N. A. Moldovyan

From MaRDI portal
Person:656566



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Finite algebras in the design of multivariate cryptography algorithms
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2024-10-08Paper
Vector finite fields of characteristic two as algebraic support of multivariate cryptography
Computer Science Journal of Moldova
2024-05-29Paper
Split logarithm problem and a candidate for a post-quantum signature scheme
Computer Science Journal of Moldova
2023-09-06Paper
scientific article; zbMATH DE number 7634958 (Why is no real title available?)2022-12-20Paper
scientific article; zbMATH DE number 7564210 (Why is no real title available?)2022-07-26Paper
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Theoretical Computer Science
2022-05-23Paper
Digital signature scheme set in a hidden cyclic group
Computer Science Journal of Moldova
2021-09-20Paper
A new design of the signature schemes based on the hidden discrete logarithm problem2021-08-03Paper
An enhanced version of the hidden discrete logarithm problem and its algebraic support2021-02-16Paper
Commutative encryption method based on hidden logarithm problem
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
2021-01-12Paper
Post-quantum signature algorithms based on the hidden discrete logarithm problem
Computer Science Journal of Moldova
2020-11-02Paper
Post-quantum commutative encryption algorithm
Computer Science Journal of Moldova
2020-11-02Paper
Digital signature scheme with doubled verification equation
Computer Science Journal of Moldova
2020-11-02Paper
scientific article; zbMATH DE number 7259165 (Why is no real title available?)2020-10-12Paper
Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
Advances in Intelligent Systems and Computing
2020-08-20Paper
No-key protocol for deniable encryption
Advances in Intelligent Systems and Computing
2020-08-20Paper
Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base2019-12-09Paper
Finite non-commutative associative algebras as carriers of hidden discrete logarithm problem
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
2019-06-07Paper
scientific article; zbMATH DE number 7034347 (Why is no real title available?)2019-03-11Paper
Post-quantum no-key protocol2018-09-27Paper
Non-commutative finite associative algebras of 3-dimensional vectors2018-09-17Paper
Some applications of quasigroups in cryptology
Computer Science Journal of Moldova
2018-07-03Paper
Provably sender-deniable encryption scheme
Computer Science Journal of Moldova
2018-07-03Paper
Stream deniable-encryption algorithms
Computer Science Journal of Moldova
2018-07-03Paper
Non-commutative finite associative algebras of 2-dimensional vectors
Computer Science Journal of Moldova
2018-07-03Paper
Deniable-encryption protocols based on commutative ciphers2017-08-16Paper
Generating cubic equations as a method for public encryption
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2016-11-18Paper
Bi-deniable public-key encryption protocol which is secure against active coercive adversary
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2016-11-10Paper
scientific article; zbMATH DE number 6536413 (Why is no real title available?)2016-01-27Paper
scientific article; zbMATH DE number 6536418 (Why is no real title available?)2016-01-27Paper
Software encryption algorithms for transparent protection technology
Cryptologia
2015-11-13Paper
Flexible block cipher with provably inequivalent cryptalgorithm modifications
Cryptologia
2015-11-13Paper
Cryptoschemes based on difficulty of simultaneous solving two different difficult problems
Computer Science Journal of Moldova
2015-09-10Paper
Practical method for bi-deniable public-key encryption2015-05-21Paper
Short signatures from the difficulty of factoring problem
Buletinul Academiei de Științe a Republicii Moldova. Matematica
2014-10-23Paper
Group signature protocol based on masking public keys2014-07-03Paper
New signature scheme based on difficulty of finding roots2013-04-25Paper
Blind multisignatures based on the standards DSTU 4145-2002 and GOST R 34.10-2001
Dopovidi Natsional'noï Akademiï Nauk Ukraïny. Matematyka, Pryrodoznavstvo, Tekhnichni Nauky
2012-07-16Paper
Blind collective signature protocol
Computer Science Journal of Moldova
2012-01-18Paper
scientific article; zbMATH DE number 5938140 (Why is no real title available?)2011-08-11Paper
scientific article; zbMATH DE number 5785870 (Why is no real title available?)2010-09-14Paper
New primitives for digital signature algorithms2010-06-07Paper
scientific article; zbMATH DE number 5691665 (Why is no real title available?)2010-04-09Paper
Information authentication in automated control systems based on finite groups with multidimensional cyclicity
Automation and Remote Control
2009-11-24Paper
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
2009-05-07Paper
Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces
Automation and Remote Control
2009-02-26Paper
Digital signature scheme based on a new hard problem
Computer Science Journal of Moldova
2008-11-10Paper
An approach to shorten digital signature length
Computer Science Journal of Moldova
2007-06-26Paper
Variable bit permutations: linear characteristics and pure VBP-based cipher
Computer Science Journal of Moldova
2005-11-21Paper
Algorithms for information conversion based on controlled two-place operations
Cybernetics and Systems Analysis
2005-08-12Paper
Controlled operation-based fast methods of data protection in automated control systems
Automation and Remote Control
2005-06-17Paper
Protective data transformations in ACSs on the basis of a new primitive
Automation and Remote Control
2005-06-17Paper
Fast DDP-based ciphers: Design and differential analysis of Cobra-H64
Computer Science Journal of Moldova
2004-10-28Paper
Flexible algorithms for protection of information in automatic control systems
Automation and Remote Control
2004-10-19Paper
Fast data encryption for automatic control systems
Automation and Remote Control
2004-10-13Paper
Fast software-oriented hash function based on data-dependent lookup operations
Computer Science Journal of Moldova
2003-10-29Paper
Fault-based analysis of flexible ciphers
Computer Science Journal of Moldova
2002-09-30Paper
scientific article; zbMATH DE number 1746677 (Why is no real title available?)2002-06-16Paper
A cipher based on data-dependent permutations
Journal of Cryptology
2002-05-21Paper
scientific article; zbMATH DE number 1739896 (Why is no real title available?)2002-05-13Paper
Nondeterministic encryption with provable nonequivalence of all modifications of the cryptographic algorithm
Cybernetics and Systems Analysis
2000-09-26Paper
Software-implementable pseudoprobabilistic fast block ciphers
Cybernetics and Systems Analysis
1999-04-28Paper
Fast software encryption system based on local pseudorandomness
Computer Science Journal of Moldova
1998-10-01Paper
Provably indeterminate 128-bit cipher
Computer Science Journal of Moldova
1998-10-01Paper
Software encryption: New 64-bit block cryptoscheme
Computer Science Journal of Moldova
1998-10-01Paper
scientific article; zbMATH DE number 1198990 (Why is no real title available?)1998-09-14Paper
scientific article; zbMATH DE number 1198991 (Why is no real title available?)1998-09-14Paper
New design principle for cryptographic modules in computer security systems
Cybernetics and Systems Analysis
1995-05-17Paper


Research outcomes over time


This page was built for person: N. A. Moldovyan