High-speed and secure PRNG for cryptographic applications Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich International Journal of Computer Network and Information Security 12 (3), 1-10, 2020 | 75 | 2020 |
Электронный учебник, его преимущества и недостатки МП Явич Современные научные исследования и инновации, 4-4, 2012 | 40 | 2012 |
Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems E Jintcharadze, M Iavich 2020 IEEE East-West Design & Test Symposium (EWDTS), 1-5, 2020 | 39 | 2020 |
Novel Version of Merkle Cryptosystem A Gagnidze, M Iavich, G Iashvili Bull. Georg. Natl. Acad. Sci 11 (4), 28-33, 2017 | 32 | 2017 |
The novel system of attacks detection in 5G M Iavich, S Gnatyuk, R Odarchenko, R Bocu, S Simonov International Conference on Advanced Information Networking and Applications …, 2021 | 31 | 2021 |
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks. S Gnatyuk, V Kinzeryavyy, M Iavich, D Prysiazhnyi, K Yubuzova Proceedings of the 14th International Conference on ICT in Education …, 2018 | 29 | 2018 |
Lattice based merkle. M Iavich, A Gagnidze, G Iashvili, S Gnatyuk, V Vialkova IVUS, 13-16, 2019 | 28 | 2019 |
Hybrid encryption model of AES and ElGamal cryptosystems for flight control systems M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, R Odarchenko 2018 IEEE 5th International Conference on Methods and Systems of Navigation …, 2018 | 23 | 2018 |
Efficient and secure digital signature scheme for post quantum epoch M Iavich, G Iashvili, S Gnatyuk, A Tolbatov, L Mirtskhulava Information and Software Technologies: 27th International Conference, ICIST …, 2021 | 22 | 2021 |
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits. Z Hu, S Gnatyuk, T Okhrimenko, V Kinzeryavyy, M Iavich, K Yubuzova ICTERI Workshops, 810-821, 2019 | 19 | 2019 |
Analysis of Post-Quantum Cryptography Use in Practice A Gagnidze, M Iavich, G Iashvili Bull. Georg. Natl. Acad. Sci 11 (2), 2017 | 19 | 2017 |
Practices of using blockchain technology in ICT under the digitalization of the world economy N Kraus Proceedings of the International Workshop on Conflict Management in Global …, 2019 | 18 | 2019 |
Cyber security European standards in business M Iavich, S Gnatyuk, G Fesenko Scientific and practical cyber security journal, 2019 | 18 | 2019 |
Some Aspects Of Post-Quantum Cryptosystems A Gagnidze, M Iavich, G Iashvili Eurasian journal of business and management 5 (1), 16-20, 2017 | 17 | 2017 |
Novel certification method for quantum random number generators M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko International Journal of Computer Network and Information Security 13 (3), 28-38, 2021 | 15 | 2021 |
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ... 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019 | 15 | 2019 |
Securing medical data in 5G and 6G via multichain blockchain technology using post-quantum signatures L Mirtskhulava, M Iavich, M Razmadze, N Gulua 2021 IEEE International Conference on Information and Telecommunication …, 2021 | 14 | 2021 |
Intruder control mode simulation of deterministic quantum cryptography protocol for depolarized quantum channel S Gnatyuk, T Okhrimenko, M Iavich, R Berdibayev 2019 IEEE International Scientific-Practical Conference Problems of …, 2019 | 14 | 2019 |
Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. У 2020 IEEE East-West Design & Test Symposium (EWDTS) E Jintcharadze, M Iavich IEEE. https://doi. org/10.1109/ewdts50664, 2020 | 13 | 2020 |
Combined system of phase synchronization with increased astatism order in frequency monitoring mode O Turovsky, Y Khlaponin, MMA Hassan, T Okhrimenko, I Goncharenko, ... CEUR Workshop Proceedings, 53-62, 2020 | 13 | 2020 |