• The article presents the first critical analysis of the approach used by EU regulators and courts, in relation to cryptoactivity. The purpose of the analysis - is to see if a new European regulation on encrypted financial services is really born.

    статья (28,2 K)
  • Considers the development of attractive strategies featuring cryptocurrency assets, considering their costs and potential risks. The object of analysis is cryptocurrency as an investment instrument. Therefore, cryptocurrencies should not be correlated.

    статья (376,4 K)
  • Analysis of cryptocurrency as a contender for the role of the single world currency. Currently, none of the world currencies can become a single world currency, and without this the rapid development of the economy throughout the world is impossible.

    статья (15,5 K)
  • As precisely as possible the notion of cryptocurrency, their functions and features, the advantages and disadvantages, the possibility of using them as an investment and the risks that could be generated with the use of cryptocurrencie investment.

    статья (398,8 K)
  • The emergence of varieties of digital money, which today have become a new challenge to the familiar traditions of monetary circulation and are being transformed into a purely conventional reality. Withdrawing cryptocurrency to the electronic network.

    статья (15,7 K)
  • Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.

    книга (2,3 M)
  • Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.

    учебное пособие (9,3 M)
  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    курс лекций (4,9 M)
  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций (14,7 M)
  • Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.

    курс лекций (14,5 M)
  • Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.

    курс лекций (15,8 M)
  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие (1,6 M)
  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    книга (6,6 M)
  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга (57,2 M)
  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга (3,7 M)
  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга (1,5 M)
  • The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.

    книга (10,7 M)
  • Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.

    книга (1,9 M)
  • Исследования таксономического состава, численности, биомассы и первичной продукции представителей Cryptophyta водоёмов и водотоков, расположенных в Красноярском крае, Иркутской и Читинской областях. Биология криптофитовых, их сезонная динамика.

    статья (1,0 M)
  • Synthesis semizwitterionic viologens for the crystal engineering of functional materials. Application of the control positions of molecules in crystals using hydrogen bonds. The triple helices had obtained by tunig the spacer between donor and acceptor.

    статья (105,7 K)
  • Synthesis of two rare-earth nickel silicide PrNi9Si4 and NdNi9Si4. Their crystal structures, refined from X-ray powder diffraction data, structure type. The two compounds as Curie-Weiss paramagnets due to magnetic moments carried on the rare-earth atoms.

    статья (881,3 K)
  • Analyzing the results obtained, it can be assumed that studied structure of compound crystallizes in its own structural type. The study of crystal structure of a compound contributes to a better understanding of its physical properties (ferroelectric).

    статья (550,3 K)
  • Synthesis the new ternary indide Ca16Ni173.14In62.61 from the elements by arc-melting and determination its crystal structure by means of X-ray single crystal diffraction. Foundation the crystals of similar shape in an as-cast SrNi9In2 sample.

    статья (531,2 K)
  • The crystal structures of the ternary intermetallics Ce3Pt5Al and Ce3Pt5Al2 from single crystal X-ray diffraction data. Pearson symbol in the triclinic space group. The coordination packings of centered polyhedra. Structures of the new intermetallics.

    статья (165,9 K)
  • Vector computers, main memory background. Multilevel caches, a typical memory hierarchy. Core memory, semiconductor memory, DRAM. Fast hit times via trace cache. Increasing cache bandwidth by pipelining, non-blocking caches. Merging arrays example.

    презентация (933,6 K)
  • Исследование средств повышения потенциала предприятия методами планирования ресурсов, управлением полным циклом выпуска продукции. Анализ интеграции покупателя в процесс производства на основе открытых технологий. Выявление преимущества и недостатков.

    реферат (43,0 K)
  • Базовая структура элементов стиля. Привязывание страницы стилей к документу. Рассмотрение некоторых атрибутов и вариантов значений. Глобальное определение стиля в документе. Приписывание стилей конкретному элементу. Размещение фрагментов с помощью CSS.

    презентация (112,2 K)
  • An increase in the political weight of Americans of Cuban origin. The role of Cuban immigrants in Florida politics during the decade's presidential race and the struggle of major US parties for the "Cuban electorate". The winner of the candidate D. Trump.

    статья (19,0 K)
  • The culinary code. Consideration of the realization of one of the most active and stable metaphorical language models based on the development of secondary meanings of the Slavs’ food names from the linguocultural and linguo-didactic standpoint.

    статья (65,0 K)
  • The considers study areas for formation of the poly- / multicultural personality of the future teacher. Role of the motivational-target stage of the technology of formation of reflective culture in the system of professional selfdevelopment of teachers.

    статья (20,7 K)