5G NETWORK ARCHITECTURE
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2016, Vol 3, Issue 3
Abstract
The work deals with the main stages in the history of the development of different generations of cellular communication and options for the organization of their architecture. A brief overview of the main features and prin-ciples of construction of cellular networks of different generations. The analysis of the features and principles works of modern cellular networks of the fifth generation. Defined possibilities forward directions of modernization of existing cellular communication networks and opportunities to increase their potential.
Authors and Affiliations
O. Zamula, V. Morozov
Methods and results of electronic signatures with appendix and message recovery comparative analysis
The paper deals with the comparative analysis methods of electronic signature mechanisms properties. The existing methods of comparative analysis of electronic signatures based on expert estimations methods – analytic hi...
Стратегія вибору S-блоків для нелінійного перетворення шифру струмок
Обговорюються особливості побудування S-перетворення шифру Струмок. Зокрема увага зосереджується на виборі S-блоків для цього перетворення. Оцінюються показники його випадковості, зокрема визначається мінімальне число ци...
Testing the speed of modern stream ciphers
The paper is a continuation of numerous studies of a candidate for encryption national standard of Ukraine, the Strumok new symmetric stream cipher. The result of a study is compare the most famous algorithms of stream c...
Code-based schemes for digital signatures
This article is devoted to the features of construction and use of electronic digital signature schemes based on the use of error-correcting codes, namely the most common scheme, which is based on this approach, CFS and...
CONCEPTION OF REALIZATION OF CRIPTOGRAPHIC RSA TRANSFORMATIONS WITH USING OF THE RESIDUE NUMBER SYSTEM
The methods of rapid information processing aimed to reduce the time of realization of cryptographic RSA transformations are propounded in the paper. These methods are based on application of the principle of ring shift...