Zobrazeno 1 - 10
of 220
pro vyhledávání: '"Aloev, Rakhmatillo"'
Autor:
Aloev, Rakhmatillo Djuraevich1,2 (AUTHOR) alimova_v@nuu.uz, Berdyshev, Abdumauvlen Suleimanovich1,3 (AUTHOR) berdyshev@mail.ru, Alimova, Vasila2 (AUTHOR), Bekenayeva, Kymbat Slamovna1 (AUTHOR)
Publikováno v:
Axioms (2075-1680). May2024, Vol. 13 Issue 5, p334. 21p.
Autor:
Kumar, Vikas, Jiwari, Ram, Djurayevich, Aloev Rakhmatillo, Khudoyberganov, Mirzoali Urazaliyevich
Publikováno v:
In Communications in Nonlinear Science and Numerical Simulation December 2022 115
Autor:
Berdyshev, Abdumauvlen1,2 (AUTHOR) berdyshev@mail.ru, Aloev, Rakhmatillo3 (AUTHOR) aloevr@mail.ru, Abdiramanov, Zhanars1,2 (AUTHOR) a.janars@gmail.com, Ovlayeva, Mohinur3 (AUTHOR) mohinur1009@gmail.com
Publikováno v:
Symmetry (20738994). Oct2023, Vol. 15 Issue 10, p1863. 17p.
Autor:
Berdyshev, Abdumauvlen1,2 (AUTHOR), Aloev, Rakhmatillo3 (AUTHOR) aloevr@mail.ru, Bliyeva, Dana2 (AUTHOR) aloevr@mail.ru, Dadabayev, Sardor4 (AUTHOR), Baishemirov, Zharasbek1,2,5 (AUTHOR)
Publikováno v:
Symmetry (20738994). Oct2022, Vol. 14 Issue 10, pN.PAG-N.PAG. 21p.
Publikováno v:
AIP Conference Proceedings; 2023, Vol. 2746 Issue 1, p1-7, 7p
Publikováno v:
AIP Conference Proceedings; 2023, Vol. 2746 Issue 1, p1-10, 10p
It is important to create a cryptographic system such that the encryption system does not depend on the secret storage of the algorithm that is part of it, but only on the private key that is kept secret. In practice, key management is a separate are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ab8c44492497d9f08345a526fec4ff9
https://zenodo.org/record/7456169
https://zenodo.org/record/7456169
Autor:
Akhmedov, Bardosh, Aloev, Rakhmatillo
Publikováno v:
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM); Vol 3 No 2 (2022): International Journal of Informatics, Information System and Computer Engineering (INJIISCOM); 173-182
In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given. For example, the role of the bit gains in the application of the quadratic cryptanalysis meth
Autor:
Vikas Kumar, Ram Jiwari, Aloev Rakhmatillo Djurayevich, Mirzoali Urazaliyevich Khudoyberganov
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 115:106784
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Feb2023, Vol. 13 Issue 1, p911-919, 9p