Skip to main content Skip to main navigation menu Skip to site footer
Computer Science and Cybersecurity
  • About
    • Field and Subject matter
    • Submissions
  • About the Journal
    • General information
    • Periodocity of publication
    • Open access policy
    • History of the journal
    • Peer review process
    • Publication ethics and publication malpractice statement
    • Payment for publication
    • Plagiarism check
    • Journal's Open Access declaration
  • Current
  • Archives
  • Editorial Team
  • Contact
  • Statistics
Search
  • Register
  • Login
  1. Home /
  2. Archives /
  3. No. 3 (2016)

No. 3 (2016)

Issue 3(3) 2016
Published: 2016-10-10

Full Issue

  • PDF (Українська)
  • Cover Image
    Methods and results of electronic signatures with appendix and message recovery comparative analysis
    Ivan Gorbenko, Marina Yesina, Natal'ya Kovaleva
    5-27
    • PDF
  • Cover Image
    Method of tabular realization of arithmetic operations in the system of residual classes
    Viktor Krasnobayev, Sergey Koshman, Alina Yanko
    28-35
    • PDF
  • Cover Image
    Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period
    Alexandr Kuznetsov, Andriy Pushkar’ov, Sergii Kavun, Vyacheslav Kalashnikov
    36-60
    • PDF (Русский)
  • Cover Image
    5G network architecture
    Olexandr Zamula, Vladislav Morozov
    61-67
    • PDF
  • Cover Image
    Investigation of geometry of placement of points of pseudo-random codes in Euclidean space
    Tamila Lavrovska
    68-77
    • PDF (Русский)
  • ISSN 2519-2310 (Online)
Keywords
Make a Submission
Open Journal Systems
Language
  • English
  • Українська
  • A Visual Guide to
    Open Journal Systems

About this Publishing System