RUS  ENG
Full version
PEOPLE

Bezzateev Sergei Valentinovich

Publications in Math-Net.Ru

  1. Comprehensive integration of security practices into the software development lifecycle

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2025, no. 3,  123–132
  2. Application of artificial intelligence for assessing the effectiveness of secure software development processes

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2025, no. 1,  39–52
  3. Post-quantum trapdoor commitment scheme

    Prikl. Diskr. Mat. Suppl., 2025, no. 18,  226–229
  4. Generalized $(L,G)$-codes in weighted Haming metric for information security

    Prikl. Diskr. Mat. Suppl., 2024, no. 17,  140–143
  5. On the utilization of D2D technology in cellular networks

    St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 12:3 (2019),  58–66
  6. Number theory and applications in cryptography

    Chebyshevskii Sb., 19:3 (2018),  61–73
  7. Authenticating electronic devices for temporary use: access rights management protocol

    St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 10:4 (2017),  29–40
  8. Private information retrieval protocol

    Mat. Vopr. Kriptogr., 6:4 (2015),  5–21
  9. A new subclass of cyclic Goppa codes

    Probl. Peredachi Inf., 49:4 (2013),  57–63
  10. Binary generalized $(L,G)$ codes that are perfect in a weighted Hamming metric

    Probl. Peredachi Inf., 48:3 (2012),  47–51
  11. Special classes of separable Goppa codes with improved parameter estimates

    Probl. Peredachi Inf., 46:3 (2010),  29–50
  12. A Subclass of Binary Goppa Codes

    Probl. Peredachi Inf., 25:3 (1989),  98–102
  13. On the Designed Distance of the Best Known (55,16,19) Goppa Code

    Probl. Peredachi Inf., 23:4 (1987),  119
  14. Decoding Algorithm for the Golay (24,12,8) Code

    Probl. Peredachi Inf., 22:3 (1986),  109–112


© Steklov Math. Inst. of RAS, 2026