Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
To: Author
Article Fingerprint
ReserarchID
IL4SW
The design of new cryptographic algorithms, as a rule, has the main goal of improving their resistance to cryptanalysis methods. Since cryptanalysis methods are constantly being improved, when designing crypto algorithms, it becomes necessary to create new non-standard approaches that can effectively resist the existing cryptanalysis methods. This paper describes in detail a new crypto algorithm created using an original technique aimed at radically improving cryptographic strength. The paper provides both brief theoretical justifications and a complete technical description of the crypto algorithm.
Dmitriy Shatokhin. 2026. \u201cNew Encryption Algorithm with Improved Security\u201d. Global Journal of Research in Engineering - J: General Engineering GJRE-J Volume 23 (GJRE Volume 23 Issue J1): .
Crossref Journal DOI 10.17406/gjre
Print ISSN 0975-5861
e-ISSN 2249-4596
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 101
Country: Kazakhstan
Subject: Global Journal of Research in Engineering - J: General Engineering
Authors: Dmitriy Shatokhin (PhD/Dr. count: 0)
View Count (all-time): 204
Total Views (Real + Logic): 1366
Total Downloads (simulated): 18
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
The design of new cryptographic algorithms, as a rule, has the main goal of improving their resistance to cryptanalysis methods. Since cryptanalysis methods are constantly being improved, when designing crypto algorithms, it becomes necessary to create new non-standard approaches that can effectively resist the existing cryptanalysis methods. This paper describes in detail a new crypto algorithm created using an original technique aimed at radically improving cryptographic strength. The paper provides both brief theoretical justifications and a complete technical description of the crypto algorithm.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.