Skip to main content
Skip to main navigation menu
Skip to site footer
Computer Science and Cybersecurity
About
Field and Subject matter
Submissions
About the Journal
General information
Periodocity of publication
Open access policy
History of the journal
Peer review process
Publication ethics and publication malpractice statement
Payment for publication
Plagiarism check
Journal's Open Access declaration
Current
Archives
Editorial Team
Contact
Statistics
Search
Search
Register
Login
Home
/
Archives
/
No. 3 (2016)
No. 3 (2016)
Issue 3(3) 2016
Published:
2016-10-10
Full Issue
PDF (Українська)
Methods and results of electronic signatures with appendix and message recovery comparative analysis
Ivan Gorbenko, Marina Yesina, Natal'ya Kovaleva
5-27
PDF
Method of tabular realization of arithmetic operations in the system of residual classes
Viktor Krasnobayev, Sergey Koshman, Alina Yanko
28-35
PDF
Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period
Alexandr Kuznetsov, Andriy Pushkar’ov, Sergii Kavun, Vyacheslav Kalashnikov
36-60
PDF (Русский)
5G network architecture
Olexandr Zamula, Vladislav Morozov
61-67
PDF
Investigation of geometry of placement of points of pseudo-random codes in Euclidean space
Tamila Lavrovska
68-77
PDF (Русский)
ISSN
2519-2310
(Online)
Keywords
Make a Submission
Open Journal Systems
Language
English
Українська
A Visual Guide to
Open Journal Systems