, Вінницький національний технічний університет, Ukraine
-
Ukrainian Information Security Research Journal Vol. 23 No. 3 (2021): Випуск 3 - Articles
CONFORMITY OF THE MODEL OF INFORMATION LEAKAGE SIGNALS FROM MONITOR SCREENS ON RARE CRYSTAL STRUCTURES WITH EXISTING SIDE ELECTROMAGNETIC RADIATIONS
Abstract pdf (Українська) -
Ukrainian Information Security Research Journal Vol. 14 No. 4 (57) (2012) - Articles
Use of recurrent sequences to construct cryptographic methods with the public key
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 7 No. 1(22) (2005) - Articles
Використання арифметичних операцій за модулем 2n для побудови блокових симетричних шифрів
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 1 (2013) - Articles
Specialized processors for authentication of the interaction parties based on recurrent sequences
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 3 (2013) - Articles
The method of permutations generating for an arbitrary quantity of elements
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 4 (2013) - Articles
Possibilities for authentication of the interaction parties based on recurrent sequences
Abstract PDF () PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 1 (2014) - Articles
Typing of social institutions via encoding method for individual activity as an element of information security
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 1 (2014) - Articles
Algebraic models of asymmetric cryptographic systems
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 4 (2014) - Articles
Model and methods for protection of structured social group from negative information-psychological impact
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 2 (2015) - Articles
MODELS TO COUNTER INFORMATION ATTACKS
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 2 (2015) - Articles
METHODS OF ENCRYPTION BASED ON PERMUTATION UNITS WITH VARIABLE LENGTH
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 21 No. 1 (2019) - Articles
The method of active protection of information from the laser acoustic intelligence systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 1 (2020) - Articles
Threat ranging for determination of costs to ensure the security of the information protection system based on the theory of fuzzy relations
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 23 No. 4 (2021): Information security - Articles
INDICATORS OF THE QUALITY OF DETECTION OF LETTERS OF THE ALPHABET BY A SPECIALIZED MEANS OF INTERCEPTING INFORMATION FROM MONITOR SCREENS ON RARE-CRYSTAL STRUCTURES
Abstract pdf (Українська) -
Ukrainian Information Security Research Journal Vol. 18 No. 4 (2016) - Articles
Synthesis of symmetrical functions of golden ratio
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Comparative analysis of the efficiency of algorithms fast Fourier transform in the basis systems
Abstract PDF (Українська) PDF PDF (Русский)