New secure block cipher for critical applications: design, implementation, speed and security analysis

S Gnatyuk, B Akhmetov, V Kozlovskyi… - Advances in artificial …, 2020 - Springer
Most of known methods for confidentiality and privacy ensuring don't provide high-security
level against cyberattacks based on linear and differential cryptanalysis and the required …

Practices of using blockchain technology in ICT under the digitalization of the world economy

N Kraus - Proceedings of the International Workshop on …, 2019 - elibrary.kubg.edu.ua
Pursuing the purpose of effective functioning in today's conditions, the business is forced to
transform rapidly, to modernize at all levels. The world is changing, erasing the limits of its …

Cryptographic key exchange method for data factorial coding

ЕВ Фауре, АІ Щерба, ЄВ Васіліу… - … Workshop on Cyber …, 2020 - er.chdtu.edu.ua
The paper proposes a new cryptographic key exchange method. The basic idea of the
proposed method is to use a permutation of a given set as a transformation object. The …

[PDF][PDF] Statistical Testing of Blockchain Hash Algorithms.

A Kuznetsov, M Lutsenko, K Kuznetsova, O Martyniuk… - CMiGIN, 2019 - osf.io
Various methods are used for statistical testing of cryptographic algorithms, for example,
NIST STS (A Statistical Test Suite for the Validation of Random Number Generators and …

[PDF][PDF] Improved Secure Stream Cipher for Cloud Computing.

S Gnatyuk, M Iavich, V Kinzeryavyy, T Okhrimenko… - ICTERI …, 2020 - ceur-ws.org
Today cloud services have revolutionized the way we store and share different data. At the
same time, most of the data are unsecured and vulnerable to various cyberattacks. In this …

An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT

J Guruprakash, S Koppu - Informatica, 2022 - informatica.si
Digital signatures are a vital part of the digital world. The trust factor in the digital world is
ensured with a digital signature. Over the evolution, the purpose remained constant, but the …

Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems

M Iavich, S Gnatyuk, E Jintcharadze… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
Generally, encryption it's an encoding information process in order to provided security
against unauthorized access. Nowadays, there are different types of cryptographic methods …

[PDF][PDF] Polynomials Multiplier under Irreducible Polynomial Module for High-Performance Cryptographic Hardware Tools.

M Kalimoldayev, S Tynymbayev, M Magzom… - ICTERI …, 2019 - ceur-ws.org
One of the most popular and effective methods of information security is cryptographic, that
can be realized in software as well as in hardware tools. Hardware cryptographic devices …

Improved Post-quantum Merkle Algorithm Based on Threads

M Iavich, S Gnatyuk, A Arakelian, G Iashvili… - Advances in Computer …, 2021 - Springer
Today scientists are actively working on the creation of quantum computers. Quantum
computers will be able to solve the problem of factoring the large numbers. So, quantum …

An Optimized Edward-elgamal Extreme Performance Signature Scheme Oedecas in Iot and Blockchain

R Anusha, R Saravanan - 2023 - researchsquare.com
Digital signatures (DS) are the modern-day guardians of authenticity and security in the
digital realm. Even though the goal has stayed the same, the scope of its suitability and the …