The research of modern stream ciphers
I Gorbenko, A Kuznetsov, M Lutsenko… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Synchronous stream ciphers produce long keystreams to be XORed with plaintext. The
output keystreams should be indistinguishable from truly random sequences and should not …
output keystreams should be indistinguishable from truly random sequences and should not …
Code-based public-key cryptosystems for the post-quantum period
A Kuznetsov, I Svatovskij, N Kiyan… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Code-Based Public-Key Cryptosystems were been considered in this work. In addition, the
current state, the existing contradictions and prospects of practical use for the post-quantum …
current state, the existing contradictions and prospects of practical use for the post-quantum …
Strumok stream cipher: Specification and basic properties
O Kuznetsov, M Lutsenko… - 2016 Third International …, 2016 - ieeexplore.ieee.org
STRUMOK is a word-oriented additive stream cipher, where a word in the specification is
chosen to be 64 bits. STRUMOK cipher uses some basic design principles from the stream …
chosen to be 64 bits. STRUMOK cipher uses some basic design principles from the stream …
Strumok keystream generator
I Gorbenko, O Kuznetsov, Y Gorbenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
This work presents the main results of development of a new keystream generator, which is
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2
A Kuznetsov, Y Gorbenko… - … and Technology (PIC …, 2017 - ieeexplore.ieee.org
The paper displays the results of the research of lightweight symmetric cryptographic
transformations that can be applied in confined environments. For this purpose, we carried …
transformations that can be applied in confined environments. For this purpose, we carried …
New approach to the implementation of post-quantum digital signature scheme
A Kuznetsov, A Kiian, V Babenko… - 2020 IEEE 11th …, 2020 - ieeexplore.ieee.org
This article is devoted to the analysis of possibilities of implementation of digital signature
schemes based on using error-correcting codes. This approach allows cryptographers to …
schemes based on using error-correcting codes. This approach allows cryptographers to …
Code-based electronic digital signature
A Kuznetsov, A Pushkar'ov, N Kiyan… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we consider Code-Based Public-Key Cryptosystems (McElice and Niederreiter
schemes). These mechanisms provide high speed conversion and cryptographically strong …
schemes). These mechanisms provide high speed conversion and cryptographically strong …
Code-based cryptosystems from NIST PQC
A Kuznetsov, A Kiian, M Lutsenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we research code-based electronic digital signature schemes, which ware
submitted to the contest of post-quantum crypto algorithms NIST PQC. There are explored …
submitted to the contest of post-quantum crypto algorithms NIST PQC. There are explored …
Construction of cascade codes in the frequency domain
A Kuznetsov, R Serhiienko… - … and Technology (PIC …, 2017 - ieeexplore.ieee.org
The mathematical apparatus of the multidimensional discrete Fourier transform over finite
fields is considered. Methods for the description of linear block codes in the frequency …
fields is considered. Methods for the description of linear block codes in the frequency …
New code based fuzzy extractor for biometric cryptography
A Kuznetsov, A Kiyan, A Uvarova… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
In this paper methods of forming cryptographic keys from biometric images using fuzzy
extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece …
extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece …