| Publication | Date of Publication | Type |
|---|
Complete signature randomization in an algebraic cryptoscheme with a hidden group Quasigroups and Related Systems | 2024-06-19 | Paper |
Vector finite fields of characteristic two as algebraic support of multivariate cryptography Computer Science Journal of Moldova | 2024-05-29 | Paper |
Split logarithm problem and a candidate for a post-quantum signature scheme Computer Science Journal of Moldova | 2023-09-06 | Paper |
| scientific article; zbMATH DE number 7565360 (Why is no real title available?) | 2022-07-29 | Paper |
| scientific article; zbMATH DE number 7564210 (Why is no real title available?) | 2022-07-26 | Paper |
A novel version of the hidden logarithm problem for post-quantum signature algorithms Theoretical Computer Science | 2022-05-23 | Paper |
Digital signature scheme set in a hidden cyclic group Computer Science Journal of Moldova | 2021-09-20 | Paper |
| A new design of the signature schemes based on the hidden discrete logarithm problem | 2021-08-03 | Paper |
| An enhanced version of the hidden discrete logarithm problem and its algebraic support | 2021-02-16 | Paper |
Commutative encryption method based on hidden logarithm problem Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" | 2021-01-12 | Paper |
Post-quantum signature algorithms based on the hidden discrete logarithm problem Computer Science Journal of Moldova | 2020-11-02 | Paper |
Post-quantum commutative encryption algorithm Computer Science Journal of Moldova | 2020-11-02 | Paper |
Digital signature scheme with doubled verification equation Computer Science Journal of Moldova | 2020-11-02 | Paper |
Collective signature protocols for signing groups Advances in Intelligent Systems and Computing | 2020-08-20 | Paper |
| General method for defining finite non-commutative associative algebras of dimension \(m>1\) | 2019-12-09 | Paper |
Finite non-commutative associative algebras as carriers of hidden discrete logarithm problem Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" | 2019-06-07 | Paper |
| On some groupoids of small orders with Bol-Moufang type of identities | 2018-12-06 | Paper |
| Post-quantum no-key protocol | 2018-09-27 | Paper |
Provably sender-deniable encryption scheme Computer Science Journal of Moldova | 2018-07-03 | Paper |
Stream deniable-encryption algorithms Computer Science Journal of Moldova | 2018-07-03 | Paper |
Non-commutative finite associative algebras of 2-dimensional vectors Computer Science Journal of Moldova | 2018-07-03 | Paper |
Generating cubic equations as a method for public encryption Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2016-11-18 | Paper |
Bi-deniable public-key encryption protocol which is secure against active coercive adversary Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2016-11-10 | Paper |
| scientific article; zbMATH DE number 6536413 (Why is no real title available?) | 2016-01-27 | Paper |
| On using Mersenne primes in the public-key encryption | 2016-01-27 | Paper |
Software encryption algorithms for transparent protection technology Cryptologia | 2015-11-13 | Paper |
Flexible block cipher with provably inequivalent cryptalgorithm modifications Cryptologia | 2015-11-13 | Paper |
| Practical method for bi-deniable public-key encryption | 2015-05-21 | Paper |
Short signatures from the difficulty of factoring problem Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2014-10-23 | Paper |
| Group signature protocol based on masking public keys | 2014-07-03 | Paper |
New algorithms and protocols for information authentication in automatic control systems Automation and Remote Control | 2009-05-07 | Paper |
Cryptoschemes based on new signature formation mechanism Computer Science Journal of Moldova | 2007-06-26 | Paper |
DDP-based ciphers: differential analysis of SPECTR-H64 Computer Science Journal of Moldova | 2006-09-13 | Paper |
Variable bit permutations: linear characteristics and pure VBP-based cipher Computer Science Journal of Moldova | 2005-11-21 | Paper |
Algorithms for information conversion based on controlled two-place operations Cybernetics and Systems Analysis | 2005-08-12 | Paper |
Controlled operation-based fast methods of data protection in automated control systems Automation and Remote Control | 2005-06-17 | Paper |
Protective data transformations in ACSs on the basis of a new primitive Automation and Remote Control | 2005-06-17 | Paper |
Flexible algorithms for protection of information in automatic control systems Automation and Remote Control | 2004-10-19 | Paper |
Fast data encryption for automatic control systems Automation and Remote Control | 2004-10-13 | Paper |
| scientific article; zbMATH DE number 1746677 (Why is no real title available?) | 2002-06-16 | Paper |
A cipher based on data-dependent permutations Journal of Cryptology | 2002-05-21 | Paper |
| scientific article; zbMATH DE number 1739896 (Why is no real title available?) | 2002-05-13 | Paper |
Fast block ciphers based on controlled permutations Computer Science Journal of Moldova | 2001-10-14 | Paper |
Software-implementable pseudoprobabilistic fast block ciphers Cybernetics and Systems Analysis | 1999-04-28 | Paper |
Fast software encryption system based on local pseudorandomness Computer Science Journal of Moldova | 1998-10-01 | Paper |
Software encryption: New 64-bit block cryptoscheme Computer Science Journal of Moldova | 1998-10-01 | Paper |
| scientific article; zbMATH DE number 1198991 (Why is no real title available?) | 1998-09-14 | Paper |
| scientific article; zbMATH DE number 1198993 (Why is no real title available?) | 1998-09-14 | Paper |
New design principle for cryptographic modules in computer security systems Cybernetics and Systems Analysis | 1995-05-17 | Paper |