| Publication | Date of Publication | Type |
|---|
Finite algebras in the design of multivariate cryptography algorithms Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2024-10-08 | Paper |
Vector finite fields of characteristic two as algebraic support of multivariate cryptography Computer Science Journal of Moldova | 2024-05-29 | Paper |
Split logarithm problem and a candidate for a post-quantum signature scheme Computer Science Journal of Moldova | 2023-09-06 | Paper |
| scientific article; zbMATH DE number 7634958 (Why is no real title available?) | 2022-12-20 | Paper |
| scientific article; zbMATH DE number 7564210 (Why is no real title available?) | 2022-07-26 | Paper |
A novel version of the hidden logarithm problem for post-quantum signature algorithms Theoretical Computer Science | 2022-05-23 | Paper |
Digital signature scheme set in a hidden cyclic group Computer Science Journal of Moldova | 2021-09-20 | Paper |
| A new design of the signature schemes based on the hidden discrete logarithm problem | 2021-08-03 | Paper |
| An enhanced version of the hidden discrete logarithm problem and its algebraic support | 2021-02-16 | Paper |
Commutative encryption method based on hidden logarithm problem Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" | 2021-01-12 | Paper |
Post-quantum signature algorithms based on the hidden discrete logarithm problem Computer Science Journal of Moldova | 2020-11-02 | Paper |
Post-quantum commutative encryption algorithm Computer Science Journal of Moldova | 2020-11-02 | Paper |
Digital signature scheme with doubled verification equation Computer Science Journal of Moldova | 2020-11-02 | Paper |
| scientific article; zbMATH DE number 7259165 (Why is no real title available?) | 2020-10-12 | Paper |
Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering Advances in Intelligent Systems and Computing | 2020-08-20 | Paper |
No-key protocol for deniable encryption Advances in Intelligent Systems and Computing | 2020-08-20 | Paper |
| Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base | 2019-12-09 | Paper |
Finite non-commutative associative algebras as carriers of hidden discrete logarithm problem Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" | 2019-06-07 | Paper |
| scientific article; zbMATH DE number 7034347 (Why is no real title available?) | 2019-03-11 | Paper |
| Post-quantum no-key protocol | 2018-09-27 | Paper |
| Non-commutative finite associative algebras of 3-dimensional vectors | 2018-09-17 | Paper |
Some applications of quasigroups in cryptology Computer Science Journal of Moldova | 2018-07-03 | Paper |
Provably sender-deniable encryption scheme Computer Science Journal of Moldova | 2018-07-03 | Paper |
Stream deniable-encryption algorithms Computer Science Journal of Moldova | 2018-07-03 | Paper |
Non-commutative finite associative algebras of 2-dimensional vectors Computer Science Journal of Moldova | 2018-07-03 | Paper |
| Deniable-encryption protocols based on commutative ciphers | 2017-08-16 | Paper |
Generating cubic equations as a method for public encryption Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2016-11-18 | Paper |
Bi-deniable public-key encryption protocol which is secure against active coercive adversary Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2016-11-10 | Paper |
| scientific article; zbMATH DE number 6536413 (Why is no real title available?) | 2016-01-27 | Paper |
| scientific article; zbMATH DE number 6536418 (Why is no real title available?) | 2016-01-27 | Paper |
Software encryption algorithms for transparent protection technology Cryptologia | 2015-11-13 | Paper |
Flexible block cipher with provably inequivalent cryptalgorithm modifications Cryptologia | 2015-11-13 | Paper |
Cryptoschemes based on difficulty of simultaneous solving two different difficult problems Computer Science Journal of Moldova | 2015-09-10 | Paper |
| Practical method for bi-deniable public-key encryption | 2015-05-21 | Paper |
Short signatures from the difficulty of factoring problem Buletinul Academiei de Științe a Republicii Moldova. Matematica | 2014-10-23 | Paper |
| Group signature protocol based on masking public keys | 2014-07-03 | Paper |
| New signature scheme based on difficulty of finding roots | 2013-04-25 | Paper |
Blind multisignatures based on the standards DSTU 4145-2002 and GOST R 34.10-2001 Dopovidi Natsional'noï Akademiï Nauk Ukraïny. Matematyka, Pryrodoznavstvo, Tekhnichni Nauky | 2012-07-16 | Paper |
Blind collective signature protocol Computer Science Journal of Moldova | 2012-01-18 | Paper |
| scientific article; zbMATH DE number 5938140 (Why is no real title available?) | 2011-08-11 | Paper |
| scientific article; zbMATH DE number 5785870 (Why is no real title available?) | 2010-09-14 | Paper |
| New primitives for digital signature algorithms | 2010-06-07 | Paper |
| scientific article; zbMATH DE number 5691665 (Why is no real title available?) | 2010-04-09 | Paper |
Information authentication in automated control systems based on finite groups with multidimensional cyclicity Automation and Remote Control | 2009-11-24 | Paper |
New algorithms and protocols for information authentication in automatic control systems Automation and Remote Control | 2009-05-07 | Paper |
Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces Automation and Remote Control | 2009-02-26 | Paper |
Digital signature scheme based on a new hard problem Computer Science Journal of Moldova | 2008-11-10 | Paper |
An approach to shorten digital signature length Computer Science Journal of Moldova | 2007-06-26 | Paper |
Variable bit permutations: linear characteristics and pure VBP-based cipher Computer Science Journal of Moldova | 2005-11-21 | Paper |
Algorithms for information conversion based on controlled two-place operations Cybernetics and Systems Analysis | 2005-08-12 | Paper |
Controlled operation-based fast methods of data protection in automated control systems Automation and Remote Control | 2005-06-17 | Paper |
Protective data transformations in ACSs on the basis of a new primitive Automation and Remote Control | 2005-06-17 | Paper |
Fast DDP-based ciphers: Design and differential analysis of Cobra-H64 Computer Science Journal of Moldova | 2004-10-28 | Paper |
Flexible algorithms for protection of information in automatic control systems Automation and Remote Control | 2004-10-19 | Paper |
Fast data encryption for automatic control systems Automation and Remote Control | 2004-10-13 | Paper |
Fast software-oriented hash function based on data-dependent lookup operations Computer Science Journal of Moldova | 2003-10-29 | Paper |
Fault-based analysis of flexible ciphers Computer Science Journal of Moldova | 2002-09-30 | Paper |
| scientific article; zbMATH DE number 1746677 (Why is no real title available?) | 2002-06-16 | Paper |
A cipher based on data-dependent permutations Journal of Cryptology | 2002-05-21 | Paper |
| scientific article; zbMATH DE number 1739896 (Why is no real title available?) | 2002-05-13 | Paper |
Nondeterministic encryption with provable nonequivalence of all modifications of the cryptographic algorithm Cybernetics and Systems Analysis | 2000-09-26 | Paper |
Software-implementable pseudoprobabilistic fast block ciphers Cybernetics and Systems Analysis | 1999-04-28 | Paper |
Fast software encryption system based on local pseudorandomness Computer Science Journal of Moldova | 1998-10-01 | Paper |
Provably indeterminate 128-bit cipher Computer Science Journal of Moldova | 1998-10-01 | Paper |
Software encryption: New 64-bit block cryptoscheme Computer Science Journal of Moldova | 1998-10-01 | Paper |
| scientific article; zbMATH DE number 1198990 (Why is no real title available?) | 1998-09-14 | Paper |
| scientific article; zbMATH DE number 1198991 (Why is no real title available?) | 1998-09-14 | Paper |
New design principle for cryptographic modules in computer security systems Cybernetics and Systems Analysis | 1995-05-17 | Paper |