Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 7 No. 3 (2025): Theoretical and Applied Cybersecurity
Vol. 7 No. 3 (2025): Theoretical and Applied Cybersecurity
DOI:
https://doi.org/10.20535/tacs.2664-29132025.3
Published:
2025-12-28
Theoretical and cryptographic problems of cybersecurity
Oblivious S-functions and Their Security against Rotational Cryptanalysis
Serhii Yakovliev, Ihor Voloshyn
PDF
Proof Of Data Possession Protocol With Hash-based Deterministic Challenges And Privately Verifiable Payments
Maksym Strielnikov, Liudmyla Kovalchuk
PDF
Cryptographic attacks on AES based on side-channel information
Yevhenii Tolmachov
PDF
Pseudorandomness Analysis of Ciphertexts in the AJPS-2 Cryptosystem
Yurii Doroshenko, Dariya Yadukha
PDF
Differential Attack on IDEA Block Cipher Based on Its Key-Adding Function
Oleksandr Parshyn, Mykola Khmelnytskyi
PDF
Influence of SRM filters preprocessing on stego data localization in digital images
Pavlo Yatsura, Dmytro Progonov
PDF
Quantum cryptanalysis of ciphers based on generalized Feistel and Lai-Massey schemes
Andrii Fesenko
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Petri Net–Based Analysis of UAV Networks Availability Issues in Conditions of Adversary Counteraction
Iryna Stopochkina, Oleksii Novikov, Andrii Voitsekhovskyi, Mykola Ilin, Mykola Ovcharuk
PDF
Dynamic Detection and Classification of Critical Attention Objects under Crisis Events
Dmytro Lande, Yuriy Danyk
PDF
Research on the Possibility of Applying Acoustic Metamaterials for the Protection of Speech Information
Nazarii Lytvynenko, Yevhen Morshch
PDF
Algorithms and methods of cyber attacks prevention and counteraction
Identification of the malicious group’s digital trace using cryptography tools
Oleh Kozlenko, Yuliia Nakonechna, Mykhailo Mokhonko
PDF
Threat analysis metrics of cloud storage systems
Viktoriia Igorivna Polutsyhanova, Serhii Smyrnov
PDF
Intelligent Data analysis methods in cybersecurity
Forecasting Cyber Threat Intelligence with Memory Augmented Transformer
Anatolii Feher
PDF
Method of Counteracting Manipulative Queries to Large Language Models
Yehor Kovalchuk, Mykhailo Kolomytsev
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems