A. A. Moldovyan

From MaRDI portal
(Redirected from Person:208141)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Complete signature randomization in an algebraic cryptoscheme with a hidden group
Quasigroups and Related Systems
2024-06-19Paper
Vector finite fields of characteristic two as algebraic support of multivariate cryptography
Computer Science Journal of Moldova
2024-05-29Paper
Split logarithm problem and a candidate for a post-quantum signature scheme
Computer Science Journal of Moldova
2023-09-06Paper
scientific article; zbMATH DE number 7565360 (Why is no real title available?)2022-07-29Paper
scientific article; zbMATH DE number 7564210 (Why is no real title available?)2022-07-26Paper
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Theoretical Computer Science
2022-05-23Paper
Digital signature scheme set in a hidden cyclic group
Computer Science Journal of Moldova
2021-09-20Paper
A new design of the signature schemes based on the hidden discrete logarithm problem2021-08-03Paper
An enhanced version of the hidden discrete logarithm problem and its algebraic support2021-02-16Paper
Commutative encryption method based on hidden logarithm problem
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
2021-01-12Paper
Post-quantum signature algorithms based on the hidden discrete logarithm problem
Computer Science Journal of Moldova
2020-11-02Paper
Post-quantum commutative encryption algorithm
Computer Science Journal of Moldova
2020-11-02Paper
Digital signature scheme with doubled verification equation
Computer Science Journal of Moldova
2020-11-02Paper
Collective signature protocols for signing groups
Advances in Intelligent Systems and Computing
2020-08-20Paper
General method for defining finite non-commutative associative algebras of dimension \(m>1\)2019-12-09Paper
Finite non-commutative associative algebras as carriers of hidden discrete logarithm problem
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
2019-06-07Paper
On some groupoids of small orders with Bol-Moufang type of identities2018-12-06Paper
Post-quantum no-key protocol2018-09-27Paper
Provably sender-deniable encryption scheme
Computer Science Journal of Moldova
2018-07-03Paper
Stream deniable-encryption algorithms
Computer Science Journal of Moldova
2018-07-03Paper
Non-commutative finite associative algebras of 2-dimensional vectors
Computer Science Journal of Moldova
2018-07-03Paper
Generating cubic equations as a method for public encryption
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2016-11-18Paper
Bi-deniable public-key encryption protocol which is secure against active coercive adversary
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2016-11-10Paper
scientific article; zbMATH DE number 6536413 (Why is no real title available?)2016-01-27Paper
On using Mersenne primes in the public-key encryption2016-01-27Paper
Software encryption algorithms for transparent protection technology
Cryptologia
2015-11-13Paper
Flexible block cipher with provably inequivalent cryptalgorithm modifications
Cryptologia
2015-11-13Paper
Practical method for bi-deniable public-key encryption2015-05-21Paper
Short signatures from the difficulty of factoring problem
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2014-10-23Paper
Group signature protocol based on masking public keys2014-07-03Paper
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
2009-05-07Paper
Cryptoschemes based on new signature formation mechanism
Computer Science Journal of Moldova
2007-06-26Paper
DDP-based ciphers: differential analysis of SPECTR-H64
Computer Science Journal of Moldova
2006-09-13Paper
Variable bit permutations: linear characteristics and pure VBP-based cipher
Computer Science Journal of Moldova
2005-11-21Paper
Algorithms for information conversion based on controlled two-place operations
Cybernetics and Systems Analysis
2005-08-12Paper
Controlled operation-based fast methods of data protection in automated control systems
Automation and Remote Control
2005-06-17Paper
Protective data transformations in ACSs on the basis of a new primitive
Automation and Remote Control
2005-06-17Paper
Flexible algorithms for protection of information in automatic control systems
Automation and Remote Control
2004-10-19Paper
Fast data encryption for automatic control systems
Automation and Remote Control
2004-10-13Paper
scientific article; zbMATH DE number 1746677 (Why is no real title available?)2002-06-16Paper
A cipher based on data-dependent permutations
Journal of Cryptology
2002-05-21Paper
scientific article; zbMATH DE number 1739896 (Why is no real title available?)2002-05-13Paper
Fast block ciphers based on controlled permutations
Computer Science Journal of Moldova
2001-10-14Paper
Software-implementable pseudoprobabilistic fast block ciphers
Cybernetics and Systems Analysis
1999-04-28Paper
Fast software encryption system based on local pseudorandomness
Computer Science Journal of Moldova
1998-10-01Paper
Software encryption: New 64-bit block cryptoscheme
Computer Science Journal of Moldova
1998-10-01Paper
scientific article; zbMATH DE number 1198991 (Why is no real title available?)1998-09-14Paper
scientific article; zbMATH DE number 1198993 (Why is no real title available?)1998-09-14Paper
New design principle for cryptographic modules in computer security systems
Cybernetics and Systems Analysis
1995-05-17Paper


Research outcomes over time


This page was built for person: A. A. Moldovyan