Search by keyword: "encryption"
Comparative analysis of Russian GOST R 34.12-2015 encryption standard and American encryption standard AES
Authors: Sobolev M.A. | Published: 17.05.2022 |
Published in issue: #4(69)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-4-785 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: cipher, encryption, cryptographic strength, rounds, gamming, “Grasshopper” algorithm, SP-net, AES standard |
Data encryption in telecommunication networks
Authors: Dolova A.A., Konstantinidi A.Yu. | Published: 06.06.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-484 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: encryption, telecommunications, networks, algorithm, RSA, AES, data, protection |
The study of the CryptoAPI Linux encryption alghoritms in the context of work with the USB-drivers
Authors: Borodin D.S., Fedorov P.V. | Published: 03.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-459 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: USB driver, loadable kernel module, CryptoAPI, encryption, symmetric encryption algorithms, AES, DES, Cast6, ARC4 |
Mathematical simulation of quantum protocol BB84 key distribution
Authors: Cheredanova E.M., Mamchenko E.A., Marchuk A.M., Rechkunov A.A. | Published: 28.05.2018 |
Published in issue: #5(22)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-5-319 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: cryptography, quantum cryptography, encryption, protocol bb84, quantum key distribution, cryptographic robustness, Heisenberg indeterminacy principle |