Keyword "CIPHER HACKING" found in the following publications:
ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most ...
ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most ...
Research result. Information technologies is included in the scientific database of the RINTs (license agreement No. 765-12/2014 dated 08.12.2014).
Журнал включен в перечень рецензируемых научных изданий, рекомендуемых ВАК