Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About the Journal
Editorial Team
Current
Archives
About
Submissions
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
No. 198 (2019): Radiotekhnika
No. 198 (2019): Radiotekhnika
Published:
2019-10-25
Full Issue
RT-198.PDF (Українська)
Articles
Algorithms of asymmetric encryption and encapsulation of keys of post-quantum period of 5 -7 stability stability levels and their applications
I.D. Gorbenko, O.G. Kachko, O.M. Oleksijchuk, O.O. Kuznetsov, Yu.I. Gorbenko, V.V. Onoprienko, M.V. Yesina, S.O. Kandy
5-18
PDF
Steganalysis method efficient for the hidden communication channel with low capacity
I.I. Bobok, A.A. Kobozeva
19-31
PDF
Mathematical model of orthogonal frequency distribution and multiplexing (OFDM) signals
I.D. Gorbenko, O.A. Zamula, V.L. Morozov, S.V. Rodionov
32-43
PDF
Cryptographic hashing algorithms used in modern blockchain systems
О.О. Кузнецов, Ю.І. Горбенко, В.В. Онопрієнко, І.В. Стельник, Д.В. Мялковський
44-53
PDF (Українська)
The study of cryptographic hashing algorithms used in modern blockchain systems
О.О. Кузнецов, Ю.І. Горбенко, В.В. Онопрієнко, І.В. Стельник, Д.В. Мялковський
54-74
PDF (Українська)
The study of the speed and statistical security of cryptographic hashing algorithms
О.О. Кузнецов, В.А. Тимченко, К.Є. Лисицький, М.Ю. Родінко, М.С. Луценко, К.Ю. Шеханін, А.О. Колгатін
75-95
PDF (Українська)
Establishing trust protocols in mutual distrust network by consensus formation
K. Isirova, O. Potii, J. Claussen
96-104
PDF
Method of Proof of Work consensus algorithms comparison
M. Osadchuk, R. Oliynykov
105-112
PDF
Some approach to data masking as means to counteract the inference threat
V.I. Yesin, V.V. Vilihura
113-130
PDF
Modern problems of centralized technologies of the client-server type and possibilities of their improvement on the basis of decentralization
Ю.І. Горбенко, М.В. Єсіна, Д.В. Мялковський, О.С. Акользіна, В.А. Пономарь
131-145
PDF (Українська)
Simulation of double spend attack on the “Proof of Work” consensus protocol
Н.А. Полуяненко, А.А. Кузнецов
146-161
PDF (Русский)
Principles of building and analyzing public key infrastructures based on the use of blockchain technology
І.Д. Горбенко, О.В. Потій, Ю.І. Горбенко, А.І. Пушкарьов, М.В. Єсіна
162-181
PDF (Українська)
Optimization of the method for the synthesis of discrete folding signals in the most common bag-box-and-bag systems
О.А. Замула
182-191
PDF (Українська)
The method of overcoming protection using vulnerabilities of graphic files in BMP
Р.С. Гриньов, О.В. Сєвєрінов
192-202
PDF (Українська)
Comparative analysis of cryptoprimitives on canonical elliptic curves and Edwards curves
В.А. Кулібаба
203-208
PDF (Українська)
Securuty of modified digital public-key signature EdDSA
A. Bessalov, L. Kovalchuk, N. Kuchynska, O. Telizhenko
209-214
PDF
The Kupyna hash function application to SPHINCS+ signatures
D. Televnyi
215-219
PDF
РУ
ISSN 0485-8972
eISSN 2786-5525
Rules writing articles
Article template
Consent to publication
Review form
Information
For Readers
For Authors
For Librarians