Issue |
Section |
Title |
File |
Vol 9, No 4 (2011) |
Articles |
METHODS, ALGORITHMS AND TECHNICAL REALIZATION OF THE BASIC PROBLEM OPERATIONS EXECUTED IN RESIDUE NUMBER SYSTEM |
 (Rus)
|
Vol 10, No 3 (2012) |
Articles |
HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION |
 (Rus)
|
Vol 10, No 4 (2012) |
Articles |
NEW CRYPTOSYSTEMS ON ELLIPTIC CURVE POINTS BASED ON THE PACKAGE KNAPSACKS DIFFICULTY |
 (Rus)
|
Vol 11, No 1 (2013) |
Articles |
NUMERICAL METHOD OF THE THRESHOLD SECRET SHARING OVER A GROUP OF THE ELLIPTIC CURVE |
 (Rus)
|
Vol 10, No 4 (2012) |
Articles |
MODELING OF PARALLEALGORITMS FOR ENCRYPTION INFORMATION |
 (Rus)
|
Vol 11, No 3 (2013) |
Articles |
GROUP METHOD OF SECRET SHARING ON THE BASIS OF APPLICATION OF TWO-STAGE RESIDUE NUMBER SYSTEM |
|
Vol 11, No 4 (2013) |
Articles |
METHOD DEVELOPMENT NOISEPROOF SECRET SHARING BASED ON THE APPLICATION OF TWO-STAGE SYSTEM, THE RESIDUAL CLASSES |
 (Rus)
|
Vol 12, No 2 (2014) |
Articles |
MODULAR ROUNDING NUMBERS BY THE ELLIPTIC CURVE FIELD’S MODULE DURING CRYPTOGRAPHIC TRANSFORMATIONS IN THE SYSTEM OF RESIDUAL CLASSES |
 (Rus)
|
Vol 12, No 1 (2014) |
Articles |
THE EFFECTIVE ALGORITHM OF EXACT DEFINITION OF UNIVERSAL POSITIONAL CHARACTERISTICS OF MODULAR NUMBERS AND ITS APPLICATION TO CALCULATION OF THE MAIN AREAS OF OPERATIONS IN THE SYSTEM OF RESIDUAL CLASSES |
 (Rus)
|
Vol 12, No 3 (2014) |
Articles |
BINARY EXPONENT DIVISION METHOD FOR CONVERSION OF THE MINIMALLY REDUNDANT MODULAR CODE TO THE POSITIONAL CODE |
 (Rus)
|
Vol 17, No 3 (2019) |
Articles |
Threshold MRMA schemes of secret sharing |
|
Vol 17, No 4 (2019) |
Articles |
Acceleration of tensor computations using the residual class system |
 (Rus)
|