ПартнерыПри поддержкеОператорФотогалерея |
Список принятых работSome properties of modular addition Data recovering for a neural network-based biometric autentification scheme Security bounds for standardized internally re-keyed block cipher modes and their practical significance Near birthday attack on "8 bits" AEAD mode On a new classification of the Boolean functions Exact maximum expected differential and linear probability for 2-round Kuznyechik XS-circuits in block ciphers Attack on Reduced Kuznyechik in Related-Key Adversary Model and CTRR Mode of Operation New classes of 8-bit permutations based on a butterfly structure Considering Two MAC under SIG Variants of The Basic SIGMA Protocol-TQPhong On some properties of an XSL-network Testing the NIST Statistical Test Suite on artificial pseudorandom sequences A New LWE-based Verifiable Threshold Secret Sharing Scheme Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out Evaluation of the maximum productivity for block encryption algorithms Constructing strong elliptic curves suitable for cryptographic applications |