|
|
Publications in Math-Net.Ru
-
Block running key cryptosystem with authentication
Mat. Vopr. Kriptogr., 13:4 (2022), 5–35
-
Authentication encryption cryptosystem with derived one-time keys
Prikl. Diskr. Mat., 2020, no. 50, 51–61
-
Letter to the editors
Prikl. Diskr. Mat., 2019, no. 46, 122
-
Authentication encryption based on authentication code with secrecy
Prikl. Diskr. Mat., 2019, no. 43, 60–69
-
Authentication codes with secrecy (survey)
Mat. Vopr. Kriptogr., 8:3 (2017), 5–40
-
The solution of some classes of matrix games
Prikl. Diskr. Mat., 2016, no. 4(34), 17–37
-
On the concept of a $\varepsilon$-perfect cipher
Prikl. Diskr. Mat., 2016, no. 3(33), 45–52
-
On the security of AEAD-cryptosystem of the GCM type
Prikl. Diskr. Mat., 2016, no. 2(32), 49–62
-
Circular inversions of permutations and their use in sorting problems
Prikl. Diskr. Mat., 2016, no. 1(31), 13–31
-
About some classes of extremal oriented graphs
Prikl. Diskr. Mat., 2015, no. 4(30), 83–90
-
Authentication code with secrecy based on projective geometry
Prikl. Diskr. Mat., 2013, no. 2(20), 39–49
-
Almost perfect ciphers and authentication codes
Prikl. Diskr. Mat., 2011, no. 4(14), 28–33
-
On the choice of the defence strategy for an authentication code with two-state source
Diskr. Mat., 21:4 (2009), 135–147
-
On the game-theoretical approach to the analysis of authentication codes
Diskr. Mat., 21:3 (2009), 45–72
-
On the representation of substitutions as products of a transposition and a full cycle
Fundam. Prikl. Mat., 15:1 (2009), 31–51
-
On the diameter of the group $S_N$ with respect to a system of generators consisting of a complete cycle and a transposition
Tr. Diskr. Mat., 2 (1998), 112–150
© , 2026