This work proposes a new method of malware classification based on behavior features. We developed a proximity measure for programs, which takes into account WinAPI calls, their arguments, and filesâ€¦ (More)

Increased excitability of the central nervous system generated by repetitive and sustained pericranial myofascial nociception may be responsible for transformation of episodic tension-type headacheâ€¦ (More)

This paper is devoted to the investigation of GOST algorithm with regard to its resistance against algebraic cryptanalysis. GOST algorithm is a state standard of Russian Federation. Itsâ€¦ (More)

The present study considers the improvement of existing cryptanalytical methods in relation to Russian standard of GOST 28147-89 symmetric encryption. This paper researches encryption transformationsâ€¦ (More)

This work is devoted to development of a formal mandatory access model, which takes into account the structure and the features of current database management systems (DBMS). We introduce theâ€¦ (More)

In this article we explore the resistance of the GOST 28147-89 algorithm (commonly referred to as GOST) to the attack based on differential cryptanalysis. GOST algorithm is used as a nationalâ€¦ (More)

This work is devoted to finding the influence of S-Boxes to resistance of GOST 28147-89 algorithm (GOST) against linear cryptanalysis. The universal algorithm for searching particular layouts ofâ€¦ (More)

Modern smart card is a multi-purpose tool that is used in many areas of science and technology [5]. Microprocessor cards are used for access control, e-commerce, identification and authentication,â€¦ (More)

In this paper we present results of algebraic analysis of GOST⌖ algorithm in SageMath environment. Using the GOST⌖ as the example we explore basic stages of algebraic analysis of anyâ€¦ (More)

The talk is devoted to the issues of computational complexity check of various attacks on GOST 28147-89 cryptographic algorithm (commonly known as GOST). The primitives that comprise differentâ€¦ (More)