The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is devoted to simulations the networks with self-similar traffic. The self-similarity in the stochastic process is identified by calculation of the herst parameter value. Based on the results, received from the experimental research of network perfomance, we may conclude that the observed traffic in real-time mode is self-similar by its nature. Given results may be used for the further...
In modern cryptosystems, there are many well-proven often used constructions, such as operations in binary fields. In this paper method of algorithm construction for modular reduction by fixed irreducible polynomial (trinomial or pentanomial) was proposed. This method applying allows to get a high performance algorithm of modular reduction for specified fixed polynomial and target platform while cryptosystems...
The paper deals with research of energy characteristics of multilevel modulation techniques for modern broadband radio systems. The problems of modeling and analysis of digital data transmission channel are considered
The paper is devoted to the analysis of well-known methods of Edwards elliptic curves search. The suggested method is irrationally equivalent to the elliptic curves in Weierstrass form. The practical aspects of efficient software implementation of search irrationally equivalent curves algorithm are also considered in the paper. Authors describe a proposed modified search algorithm. Software implementation...
Particularly vulnerable spot for violation of information security is a data network, since it is impossible to guarantee the data protection when transferring them through a public environment (Internet, telephone lines, radio). Therefore, the information transmitted on different networks, particularly in need of security and the main way of providing it, is using the cryptographic methods. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.