作者的详细信息

Chervyakov, N. I

栏目 标题 文件
卷 9, 编号 4 (2011) Articles METHODS, ALGORITHMS AND TECHNICAL REALIZATION OF THE BASIC PROBLEM OPERATIONS EXECUTED IN RESIDUE NUMBER SYSTEM PDF
(Rus)
卷 10, 编号 3 (2012) Articles HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION PDF
(Rus)
卷 10, 编号 4 (2012) Articles NEW CRYPTOSYSTEMS ON ELLIPTIC CURVE POINTS BASED ON THE PACKAGE KNAPSACKS DIFFICULTY PDF
(Rus)
卷 11, 编号 1 (2013) Articles NUMERICAL METHOD OF THE THRESHOLD SECRET SHARING OVER A GROUP OF THE ELLIPTIC CURVE PDF
(Rus)
卷 10, 编号 4 (2012) Articles MODELING OF PARALLEALGORITMS FOR ENCRYPTION INFORMATION PDF
(Rus)
卷 11, 编号 3 (2013) Articles GROUP METHOD OF SECRET SHARING ON THE BASIS OF APPLICATION OF TWO-STAGE RESIDUE NUMBER SYSTEM
卷 11, 编号 4 (2013) Articles METHOD DEVELOPMENT NOISEPROOF SECRET SHARING BASED ON THE APPLICATION OF TWO-STAGE SYSTEM, THE RESIDUAL CLASSES PDF
(Rus)
卷 12, 编号 2 (2014) Articles MODULAR ROUNDING NUMBERS BY THE ELLIPTIC CURVE FIELD’S MODULE DURING CRYPTOGRAPHIC TRANSFORMATIONS IN THE SYSTEM OF RESIDUAL CLASSES PDF
(Rus)
卷 12, 编号 1 (2014) Articles THE EFFECTIVE ALGORITHM OF EXACT DEFINITION OF UNIVERSAL POSITIONAL CHARACTERISTICS OF MODULAR NUMBERS AND ITS APPLICATION TO CALCULATION OF THE MAIN AREAS OF OPERATIONS IN THE SYSTEM OF RESIDUAL CLASSES PDF
(Rus)
卷 12, 编号 3 (2014) Articles BINARY EXPONENT DIVISION METHOD FOR CONVERSION OF THE MINIMALLY REDUNDANT MODULAR CODE TO THE POSITIONAL CODE PDF
(Rus)
卷 17, 编号 3 (2019) Articles Threshold MRMA schemes of secret sharing
卷 17, 编号 4 (2019) Articles Acceleration of tensor computations using the residual class system PDF
(Rus)
##common.cookie##