Keyword "ENCRYPTION" found in the following publications:
In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks ...
ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most ...
RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY
The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based ...
OVERVIEW OF CRYPTOGRAPHIC GATEWAYS FOR PROTECTION INFORMATION IN CORPORATE NETWORKS
This article discusses solutions from domestic manufacturers for the organization of a secure corporate network (cryptoslocks, VPN gateways), ...
ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION
Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, ...