Infocommunication Technologies
ISSN 2073-3909 (Print)
Menu
Archives
Home
About the Journal
Editorial Policies
Author Guidelines
About the Journal
Issues
Search
Current
Retracted articles
Archives
Contact
Subscriptions
Editorial Board
All Journals
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
Other Journals
Categories
Keywords
Lindley integral equation
MIMO
algorithm
business process
cryptography
digital signal processing
efficiency
information security
machine learning
management
mathematical model
modeling
noise immunity
optical cable
optical fiber
optimization
queues
queuing systems
simulation
steganography
telecommunications
×
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
Other Journals
Categories
Keywords
Lindley integral equation
MIMO
algorithm
business process
cryptography
digital signal processing
efficiency
information security
machine learning
management
mathematical model
modeling
noise immunity
optical cable
optical fiber
optimization
queues
queuing systems
simulation
steganography
telecommunications
Home
>
Search
>
Author Details
Author Details
Chervyakov, N. I
Issue
Section
Title
File
Vol 9, No 4 (2011)
Articles
METHODS, ALGORITHMS AND TECHNICAL REALIZATION OF THE BASIC PROBLEM OPERATIONS EXECUTED IN RESIDUE NUMBER SYSTEM
(Rus)
Vol 10, No 3 (2012)
Articles
HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION
(Rus)
Vol 10, No 4 (2012)
Articles
NEW CRYPTOSYSTEMS ON ELLIPTIC CURVE POINTS BASED ON THE PACKAGE KNAPSACKS DIFFICULTY
(Rus)
Vol 11, No 1 (2013)
Articles
NUMERICAL METHOD OF THE THRESHOLD SECRET SHARING OVER A GROUP OF THE ELLIPTIC CURVE
(Rus)
Vol 10, No 4 (2012)
Articles
MODELING OF PARALLEALGORITMS FOR ENCRYPTION INFORMATION
(Rus)
Vol 11, No 3 (2013)
Articles
GROUP METHOD OF SECRET SHARING ON THE BASIS OF APPLICATION OF TWO-STAGE RESIDUE NUMBER SYSTEM
Vol 11, No 4 (2013)
Articles
METHOD DEVELOPMENT NOISEPROOF SECRET SHARING BASED ON THE APPLICATION OF TWO-STAGE SYSTEM, THE RESIDUAL CLASSES
(Rus)
Vol 12, No 2 (2014)
Articles
MODULAR ROUNDING NUMBERS BY THE ELLIPTIC CURVE FIELD’S MODULE DURING CRYPTOGRAPHIC TRANSFORMATIONS IN THE SYSTEM OF RESIDUAL CLASSES
(Rus)
Vol 12, No 1 (2014)
Articles
THE EFFECTIVE ALGORITHM OF EXACT DEFINITION OF UNIVERSAL POSITIONAL CHARACTERISTICS OF MODULAR NUMBERS AND ITS APPLICATION TO CALCULATION OF THE MAIN AREAS OF OPERATIONS IN THE SYSTEM OF RESIDUAL CLASSES
(Rus)
Vol 12, No 3 (2014)
Articles
BINARY EXPONENT DIVISION METHOD FOR CONVERSION OF THE MINIMALLY REDUNDANT MODULAR CODE TO THE POSITIONAL CODE
(Rus)
Vol 17, No 3 (2019)
Articles
Threshold MRMA schemes of secret sharing
Vol 17, No 4 (2019)
Articles
Acceleration of tensor computations using the residual class system
(Rus)
This website uses cookies
You consent to our cookies if you continue to use our website.
About Cookies
TOP