Andrey Sidorenko

Learn More
A family of pseudorandom generators based on the decisional Diffie-Hellman assumption is proposed. The new construction is a modified and generalized version of the Dual Elliptic Curve generator proposed by Barker and Kelsey. Although the original Dual Elliptic Curve generator is shown to be insecure, the modified version is provably secure and very(More)
The asymptotic security of the Blum-Blum-Shub (BBS) pseudo-random generator has been studied by Alexi et al. and Vazirani and Vazi-rani, who proved independently that O(log log N) bits can be extracted on each iteration, where N is the modulus (a Blum integer). The concrete security of this generator has been analyzed previously by Fischlin and Schnorr and(More)
This study examines some characteristics of the lymphohaemopoietic system of heterochronically parabiosed CBA mice. It was found that a decline of the primary immune response in a young mouse sutured with an old one is accompanied with the diminution of: bone marrow and thymus cellularity; thymus weight; haemopoietic stem cells (CFC-S) and(More)
We propose a simple and efficient deterministic extractor for an ordinary elliptic curve E, defined over F2n , where n = 2 and is a positive integer. Our extractor, for a given point P on E, outputs the first F 2-coefficient of the abscissa of the point P. We also propose a deterministic extractor for the main subgroup G of E, where E has minimal 2-torsion.(More)
It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks and anomalies in user activity and computer system behavior. The system includes different types of intelligent agents. The most important one is user agent based on neural network model of user behavior. Proposed(More)
Compound [Ni(AEAPTS)2]3[Fe(CN)6]2 (AEAPTS = N-(2-aminoethyl)-3-aminopropyltrimethoxysilane), in which Ni(2+) and Fe(3+) ions are ferromagnetically coupled through cyano bridges, was prepared. Sol-gel processing of the AEAPTS derivative resulted in incorporation of the cyanometallate in silica. The obtained material is magnetically ordered below 22 K with an(More)
In this paper we analyze practical aspects of the differential fault attack on RSA published by Boneh, Demillo and Lipton from Bellcore. We focus on the CRT variant, which requires only one faulty signature to be entirely broken provided that no DFA countermeasures are in use. Usually the easiest approach for the attacker is to introduce a fault in one of(More)