|
|
Publications in Math-Net.Ru
-
Computational work for some $TU$-based permutations
Prikl. Diskr. Mat., 2025, no. 68, 29–55
-
Probability space for the NCPA attack
Prikl. Diskr. Mat. Suppl., 2025, no. 18, 173–178
-
Investigation of linear correlation value distribution for random functions
Prikl. Diskr. Mat. Suppl., 2025, no. 18, 69–74
-
On differential uniformity of permutations derived using a generalized construction
Mat. Vopr. Kriptogr., 13:2 (2022), 37–52
-
Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction
Prikl. Diskr. Mat., 2022, no. 57, 5–21
-
A compact bit-sliced representation of Kuznyechik S-box
Mat. Vopr. Kriptogr., 12:2 (2021), 21–38
-
Invariant subspaces in SPN block cipher
Prikl. Diskr. Mat., 2021, no. 54, 58–76
-
On a heuristic approach to constructing bijective vector Boolean functions with given cryptographic properties
Prikl. Diskr. Mat. Suppl., 2021, no. 14, 181–184
-
On the way of constructing differentially $2\delta$-uniform permutations over $\mathbb{F}_{2^{2m}}$
Prikl. Diskr. Mat. Suppl., 2021, no. 14, 51–55
-
On the algebraic degree and differential uniformity of permutations on the space $V_{2m}$ constructed via $(2m,m)$-functions
Mat. Vopr. Kriptogr., 11:4 (2020), 133–149
-
Construction of permutations on the space $V_{2m}$ by means of $(2m,m)$-functions
Mat. Vopr. Kriptogr., 11:3 (2020), 121–138
-
New classes of $8$-bit permutations based on a butterfly structure
Mat. Vopr. Kriptogr., 10:2 (2019), 169–180
-
Hardware implementation of one class of 8-bit permutations
Prikl. Diskr. Mat. Suppl., 2019, no. 12, 134–137
-
A timing attack on CUDA implementations of an AES-type block cipher
Mat. Vopr. Kriptogr., 7:2 (2016), 121–130
-
Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA
Mat. Vopr. Kriptogr., 6:2 (2015), 99–108
© , 2026