|
|
Publications in Math-Net.Ru
-
Post-quantum public-key cryptoschemes on finite algebras
Informatics and Automation, 23:4 (2024), 1246–1276
-
Finite algebras in the design of multivariate cryptography algorithms
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2023, no. 3, 80–89
-
Structure of a $4$-dimensional algebra and generating parameters of the hidden discrete logarithm problem
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 18:2 (2022), 209–217
-
Post-quantum signature scheme on matrix algebra
Sistemy i Sredstva Inform., 31:4 (2021), 38–47
-
Digital signature scheme on the $2 \times 2$ matrix algebra
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 17:3 (2021), 254–261
-
Signature schemes on algebras, satisfying enhanced criterion of post-quantum security
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2020, no. 2, 62–67
-
Candidate for practical post-quantum signature scheme
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 16:4 (2020), 455–461
-
Commutative encryption method based on hidden logarithm problem
Vestnik YuUrGU. Ser. Mat. Model. Progr., 13:2 (2020), 54–68
-
Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2019, no. 1, 71–78
-
New forms of defining the hidden discrete logarithm problem
Tr. SPIIRAN, 18:2 (2019), 504–529
-
Post-quantum electronic digital signature scheme based on the enhanced form of the hidden discrete logarithm problem
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 15:2 (2019), 212–220
-
Finite non-commutative associative algebras as carriers of hidden discrete logarithm problem
Vestnik YuUrGU. Ser. Mat. Model. Progr., 12:1 (2019), 66–81
-
Methods and algorithms for pseudo-probabilistic encryption with shared key
Tr. SPIIRAN, 61 (2018), 119–146
-
Post-quantum no-key protocol
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2017, no. 3, 115–119
-
Generating cubic equations as a method for public encryption
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2015, no. 3, 60–71
-
Bi-deniable public-key encryption protocol which is secure against active coercive adversary
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2014, no. 3, 23–29
-
Short signatures from the difficulty of factoring problem
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2013, no. 2-3, 27–36
-
Structure peculiarities of the finite vector groups and their use in the cryptoscheme design
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 2011, no. 4, 84–93
-
Information authentication in automated control systems based on finite groups with multidimensional cyclicity
Avtomat. i Telemekh., 2009, no. 8, 177–190
-
Vector form of the finite fields $GF(p^m)$
Bul. Acad. Ştiinţe Repub. Mold. Mat., 2009, no. 3, 57–63
-
Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces
Avtomat. i Telemekh., 2008, no. 12, 163–177
-
New algorithms and protocols for information authentication in automatic control systems
Avtomat. i Telemekh., 2008, no. 7, 157–169
-
Protective Data Transformations in ACSs on the Basis of a New Primitive
Avtomat. i Telemekh., 2002, no. 12, 147–165
-
Controlled Operation-Based Fast Methods of Data Protection in Automated Control Systems
Avtomat. i Telemekh., 2001, no. 6, 168–184
-
Fast data encryption for automatic control systems
Avtomat. i Telemekh., 2000, no. 4, 151–165
-
Flexible algorithms for protection of information in automatic control systems
Avtomat. i Telemekh., 1998, no. 8, 166–176
-
Phonon spectrum and band edge absorption in $\mathrm{CdAl}_{2}\mathrm{S}_{4}$
Fizika Tverdogo Tela, 34:3 (1992), 967–969
© , 2024