Browse Items

Explore our collection of items

Стаття
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet e...

2023/06/26 1
Стаття
Cyber protection of Еnergoil enterprises

This article is about providing comprehensive protection of the oil refining and distribution com...

2023/04/21 1
Стаття
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and dat...

2023/02/10 1
Стаття
Using the AES encryption method in practice

Analysis of recent research and publications shows that Encryption methods vary by how much data ...

2023/01/13 1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...

Стаття 2023/06/26
1
Cyber protection of Еnergoil enterprises

This article is about providing comprehensive protection of the oil refining and distribution company ENERGOIL. This protection includes components such as encryption, anti-virus software, and user...

Стаття 2023/04/21
1
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptog...

Стаття 2023/02/10
1
Using the AES encryption method in practice

Analysis of recent research and publications shows that Encryption methods vary by how much data they can handle at once and what kind of key it needs for its decryption. Some encryption is more ea...

Стаття 2023/01/13
1