Материалов:
1 082 141

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 3164

Страница 1 из 317

On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys cryptographic primitives, symmetric and asymmetric, as well as cryptographic protocols using short (low

Some new platforms for algebraic cryptography and one method of increasing the security of constructing the cryptographic protocols on the algebraic platforms. Under certain reasonable assumptions

Towards an operad-based cryptography: Applications of commutative operads operads and a natural generalization of commutative algebraic theories. We consider some cryptographic

Some new platforms for algebraic cryptography and one method of increasing the security of constructing the cryptographic protocols on the algebraic platforms. Under certain reasonable assumptions

Towards an operad-based cryptography: Applications of commutative operads operads and a natural generalization of commutative algebraic theories. We consider some cryptographic

An improvement of cryptographic schemes based on the conjugacy search problemThe key exchange protocol is a method of securely sharing cryptographic keys over a public channel

RSA cryptosystem for dedekind ringscryptographic protocol

RSA cryptosystem for dedekind ringscryptographic protocol

Cryptographic principles in the age of artificial intelligenceCryptographic information protection is paramount in today's digital age. safeguarding sensitive

Simulation of Quantum Cryptographic SystemQuantum key distribution protocols and the questions of their protection were studied. There were

Страница 1 из 317