24.04.2023 II International scientific and practical conference "Sustainable forestry"
1. Shubhani Aggarwal, Neeraj Kumar. Cryptographic primitives used in blockchain // Advances in Computers, Elsevier, Volume 121, 2021, pp. 83-93, https://doi.org/10.1016/bs.adcom.2020.08.003. 2. Aloev R.D., Nurullaev M.M. Software, algorithms and methods of data encryption based on national standards // IIUM Engineering Journal 21 (1), pp. 142–166, 2020. doi: 10.31436/iiumej.v21i1.1179. 3. Mukhammadovich N. M., Djuraevich A. R. Working with cryptographic key information. // International Journal of Electrical and Computer Engineering. – 2023. – Т. 13. – №. 1. – С. 911. doi: 10.11591/ijece.v13i1.pp911-919 4. Aloev R.D., Nurullaev M.M. Development of the Software Cryptographic Service Provider on the Basis of National Standards // Journal of Systemics, Cybernetics and Informatics, 17 (1), pp. 260–272, 2019. 5. Нуруллаев М. М. Моделирование информационных процессов в интегрированных системах безопасности // Молодой ученый. – 2018. – №. 17. – С. 26-27. 6. Acosta, A. J., Addabbo, T., and Tena-Sánchez, E. (2017) Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview. Int. J. Circ. Theor. Appl., 45: 145– 169. doi: 10.1002/cta.2296. 7. Aloev R.D., Nurullaev M.M. Cryptography Service Provider – Data Encryption // in Proc. Conference on Complexity, Informatics and Cybernetics, Orlando, Florida, USA, pp.127–131, 2019. 8. Muhammadovich N. M. The need to implement cryptographic information protection tools in the operating system and existing solutions // Central asian journal of mathematical theory and computer sciences. – 2023. – Т. 4. – №. 3. – С. 1-4. 9. Nurullaev M.M. Random number generation to ensure information security on mobile phones // International Journal of Contemporary Scientific and Technical Research, 1(1) pp.12-16, 2022. doi: 10.5281/zenodo.7238632 10. O’z DSt 1106:2009 – Information technology. Cryptographic protection of information. Hash function. 2009.