomeev at the SibCon 2016 and RusCrypto 2018 conferences, as applied