Огляд Елементів

Ознайомтеся з нашою колекцією елементів

document-84-90 Стаття
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet e...

2023/06/26 1
document (1)-122-126 Стаття
Cyber protection of Еnergoil enterprises

This article is about providing comprehensive protection of the oil refining and distribution com...

2023/04/21 1
Головко_походун Стаття
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and dat...

2023/02/10 1
Головко_Толочин Стаття
Using the AES encryption method in practice

Analysis of recent research and publications shows that Encryption methods vary by how much data ...

2023/01/13 1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...

Стаття 2023/06/26
1
Cyber protection of Еnergoil enterprises

This article is about providing comprehensive protection of the oil refining and distribution company ENERGOIL. This protection includes components such as encryption, anti-virus software, and user...

Стаття 2023/04/21
1
Analysis and software implementation of modular multiplication-based block cipher

This article highlights the ever-increasing need and importance of information protection and data safety in modern reality, presents the possibilities of encrypting data using the tools of cryptog...

Стаття 2023/02/10
1
Using the AES encryption method in practice

Analysis of recent research and publications shows that Encryption methods vary by how much data they can handle at once and what kind of key it needs for its decryption. Some encryption is more ea...

Стаття 2023/01/13
1