Recent advances in post-quantum cryptography for networks: A survey
The development of quantum computers poses a new security threat to network
infrastructures and services, as they will be powerful enough to break the most common …
infrastructures and services, as they will be powerful enough to break the most common …
[PDF][PDF] High-speed and secure PRNG for cryptographic applications
Due to the fundamentally different approach underlying quantum cryptography (QC), it has
not only become competitive, but also has significant advantages over traditional …
not only become competitive, but also has significant advantages over traditional …
Strumok keystream generator
I Gorbenko, O Kuznetsov, Y Gorbenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
This work presents the main results of development of a new keystream generator, which is
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …
New approach to the implementation of post-quantum digital signature scheme
A Kuznetsov, A Kiian, V Babenko… - 2020 IEEE 11th …, 2020 - ieeexplore.ieee.org
This article is devoted to the analysis of possibilities of implementation of digital signature
schemes based on using error-correcting codes. This approach allows cryptographers to …
schemes based on using error-correcting codes. This approach allows cryptographers to …
The method of raising numbers, represented in the system of residual classes to an arbitrary power of a natural number
V Krasnobaev, A Kuznetsov, V Babenko… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
Methods for implementing integer arithmetic operations of addition, subtraction, and
multiplication in the system of residual classes are considered. It is shown that their practical …
multiplication in the system of residual classes are considered. It is shown that their practical …
An analysis of privacy issues and solutions in public blockchain (bitcoin)
S Banupriya, K Kottilingam - 2021 2nd international conference …, 2021 - ieeexplore.ieee.org
Blockchain is a new class of technology in computer science that combines cryptography
and distributed computing. It provides a digitally timestamped database where the network …
and distributed computing. It provides a digitally timestamped database where the network …
Code-based electronic digital signature
A Kuznetsov, A Pushkar'ov, N Kiyan… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we consider Code-Based Public-Key Cryptosystems (McElice and Niederreiter
schemes). These mechanisms provide high speed conversion and cryptographically strong …
schemes). These mechanisms provide high speed conversion and cryptographically strong …
Security and privacy issues of blockchain technology
O Oksiiuk, I Dmyrieva - 2020 IEEE 15th international conference …, 2020 - ieeexplore.ieee.org
Blockchain technology is currently one of the most popular topics in the field of information
technology. Blockchain is often associated with cryptocurrency or electronic cash, but it can …
technology. Blockchain is often associated with cryptocurrency or electronic cash, but it can …
Decentralized public key infrastructure development principles
K Isirova, O Potii - 2018 IEEE 9th International Conference on …, 2018 - ieeexplore.ieee.org
The existing public key infrastructure main development principles are given. Problems
related to the functioning of such system are described. The opportunity to secure use an …
related to the functioning of such system are described. The opportunity to secure use an …
Code-based cryptosystems from NIST PQC
A Kuznetsov, A Kiian, M Lutsenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we research code-based electronic digital signature schemes, which ware
submitted to the contest of post-quantum crypto algorithms NIST PQC. There are explored …
submitted to the contest of post-quantum crypto algorithms NIST PQC. There are explored …