Browse Items
Explore our collection of items
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet e...
Cyber protection of Еnergoil enterprises
This article is about providing comprehensive protection of the oil refining and distribution com...
Analysis and software implementation of modular multiplication-based block cipher
This article highlights the ever-increasing need and importance of information protection and dat...
Using the AES encryption method in practice
Analysis of recent research and publications shows that Encryption methods vary by how much data ...
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...
Стаття 2023/06/26Cyber protection of Еnergoil enterprises
This article is about providing comprehensive protection of the oil refining and distribution company ENERGOIL. This protection includes components such as encryption, anti-virus software, and user...
Стаття 2023/04/21Analysis and software implementation of modular multiplication-based block cipher
This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptog...
Стаття 2023/02/10Using the AES encryption method in practice
Analysis of recent research and publications shows that Encryption methods vary by how much data they can handle at once and what kind of key it needs for its decryption. Some encryption is more ea...
Стаття 2023/01/13