• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Book
Physics of the Human Temporality: Complex Present

Lubashevsky I., Plavinska N.

Springer International Publishing, 2021.

Article
On the impossibility of an invariant attack on Kuznyechik

Fomin D.

Journal of Computer Virology and Hacking Techniques. 2021.

Book chapter
NUMERICAL SOLUTION OF 3D NON-STATIONARY SCATTERING PROBLEMS WITH SUBLINEAR COMPLEXITY

Petropavlovsky S., Tsynkov S., Turkel E.

In bk.: Международная конференция «Математические идеи П. Л. Чебышёва и их приложения к современным проблемам естествознания», приуроченная к 200-летию со дня рождения великого русского математика, академика П. Л. Чебышёва : Материалы конференции.. Калужский печатный двор, 2021. P. 342-343.

Working paper
Construction of a set of circulant matrix submatrices for faster MDS matrix verification

Stanislav S. Malakhov.

math. arXiv. Cornell University, 2021. No. 2110.13325.

Tag "computer security" – News

HSE Student Qualifies for the First Time for EU Contest for Young Scientists

Andrey Schebetov, fiirst-year student of the Bachelor’s programme in Computer Security at MIEM HSE
First-year student of the Bachelor’s programme in Computer Security at MIEM HSE, Andrey Schebetov, has joined the team that will represent the Russian Federation at the EU Contest for Young Scientists (EUCYS).

How Not to Fall Victim to a Computer Virus

In the last few days, a very dangerous virus that encrypts all data on computers and demands money for decryption has been appearing on the Internet. Over 300,000 computers have been infected around the world. Computers running Microsoft Windows operating systems are at particular risk. As a result, Microsoft has released an update that eliminates vulnerability.