|
|
Publications in Math-Net.Ru
-
On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threat
Mat. Vopr. Kriptogr., 14:3 (2023), 49–73
-
Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode
Mat. Vopr. Kriptogr., 10:2 (2019), 47–60
-
On cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systems
Mat. Vopr. Kriptogr., 9:2 (2018), 23–46
-
On probability characteristics of random graphs generated by algorithms for finding hash function collisions
Prikl. Diskr. Mat. Suppl., 2013, no. 6, 33–35
-
Estimates of collision resistance complexity for the hash function RIPEMD
Prikl. Diskr. Mat. Suppl., 2012, no. 5, 43–44
-
On the McEliece public-key cryptosystem based on Reed-Muller binary codes
Diskr. Mat., 16:2 (2004), 79–84
-
Minimal Networks on the Regular $n$-Dimensional Simplex
Mat. Zametki, 69:6 (2001), 854–865
-
Universal boundary sets in the generalized Steiner problem
Zap. Nauchn. Sem. POMI, 279 (2001), 168–182
-
Crossed homomorphisms of finite algebras with a scheme of binary operators
Diskr. Mat., 12:2 (2000), 66–84
-
An analogue of Morse theory for planar linear networks and the generalized Steiner problem
Mat. Sb., 191:2 (2000), 64–90
© , 2026