Skip to main content Skip to main navigation menu Skip to site footer
Computer Science and Cybersecurity
  • About
    • Field and Subject matter
    • Submissions
  • About the Journal
    • General information
    • Periodocity of publication
    • Open access policy
    • History of the journal
    • Peer review process
    • Publication ethics and publication malpractice statement
    • Payment for publication
    • Plagiarism check
    • Journal's Open Access declaration
  • Current
  • Archives
  • Editorial Team
  • Contact
  • Statistics
Search
  • Register
  • Login
  1. Home /
  2. Archives /
  3. No. 2 (2016)

No. 2 (2016)

Issue 2(2) 2016
ISSUE 2(2) 2016
Published: 2016-09-07

Full Issue

  • PDF (Українська)
  • Cover Image
    Conception of realization of criptographic rsa transformations with using of the residue number system.
    Viktor Krasnobayev, Alina Yanko, Sergey Koshman
    5-12
    • PDF
  • Cover Image
    Description and applications of binomial numeral systems.
    Olexiy Borysenko, Vyacheslav Kalashnikov, Nataliya Kalashnykova
    13-21
    • PDF
  • Cover Image
    The selection of forming polynomials for shift register with nonlinear feedback second order that generates the sequence with maximum period.
    Oleksandr Potii, Nikolay Poluyanenko
    22-30
    • PDF (Русский)
  • Cover Image
    The golden section, Fibonacci numbers, mathematics of harmony and “Golden” scientific revolution.
    Alexey Stakhov
    31-68
    • PDF
  • Cover Image
    Key schedule of block symmetric ciphers.
    Alexandr Kuznetsov, Yuriy Gorbenko, Ievgeniia Kolovanova
    69-81
    • PDF
  • ISSN 2519-2310 (Online)
Keywords
Make a Submission
Open Journal Systems
Language
  • English
  • Українська
  • A Visual Guide to
    Open Journal Systems

About this Publishing System