Some new platforms for algebraic cryptography and one method of increasing the security of constructing the
cryptographic protocols on the algebraic platforms. Under certain reasonable assumptions
Towards an operad-based cryptography: Applications of commutative operads operads and a natural generalization of commutative algebraic theories. We consider some
cryptographic Some new platforms for algebraic cryptography and one method of increasing the security of constructing the
cryptographic protocols on the algebraic platforms. Under certain reasonable assumptions
Towards an operad-based cryptography: Applications of commutative operads operads and a natural generalization of commutative algebraic theories. We consider some
cryptographic An improvement of cryptographic schemes based on the conjugacy search problemThe key exchange
protocol is a method of securely sharing
cryptographic keys over a public channel
Cryptographic principles in the age of artificial intelligenceCryptographic information protection is paramount in today's digital age. safeguarding sensitive
Simulation of Quantum Cryptographic SystemQuantum key distribution
protocols and the questions of their protection were studied. There were