2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) 2021
DOI: 10.1109/atit54053.2021.9678870
|View full text |Cite
|
Sign up to set email alerts
|

Description and Application of Network and Terminal Security Device Based on the Block Algorithm of Cryptographic Transformation of Information Using Random Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Therefore, when improving cryptoprotection, attention should be paid to both software and hardware. So, in [2] the hardware for encrypting streaming information by methods of indirect steganography is presented. Illustrations of cryptosystem operation algorithms are presented.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Therefore, when improving cryptoprotection, attention should be paid to both software and hardware. So, in [2] the hardware for encrypting streaming information by methods of indirect steganography is presented. Illustrations of cryptosystem operation algorithms are presented.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%