Skip to content
Scientific and practical cyber security journal | ISSN 2587-4667
KA
RU
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Menu
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Categories: Cryptography
THE NEED OF POINT-TO-POINT ENCRYPTION IN FINANCIAL TRANSACTIONS
CRYPTOGRAPHY USE IN EVERYDAY LIFE
MODERN THREATS IN CRYPTOCURRENCY
USAGE OF COLLATZ CONJECTURE IN CRYPTOGRAPHY
THE INITIAL CONCEPTS OF POST-QUANTUM SIGNATURE DESIGN USING VERKLE TREE
THE ANALYSIS OF THE POST PROCESSING METHODS FOR THE QUANTUM RANDOM NUMBER GENERATORS
BB84 PROTOCOL AS A PROTOCOL FOR QUANTUM KEY DISTRIBUTION (QKD).
THE MODEL NEW QUANTUM RANDOM NUMBER GENERATOR WITH THE CORRESPONDING VERIFICATION METHOD.
QUANTUM COMPUTER ATTACKS ON SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS.
PSEUDO RANDOM NUMBER GENERATORS AND ITS USES
Posts navigation
Older Posts
Older Posts