{"id":240,"date":"2019-11-20T14:07:25","date_gmt":"2019-11-20T14:07:25","guid":{"rendered":"https:\/\/mv2.li\/?page_id=240"},"modified":"2019-11-20T22:08:10","modified_gmt":"2019-11-20T22:08:10","slug":"about-us-2","status":"publish","type":"page","link":"https:\/\/mv2.li\/?page_id=240","title":{"rendered":"Articles"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"240\" class=\"elementor elementor-240\" data-elementor-settings=\"[]\">\n\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-element elementor-element-8608953 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"8608953\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1e171b elementor-column elementor-col-100 elementor-top-column\" data-id=\"f1e171b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-508d42b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"508d42b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c76d116 elementor-column elementor-col-33 elementor-top-column\" data-id=\"c76d116\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39bcc94 elementor-widget elementor-widget-text-editor\" data-id=\"39bcc94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><h6>We always do it best<\/h6><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83c271 elementor-column elementor-col-66 elementor-top-column\" data-id=\"c83c271\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<section class=\"elementor-element elementor-element-2708479 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"2708479\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-848c88e elementor-column elementor-col-50 elementor-inner-column\" data-id=\"848c88e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2aed2c elementor-widget elementor-widget-text-editor\" data-id=\"c2aed2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span style=\"font-weight: 300;\">\nThe stuff of \u201cCreative laboratory\u201d have written more than 50 articles and several books dedicated to technologies developed by the Laboratory and cryptography in particular.\nThe main works in this sphere are the following:<br>\n<br>\nValentin Michtchenko, Victor Lepin, Yury Vilanski. MV2 cryptographic algorithm<br>\n<br>\nValentin Michtchenko, Yury Vilanski. Harmed Texts and Multi-channel Cryptography; Edited by V. Michtchenko. &#8211; Minsk: Enciclopedics, 2007. &#8211; 292 p. &#8211; ISBN 978-985-6742-46-3<\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21d0e70 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"21d0e70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f06038 elementor-widget elementor-widget-text-editor\" data-id=\"7f06038\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><div style=\"height: 94px;\"><\/div>\n<a href=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/book-3-mv2-en-prn.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-260\" src=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/pdf_icon.png\" alt=\"\" width=\"27\" height=\"30\" \/><\/a>\n<div style=\"height: 47px;\"><\/div>\n<a href=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/Harmed_Texts.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-260\" src=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/pdf_icon.png\" alt=\"\" width=\"27\" height=\"30\" \/><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<h6>We always do it best<\/h6>\n<p>The stuff of \u201cCreative laboratory\u201d have written more than 50 articles and several books dedicated to technologies developed by the Laboratory and cryptography in particular.<br \/>\nThe main works in this sphere are the following:<\/p>\n<p>Valentin Michtchenko, Victor Lepin, Yury Vilanski. MV2 cryptographic algorithm<\/p>\n<p>Valentin Michtchenko, Yury Vilanski. Harmed Texts and Multi-channel Cryptography; Edited by V. Michtchenko. &#8211; Minsk: Enciclopedics, 2007. &#8211; 292 p. &#8211; ISBN 978-985-6742-46-3<br \/>\n<a href=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/book-3-mv2-en-prn.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/pdf_icon.png\" alt=\"\" width=\"27\" height=\"30\" \/><\/a><br \/>\n<a href=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/Harmed_Texts.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mv2.li\/wp-content\/uploads\/2019\/11\/pdf_icon.png\" alt=\"\" width=\"27\" height=\"30\" \/><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/pages\/240"}],"collection":[{"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mv2.li\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=240"}],"version-history":[{"count":14,"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/pages\/240\/revisions"}],"predecessor-version":[{"id":273,"href":"https:\/\/mv2.li\/index.php?rest_route=\/wp\/v2\/pages\/240\/revisions\/273"}],"wp:attachment":[{"href":"https:\/\/mv2.li\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}