N. A. Moldovyan

From MaRDI portal
Person:656566

Available identifiers

zbMath Open moldovyan.nikolai-andreevichMaRDI QIDQ656566

List of research outcomes





PublicationDate of PublicationType
Finite algebras in the design of multivariate cryptography algorithms2024-10-08Paper
Vector finite fields of characteristic two as algebraic support of multivariate cryptography2024-05-29Paper
Split logarithm problem and a candidate for a post-quantum signature scheme2023-09-06Paper
https://portal.mardi4nfdi.de/entity/Q50584262022-12-20Paper
https://portal.mardi4nfdi.de/entity/Q50915562022-07-26Paper
A novel version of the hidden logarithm problem for post-quantum signature algorithms2022-05-23Paper
Digital signature scheme set in a hidden cyclic group2021-09-20Paper
https://portal.mardi4nfdi.de/entity/Q50047652021-08-03Paper
https://portal.mardi4nfdi.de/entity/Q51511722021-02-16Paper
Commutative Encryption Method Based on Hidden Logarithm Problem2021-01-12Paper
Post-quantum signature algorithms based on the hidden discrete logarithm problem2020-11-02Paper
Post-quantum commutative encryption algorithm2020-11-02Paper
Digital signature scheme with doubled verification equation2020-11-02Paper
https://portal.mardi4nfdi.de/entity/Q49714632020-10-12Paper
Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering2020-08-20Paper
No-Key Protocol for Deniable Encryption2020-08-20Paper
https://portal.mardi4nfdi.de/entity/Q52039972019-12-09Paper
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem2019-06-07Paper
https://portal.mardi4nfdi.de/entity/Q31192652019-03-11Paper
https://portal.mardi4nfdi.de/entity/Q46840982018-09-27Paper
https://portal.mardi4nfdi.de/entity/Q53761052018-09-17Paper
Some applications of quasigroups in cryptology2018-07-03Paper
Provably sender-deniable encryption scheme2018-07-03Paper
Stream deniable-encryption algorithms2018-07-03Paper
Non-commutative finite associative algebras of 2-dimensional vectors2018-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49774632017-08-16Paper
Generating cubic equations as a method for public encryption2016-11-18Paper
Bi-deniable public-key encryption protocol which is secure against active coercive adversary2016-11-10Paper
https://portal.mardi4nfdi.de/entity/Q34647822016-01-27Paper
https://portal.mardi4nfdi.de/entity/Q34647872016-01-27Paper
SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY2015-11-13Paper
FLEXIBLE BLOCK CIPHER WITH PROVABLY INEQUIVALENT CRYPTALGORITHM MODIFICATIONS2015-11-13Paper
Cryptoschemes based on difficulty of simultaneous solving two different difficult problems2015-09-10Paper
https://portal.mardi4nfdi.de/entity/Q52505752015-05-21Paper
Short signatures from the difficulty of factoring problem2014-10-23Paper
https://portal.mardi4nfdi.de/entity/Q51681272014-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49168062013-04-25Paper
Blind multisignatures based on the standards DSTU 4145-2002 and GOST R 34.10-20012012-07-16Paper
Blind collective signature protocol2012-01-18Paper
https://portal.mardi4nfdi.de/entity/Q51991292011-08-11Paper
https://portal.mardi4nfdi.de/entity/Q57481712010-09-14Paper
New primitives for digital signature algorithms2010-06-07Paper
https://portal.mardi4nfdi.de/entity/Q53066352010-04-09Paper
Information authentication in automated control systems based on finite groups with multidimensional cyclicity2009-11-24Paper
New algorithms and protocols for information authentication in automatic control systems2009-05-07Paper
Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces2009-02-26Paper
Digital signature scheme based on a new hard problem2008-11-10Paper
An approach to shorten digital signature length2007-06-26Paper
Variable bit permutations: linear characteristics and pure VBP-based cipher2005-11-21Paper
Algorithms for information conversion based on controlled two-place operations2005-08-12Paper
Controlled operation-based fast methods of data protection in automated control systems2005-06-17Paper
Protective data transformations in ACSs on the basis of a new primitive2005-06-17Paper
Fast DDP-based ciphers: Design and differential analysis of Cobra-H642004-10-28Paper
Flexible algorithms for protection of information in automatic control systems2004-10-19Paper
Fast data encryption for automatic control systems2004-10-13Paper
Fast software-oriented hash function based on data-dependent lookup operations2003-10-29Paper
Fault-based analysis of flexible ciphers2002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q45308512002-06-16Paper
A cipher based on data-dependent permutations2002-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43305622002-05-13Paper
Nondeterministic encryption with provable nonequivalence of all modifications of the cryptographic algorithm2000-09-26Paper
Software-implementable pseudoprobabilistic fast block ciphers1999-04-28Paper
Fast software encryption system based on local pseudorandomness1998-10-01Paper
Provably indeterminate 128-bit cipher1998-10-01Paper
Software encryption: New 64-bit block cryptoscheme1998-10-01Paper
https://portal.mardi4nfdi.de/entity/Q42111931998-09-14Paper
https://portal.mardi4nfdi.de/entity/Q42111951998-09-14Paper
New design principle for cryptographic modules in computer security systems1995-05-17Paper

Research outcomes over time

This page was built for person: N. A. Moldovyan