Search Results - "Cherckesova Larissa"
-
1
Developing a New Collision-Resistant Hashing Algorithm
Published in Mathematics (Basel) (01-08-2022)“…Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making…”
Get full text
Journal Article -
2
Creation of an encryption algorithm resistant to attacks through side channels of leakage
Published in E3S web of conferences (2024)“…The paper is devoted to.the development of an encryption algorithm resistant to leakage through side channels The objectives of the work were the development…”
Get full text
Journal Article -
3
Circuit engineering solutions for high - temperature analog microcircuits in extreme environmental conditions
Published in E3S web of conferences (01-01-2023)“…The current geopolitical situation and import–substitution challenges facing the domestic electronics industry require the creation of devices capable of…”
Get full text
Journal Article -
4
Filtering grayscale images using the Kalman filter
Published in E3S Web of Conferences (01-01-2022)“…This article aims to explore the possibility of using the Kalman filter to filter images. The relevance of the study lies in the fact that at present the tasks…”
Get full text
Journal Article Conference Proceeding -
5
Development of a system for protecting against DDoS attacks at the L7 level of the OSI model - HTTP Flood
Published in E3S web of conferences (01-01-2023)“…In today’s world of globalization and the development of information technology, it is not possible to build a business and production without using the latest…”
Get full text
Journal Article -
6
Ensuring the security of web applications operating on the basis of the SSL/TLS protocol
Published in E3S web of conferences (01-01-2023)“…SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as…”
Get full text
Journal Article -
7
Exposure of pumping intense external electromagnetic fields on radioelectronic engineering substances with domain structure
Published in MATEC Web of Conferences (01-01-2018)“…Recently, the research of interaction processes of materials with domain structure, applied in radioelectronic techniques, with strong electromagnetic fields…”
Get full text
Journal Article Conference Proceeding -
8
Post-Quantum Cryptosystem NTRUEnCrypt and Its Advantage over Pre – Quantum Cryptosystem RSA
Published in E3S Web of Conferences (01-01-2020)“…Cryptography is inextricably linked to the transfer of data, and in addition to ensuring user authorization; it is designed to guarantee the integrity of the…”
Get full text
Journal Article Conference Proceeding -
9
Information system development for restricting access to software tool built on microservice architecture
Published in E3S Web of Conferences (01-01-2020)“…The article discusses issues related to improving the security of an information system by introducing an authentication system into distributed information…”
Get full text
Journal Article Conference Proceeding -
10
Specific features of the practical implementation of observation planning in systems for monitoring networks with dynamic topology
Published in E3S Web of Conferences (01-01-2020)“…The article is devoted to the issues of practical implementation of planning observations of information processes flows, the sources of which are dynamic…”
Get full text
Journal Article Conference Proceeding -
11
Speed improvement of the quantum factorization algorithm of P. Shor by upgrade its classical part
Published in E3S web of conferences (01-01-2020)“…This report discusses Shor’s quantum factorization algorithm and ρ–Pollard’s factorization algorithm. Shor’s quantum factorization algorithm consists of…”
Get full text
Journal Article Conference Proceeding -
12
Development of intelligent system for automated traffic control
Published in E3S Web of Conferences (01-01-2020)“…This article is devoted to the issue of regulating traffic congestion in major cities of the world using artificial neural networks. Research is aimed at…”
Get full text
Journal Article Conference Proceeding -
13
Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities
Published in E3S web of conferences (01-01-2020)“…This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security…”
Get full text
Journal Article Conference Proceeding -
14
Possibilities of conducting XSS-attacks and the development of countermeasures
Published in E3S web of conferences (01-01-2020)“…The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches…”
Get full text
Journal Article Conference Proceeding -
15
Investigation of the Possibilities of Optimizing the Temporary Regime of Radiation of Radiotechnical Information System in Order to Increase the Secrecy
Published in 2021 Radiation and Scattering of Electromagnetic Waves (RSEMW) (28-06-2021)“…The article analyzes the possibilities of increasing the secrecy of radiotechnical information system by reducing the operating time for radiation. The…”
Get full text
Conference Proceeding -
16
Development of Fast Exponentiation Algorithm «To Center and Back
Published in 2021 IEEE East-West Design & Test Symposium (EWDTS) (10-09-2021)“…In the present paper the exponentiation algorithm "To Center and Back" based on the idea of the additive chains exponentiation method is developed. The created…”
Get full text
Conference Proceeding -
17
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Published in 2020 IEEE East-West Design & Test Symposium (EWDTS) (01-09-2020)“…the purpose of this paper is investigation of existing approaches to formation of electronic digital signatures, as well as the possibility of software…”
Get full text
Conference Proceeding -
18
Cryptographic Algorithm Implementation for Data Encryption in DBMS MS SQL Server
Published in 2020 IEEE East-West Design & Test Symposium (EWDTS) (01-09-2020)“…the report discusses issues related to the MS SQL database administration, as well as the basic methods for implementing backup and encryption. It is proposed…”
Get full text
Conference Proceeding -
19
The development of countermeasures against session hijacking
Published in E3S web of conferences (01-01-2024)“…This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and…”
Get full text
Journal Article -
20
Examination of Physical Phenomena and Processes in the Magnetophotonic Composite Media. Magnetophotonics Material Medium
Published in 2018 19th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM) (01-06-2018)“…The development of radioelectronics and informative-and-communicative technologies of the XXI century is associated with the transmission of ever increasing…”
Get full text
Conference Proceeding