Author Details

Chervyakov, N. I

Issue Section Title File
Vol 9, No 4 (2011) Articles METHODS, ALGORITHMS AND TECHNICAL REALIZATION OF THE BASIC PROBLEM OPERATIONS EXECUTED IN RESIDUE NUMBER SYSTEM PDF
(Rus)
Vol 10, No 3 (2012) Articles HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION PDF
(Rus)
Vol 10, No 4 (2012) Articles NEW CRYPTOSYSTEMS ON ELLIPTIC CURVE POINTS BASED ON THE PACKAGE KNAPSACKS DIFFICULTY PDF
(Rus)
Vol 11, No 1 (2013) Articles NUMERICAL METHOD OF THE THRESHOLD SECRET SHARING OVER A GROUP OF THE ELLIPTIC CURVE PDF
(Rus)
Vol 10, No 4 (2012) Articles MODELING OF PARALLEALGORITMS FOR ENCRYPTION INFORMATION PDF
(Rus)
Vol 11, No 3 (2013) Articles GROUP METHOD OF SECRET SHARING ON THE BASIS OF APPLICATION OF TWO-STAGE RESIDUE NUMBER SYSTEM
Vol 11, No 4 (2013) Articles METHOD DEVELOPMENT NOISEPROOF SECRET SHARING BASED ON THE APPLICATION OF TWO-STAGE SYSTEM, THE RESIDUAL CLASSES PDF
(Rus)
Vol 12, No 2 (2014) Articles MODULAR ROUNDING NUMBERS BY THE ELLIPTIC CURVE FIELD’S MODULE DURING CRYPTOGRAPHIC TRANSFORMATIONS IN THE SYSTEM OF RESIDUAL CLASSES PDF
(Rus)
Vol 12, No 1 (2014) Articles THE EFFECTIVE ALGORITHM OF EXACT DEFINITION OF UNIVERSAL POSITIONAL CHARACTERISTICS OF MODULAR NUMBERS AND ITS APPLICATION TO CALCULATION OF THE MAIN AREAS OF OPERATIONS IN THE SYSTEM OF RESIDUAL CLASSES PDF
(Rus)
Vol 12, No 3 (2014) Articles BINARY EXPONENT DIVISION METHOD FOR CONVERSION OF THE MINIMALLY REDUNDANT MODULAR CODE TO THE POSITIONAL CODE PDF
(Rus)
Vol 17, No 3 (2019) Articles Threshold MRMA schemes of secret sharing
Vol 17, No 4 (2019) Articles Acceleration of tensor computations using the residual class system PDF
(Rus)

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies