Recent advances in post-quantum cryptography for networks: A survey

E Zeydan, Y Turk, B Aksoy… - … Conference On Mobile …, 2022 - ieeexplore.ieee.org
The development of quantum computers poses a new security threat to network
infrastructures and services, as they will be powerful enough to break the most common …

[PDF][PDF] High-speed and secure PRNG for cryptographic applications

Z Hu, S Gnatyuk, T Okhrimenko… - International Journal of …, 2020 - academia.edu
Due to the fundamentally different approach underlying quantum cryptography (QC), it has
not only become competitive, but also has significant advantages over traditional …

Strumok keystream generator

I Gorbenko, O Kuznetsov, Y Gorbenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
This work presents the main results of development of a new keystream generator, which is
named “Strumok”, and offered as a candidate for the national symmetric encryption standard …

New approach to the implementation of post-quantum digital signature scheme

A Kuznetsov, A Kiian, V Babenko… - 2020 IEEE 11th …, 2020 - ieeexplore.ieee.org
This article is devoted to the analysis of possibilities of implementation of digital signature
schemes based on using error-correcting codes. This approach allows cryptographers to …

The method of raising numbers, represented in the system of residual classes to an arbitrary power of a natural number

V Krasnobaev, A Kuznetsov, V Babenko… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
Methods for implementing integer arithmetic operations of addition, subtraction, and
multiplication in the system of residual classes are considered. It is shown that their practical …

An analysis of privacy issues and solutions in public blockchain (bitcoin)

S Banupriya, K Kottilingam - 2021 2nd international conference …, 2021 - ieeexplore.ieee.org
Blockchain is a new class of technology in computer science that combines cryptography
and distributed computing. It provides a digitally timestamped database where the network …

Code-based electronic digital signature

A Kuznetsov, A Pushkar'ov, N Kiyan… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we consider Code-Based Public-Key Cryptosystems (McElice and Niederreiter
schemes). These mechanisms provide high speed conversion and cryptographically strong …

Security and privacy issues of blockchain technology

O Oksiiuk, I Dmyrieva - 2020 IEEE 15th international conference …, 2020 - ieeexplore.ieee.org
Blockchain technology is currently one of the most popular topics in the field of information
technology. Blockchain is often associated with cryptocurrency or electronic cash, but it can …

Decentralized public key infrastructure development principles

K Isirova, O Potii - 2018 IEEE 9th International Conference on …, 2018 - ieeexplore.ieee.org
The existing public key infrastructure main development principles are given. Problems
related to the functioning of such system are described. The opportunity to secure use an …

Code-based cryptosystems from NIST PQC

A Kuznetsov, A Kiian, M Lutsenko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
In this paper we research code-based electronic digital signature schemes, which ware
submitted to the contest of post-quantum crypto algorithms NIST PQC. There are explored …