-
21
Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes
Published 2022-02-01“…On the strength of pseudo-random number generators, symmetric flow cryptosystems are formed that ensure the strength of the cryptogram. The article analyzes the methods for constructing symmetric stream cryptosystems, proposes cryptographic generators of pseudo-random number sequences (PRNGs), the security of which is based on the complexity-theoretic problem of syndromic decoding. …”
Get full text
Article -
22
Demonstration of quantum-digital payments
Published 2023-06-01“…Current technology substitutes customers’ sensitive data by randomized tokens, and secures the payment’s uniqueness with a cryptographic function, called a cryptogram. However, computationally powerful attacks violate the security of these functions. …”
Get full text
Article -
23
HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony
Published 2020-03-01“…While the Worker schedules most suitable cryptogram resources for each sub-goal received and produces the optimal reconfiguration solution which is verified and re-optimized by a Lévy process–based stochastic gradient descent algorithm. …”
Get full text
Article -
24
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
Published 2023-02-01“…This paper presents a complete separable RDH-ED scheme, whose main contribution is allowing the receiver to extract data and restore the image, either from the cryptogram with hidden data or from the directly decrypted version. …”
Get full text
Article -
25
Automatic vowels selection and ranking in Russian enciphered texts
Published 2018-03-01“…The purpose of training is to learn how to extract redundant information of the text and to descript the cryptogram without a password. One of the most comfortable methods for learning is a simple substitution and similar encryption systems, which are presented in most courses of cryptography. …”
Get full text
Article -
26
Behind the Mask – An Inquiry into the Shakespeare Authorship Question
Published 2020-06-01“…Keywords: Shakespeare, Edward de Vere, William Shakspere, cryptograms, Cardano Grille…”
Get full text
Article -
27
Laboulbeniales hyperparasites (Fungi, Ascomycota) of bat flies: Independent origins and host associations
Published 2018-08-01Get full text
Article -
28
Надписите от Надсентмиклош и тяхната културно-историческа характеристика
Published 2021-12-01“…The concepts and names decoded (Tetragrammatôn, Hexagrammatôn, Eôn, Five/the Fifth Eon, Hiueh, Eueh and others) allow establishing that they are cryptograms, attested in the ideas about the God of Gnostic Christians in the first centuries AD in the Middle East. …”
Get full text
Article -
29
Надписите от Надсентмиклош и тяхната културно-историческа характеристика
Published 2021-12-01“…The concepts and names decoded (Tetragrammatôn, Hexagrammatôn, Eôn, Five/the Fifth Eon, Hiueh, Eueh and others) allow establishing that they are cryptograms, attested in the ideas about the God of Gnostic Christians in the first centuries AD in the Middle East. …”
Get full text
Article -
30
OCAS - On-line Cryptanalytic Aid System
Published 2023“…A programming system is proposed which will permit a cryptanalyst to write and debug programs to aid in he solution of cryptograms or cryptographic systems. The basic elements of the proposed programming system are discussed in detail. …”
Get full text
-
31
Checklist of plant species of the coastal fynbos and rocky headlands, south of George, South Africa
Published 2000-02-01“…A checklist of vascular plants and cryptograms was compiled for the fynbos and rocky headland communities of the coastal region south of George The area studied is a 12 km stretch of steep sandstone cliffs forming alternating bays and headlands situated between Glentana and Wilderness. …”
Get full text
Article -
32
A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation
Published 2022-07-01“…Even though they were created to provide data confidentiality, their adaptability grants them to be utilized in the creation of various cryptological techniques, including message authentication protocols, hash functions, and stream cryptograms. MARS is a symmetric shared-key block cryptosystem that supports 128-bit blocks and keys with sizes ranging from 128 to 448 bits. …”
Get full text
Article -
33
Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data
Published 2023-01-01“…Then, the security of the two cryptograms is certified against the two cyberattack modes. …”
Get full text
Article -
34
The Role of Cryptogams in Soil Property Regulation and Vascular Plant Regeneration: A Review
Published 2023-12-01“…However, in areas with high annual precipitation (>600 mm) or where the soil has other water sources, the presence of cryptograms is conducive to soil water accumulation. …”
Get full text
Article -
35
Religion amidst Tares and Weeds: A Pentecostal Perspective on the Hegemony of Non-Religious Movements and Scholarship on Religion in the 21st Century
Published 2022-11-01“…Religion is an influential and resilient phenomenon that parades no cryptograms of decline. It incites the deepest obligation, emotion, sharp action, strong dialogues and study for practitioners, opponents and fence-sitters. …”
Get full text
Article -
36
The 19th century Old Believers’ chased icon “Cross of Calvary” as a heritage of Old Russian Staurotheke
Published 2022-03-01“…The chased icon compositional construction and the inscriptions-cryptograms are similar to the wood-carved Old Believers’ icons of the 18th — 19th centuries made by masters of the Russian North. …”
Get full text
Article -
37
-
38
A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data
Published 2021-11-01“…Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. …”
Get full text
Article -
39
A new quality index based on soil-vegetation networks to determine the recovery of functionality in abandoned agrosystems
Published 2024-01-01“…Total vegetation cover, cover of cryptograms and phanerogams and cover of plant functional groups was also recorded. …”
Get full text
Article -
40
Development of security mechanisms for scada systems in the postquantium period
Published 2022-06-01“…The developed approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms. The use of post-quantum encryption algorithms provides a significant increase in the cryptographic stability of security mechanisms SCADA-systems.…”
Get full text
Article