1. 2023
  2. Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics

    Ryabko, B., 30 Sept 2023, In: Entropy. 25, 10, 1406.

    Research output: Contribution to journalArticlepeer-review

  3. Post-Quantum Cryptosystems: Open Problems and Solutions. Lattice-Based Cryptosystems

    Malygina, E. S., Kutsenko, A. V., Novoselov, S. A., Kolesnikov, N. S., Bakharev, A. O., Khilchuk, I. S., Shaporenko, A. S. & Tokareva, N. N., Sept 2023, In: Journal of Applied and Industrial Mathematics. 17, 4, p. 767-790 24 p.

    Research output: Contribution to journalArticlepeer-review

  4. Unconditionally secure short key ciphers based on data compression and randomization

    Ryabko, B., Jun 2023, In: Designs, Codes, and Cryptography. 91, 6, p. 2201-2212 12 p.

    Research output: Contribution to journalArticlepeer-review

  5. Influence of Atmospheric Flow Structure on Optical Turbulence Characteristics

    Shikhovtsev, A. Y., Kovadlo, P. G., Lezhenin, A. A., Korobov, O. A., Kiselev, A. V., Russkikh, I. V., Kolobov, D. Y. & Shikhovtsev, M. Y., Feb 2023, In: Applied Sciences (Switzerland). 13, 3, 1282.

    Research output: Contribution to journalArticlepeer-review

  6. Application of a Genetic Algorithm in Planning the Optimal Route of Unmanned Aerial Vehicles Used for Large Area Monitoring

    Rodionov, A. S., Matkurbanov, T. A. & Yagibayeva, M. R., 2023, Proceedings of the 2023 IEEE 16th International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering, APEIE 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 1560-1564 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

  7. Linear hash functions and their applications to error detection and correction

    Ryabko, B., 2023, In: Discrete Mathematics, Algorithms and Applications. 2350070.

    Research output: Contribution to journalArticlepeer-review

  8. Mathematical problems and solutions of the Ninth International Olympiad in Cryptography NSUCRYPTO

    Idrisova, V. A., Tokareva, N. N., Gorodilova, A. A., Beterov, I. I., Bonich, T. A., Ishchukova, E. A., Kolomeec, N. A., Kutsenko, A. V., Malygina, E. S., Pankratova, I. A., Pudovkina, M. A. & Udovenko, A. N., 2023, In: Прикладная дискретная математика. 62, p. 29-54 26 p., 4.

    Research output: Contribution to journalArticlepeer-review

  9. On the number of ℓ-suitable Boolean functions in constructions of filter and combining models of stream ciphers

    Bonich, T. A., Panferov, M. A. & Tokareva, N. N., 2023, In: Прикладная дискретная математика. 62, p. 21-28 8 p.

    Research output: Contribution to journalArticlepeer-review

  10. Technique for Evaluating the Effectiveness of the Information Security Department

    Belov, V. M., Belova, N. V., Pestunova, T. M. & Kosov, D. L., 2023, Proceedings of the 2023 IEEE 16th International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering, APEIE 2023. Institute of Electrical and Electronics Engineers (IEEE), p. 1130-1133 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

  11. Using x86 mode switching for program code protection

    Lebedev, R. K., 2023, In: Прикладная дискретная математика. 61, p. 104-120 17 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 9 Next

ID: 3087514