Author of the publication

Algorithms for Determining Residues Modulo in a Complex Numerical Domain.

, , , and . CITRisk, volume 2805 of CEUR Workshop Proceedings, page 118-129. CEUR-WS.org, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Binary Constant Weight Coding Technique., , , and . ICTERI, volume 2740 of CEUR Workshop Proceedings, page 102-114. CEUR-WS.org, (2020)Design of a Residual Adder in Computer Systems (short paper)., , , and . CPITS I, volume 2923 of CEUR Workshop Proceedings, page 206-212. CEUR-WS.org, (2021)Algorithms for Determining Residues Modulo in a Complex Numerical Domain., , , and . CITRisk, volume 2805 of CEUR Workshop Proceedings, page 118-129. CEUR-WS.org, (2020)New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom Sequences., , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 1-14. CEUR-WS.org, (2019)Side Channel Attack on a Quantum Random Number Generator., , , , , and . IDAACS, page 713-717. IEEE, (2019)Techniques for Raising the Remainder to a Power in the System of Residual Classes., , , , and . DESSERT, page 145-150. IEEE, (2020)New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences., , , and . ICTERI Workshops, volume 2732 of CEUR Workshop Proceedings, page 214-227. CEUR-WS.org, (2020)Method of Tabular Implementation for Diagnostics of Non-Positional Code Structures in the System of Residual Classes., , , , and . CPITS II (2), volume 3188 of CEUR Workshop Proceedings, page 177-186. CEUR-WS.org, (2021)Mathematical Model of the Biometric System of Fingerprint Authentication for Modern Web-Services., , , , , and . CMiGIN, volume 2588 of CEUR Workshop Proceedings, page 121-139. CEUR-WS.org, (2019)Code-based Hybrid Cryptosystem: Comparative studies and Analysis of Efficiency., , , , , and . Int. J. Comput., (2019)