Ouroboros: A provably secure proof-of-stake blockchain protocol A Kiayias, A Russell, B David, R Oliynykov Annual international cryptology conference, 357-388, 2017 | 1986 | 2017 |
Zendoo: A zk-SNARK verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains A Garoffolo, D Kaidalov, R Oliynykov 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 103 | 2020 |
A method for generation of high-nonlinear s-boxes based on gradient descent O Kazymyrov, V Kazymyrova, R Oliynykov Cryptology ePrint Archive, 2013 | 77 | 2013 |
A new encryption standard of Ukraine: The Kalyna block cipher R Oliynykov, I Gorbenko, O Kazymyrov, V Ruzhentsev, O Kuznetsov, ... Cryptology ePrint Archive, 2015 | 59 | 2015 |
A prospective lightweight block cipher for green IT engineering A Andrushkevych, Y Gorbenko, O Kuznetsov, R Oliynykov, M Rodinko Green IT Engineering: Social, Business and Industrial Applications, 95-112, 2019 | 48 | 2019 |
A treasury system for cryptocurrencies: Enabling better collaborative intelligence B Zhang, R Oliynykov, H Balogun Cryptology ePrint Archive, 2018 | 39 | 2018 |
Influence of addition modulo 2 n on algebraic attacks O Kazymyrov, R Oliynykov, H Raddum Cryptography and Communications 8, 277-289, 2016 | 33 | 2016 |
Optimization of the high nonlinear S-boxes generation method M Rodinko, R Oliynykov, Y Gorbenko Tatra Mountains Mathematical Publications 70 (1), 93-105, 2017 | 29 | 2017 |
Results of Ukrainian national public cryptographic competition R Oliynykov, I Gorbenko, V Dolgov, V Ruzhentsev Tatra Mountains Mathematical Publications 47 (1), 99-113, 2010 | 25 | 2010 |
Decreasing security threshold against double spend attack in networks with slow synchronization L Kovalchuk, D Kaidalov, A Nastenko, M Rodinko, O Shevtsov, ... Computer Communications 154, 75-81, 2020 | 23 | 2020 |
A method for security estimation of the SPN-based block cipher against related-key attacks D Kaidalov, R Oliynykov, O Kazymyrov Tatra Mountains Mathematical Publications 60 (1), 25-45, 2014 | 22 | 2014 |
Properties of Linear Transformations for Symmetric Block Ciphers on the basis of MDS-codes V Ruzhentsev, R Oliynykov 2011 Conference on Network and Information Systems Security, 1-4, 2011 | 22 | 2011 |
Blockchain technologies: Probability of double-spend attack on a proof-of-stake consensus M Karpinski, L Kovalchuk, R Kochan, R Oliynykov, M Rodinko, L Wieclaw Sensors 21 (19), 6408, 2021 | 18 | 2021 |
Improvement of the high nonlinear S-boxes generation method M Rodinko, R Oliynykov, Y Gorbenko 2016 Third International Scientific-Practical Conference Problems of …, 2016 | 18 | 2016 |
An impact of S-box Boolean function properties to strength of modern symmetric block ciphers R Olijnykov, O Kazymyrov Радиотехника, 11-17, 2011 | 18 | 2011 |
A new standard of Ukraine: The Kupyna hash function R Oliynykov, I Gorbenko, O Kazymyrov, V Ruzhentsev, O Kuznetsov, ... Cryptology ePrint Archive, 2015 | 16 | 2015 |
Analysis of splitting attacks on Bitcoin and GHOST consensus protocols L Kovalchuk, D Kaidalov, O Shevtsov, A Nastenko, M Rodinko, ... 2017 9th IEEE International Conference on Intelligent Data Acquisition and …, 2017 | 13 | 2017 |
Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation R Oliynykov, I Gorbenko, V Dolgov, D Kaidalov Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011 | 13 | 2011 |
Ouroboros: a provably secure proof-of-stake blockchain protocol (2016) A Kiayias, A Russell, B David, R Oliynykov As of 24, 2018 | 12 | 2018 |
Comparison of modern network attacks on TLS protocol O Ivanov, V Ruzhentsev, R Oliynykov 2018 International Scientific-Practical Conference Problems of …, 2018 | 11 | 2018 |