Nikolay A. Moldovyan

From MaRDI portal
Person:656566

Available identifiers

zbMath Open moldovyan.nikolai-andreevichMaRDI QIDQ656566

List of research outcomes

PublicationDate of PublicationType
Split logarithm problem and a candidate for a post-quantum signature scheme2023-09-06Paper
https://portal.mardi4nfdi.de/entity/Q50584262022-12-20Paper
https://portal.mardi4nfdi.de/entity/Q50915562022-07-26Paper
A novel version of the hidden logarithm problem for post-quantum signature algorithms2022-05-23Paper
Digital signature scheme set in a hidden cyclic group2021-09-20Paper
https://portal.mardi4nfdi.de/entity/Q50047652021-08-03Paper
https://portal.mardi4nfdi.de/entity/Q51511722021-02-16Paper
Commutative Encryption Method Based on Hidden Logarithm Problem2021-01-12Paper
Digital signature scheme with doubled verification equation2020-11-02Paper
Post-quantum signature algorithms based on the hidden discrete logarithm problem2020-11-02Paper
Post-quantum commutative encryption algorithm2020-11-02Paper
https://portal.mardi4nfdi.de/entity/Q49714632020-10-12Paper
No-Key Protocol for Deniable Encryption2020-08-20Paper
Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering2020-08-20Paper
https://portal.mardi4nfdi.de/entity/Q52039972019-12-09Paper
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem2019-06-07Paper
https://portal.mardi4nfdi.de/entity/Q31192652019-03-11Paper
https://portal.mardi4nfdi.de/entity/Q46840982018-09-27Paper
https://portal.mardi4nfdi.de/entity/Q53761052018-09-17Paper
Provably sender-deniable encryption scheme2018-07-03Paper
Some applications of quasigroups in cryptology2018-07-03Paper
Stream deniable-encryption algorithms2018-07-03Paper
Non-commutative finite associative algebras of 2-dimensional vectors2018-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49774632017-08-16Paper
https://portal.mardi4nfdi.de/entity/Q28334332016-11-18Paper
https://portal.mardi4nfdi.de/entity/Q28314192016-11-10Paper
https://portal.mardi4nfdi.de/entity/Q34647822016-01-27Paper
https://portal.mardi4nfdi.de/entity/Q34647872016-01-27Paper
SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY2015-11-13Paper
FLEXIBLE BLOCK CIPHER WITH PROVABLY INEQUIVALENT CRYPTALGORITHM MODIFICATIONS2015-11-13Paper
Cryptoschemes based on difficulty of simultaneous solving two different difficult problems2015-09-10Paper
https://portal.mardi4nfdi.de/entity/Q52505752015-05-21Paper
https://portal.mardi4nfdi.de/entity/Q29262932014-10-23Paper
https://portal.mardi4nfdi.de/entity/Q51681272014-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49168062013-04-25Paper
https://portal.mardi4nfdi.de/entity/Q28965782012-07-16Paper
Blind collective signature protocol2012-01-18Paper
https://portal.mardi4nfdi.de/entity/Q51991292011-08-11Paper
https://portal.mardi4nfdi.de/entity/Q57481712010-09-14Paper
https://portal.mardi4nfdi.de/entity/Q35656532010-06-07Paper
https://portal.mardi4nfdi.de/entity/Q53066352010-04-09Paper
Information authentication in automated control systems based on finite groups with multidimensional cyclicity2009-11-24Paper
New algorithms and protocols for information authentication in automatic control systems2009-05-07Paper
Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces2009-02-26Paper
Digital signature scheme based on a new hard problem2008-11-10Paper
An approach to shorten digital signature length2007-06-26Paper
Variable bit permutations: linear characteristics and pure VBP-based cipher2005-11-21Paper
Algorithms for information conversion based on controlled two-place operations2005-08-12Paper
Controlled operation-based fast methods of data protection in automated control systems2005-06-17Paper
Protective data transformations in ACSs on the basis of a new primitive2005-06-17Paper
Fast DDP-based ciphers: Design and differential analysis of Cobra-H642004-10-28Paper
Flexible algorithms for protection of information in automatic control systems2004-10-19Paper
Fast data encryption for automatic control systems2004-10-13Paper
Fast software-oriented hash function based on data-dependent lookup operations2003-10-29Paper
Fault-based analysis of flexible ciphers2002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q45308512002-06-16Paper
A cipher based on data-dependent permutations2002-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43305622002-05-13Paper
Nondeterministic encryption with provable nonequivalence of all modifications of the cryptographic algorithm2000-09-26Paper
Software-implementable pseudoprobabilistic fast block ciphers1999-04-28Paper
Fast software encryption system based on local pseudorandomness1998-10-01Paper
Provably indeterminate 128-bit cipher1998-10-01Paper
Software encryption: New 64-bit block cryptoscheme1998-10-01Paper
https://portal.mardi4nfdi.de/entity/Q42111931998-09-14Paper
https://portal.mardi4nfdi.de/entity/Q42111951998-09-14Paper
New design principle for cryptographic modules in computer security systems1995-05-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Nikolay A. Moldovyan