#### Filter Results:

- Full text PDF available (19)

#### Publication Year

1994

2017

- This year (3)
- Last 5 years (14)
- Last 10 years (26)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Alexander A. Moldovyan, Nikolay A. Moldovyan
- Journal of Cryptology
- 2001

Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers. Some variants of the DDP operations and their application in the cipher CIKS-1 are considered. A feature of CIKS-1 is the use of both the data-dependent transformation of round subkeys and the key-dependent DDP operations.

- Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos
- I. J. Network Security
- 2006

This work focuses the problem of increasing the integral implementation efficacy of block ciphers. It proposes a new approach to the cipher design, suitable to applications, where constrained resources are available to embedded security mechanisms, such as ad-hoc, sensor and wireless networks. The paper develops the cipher design approach based on the use… (More)

- Nikolay A. Moldovyan
- I. J. Network Security
- 2003

This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the design of fast ciphers suitable to applications in constrained environments. The SDDOs are performed with the controlled substitution-permutation networks that transforms binary… (More)

- Nikolay A. Moldovyan
- The Computer Science Journal of Moldova
- 2011

Using the digital signature (DS) scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS… (More)

- Nikolay A. Moldovyan
- I. J. Network Security
- 2009

Special form of finite fields (FFs), called vector FFs (VFFs), is defined in the vector spaces over the ground finite field GF (p) using particular types of the multiplication operation over vectors. Implementation of the cryptographic algorisms based on elliptic curves (ECs) over VFFs provides significantly higher performance than the implementation of the… (More)

- Nick D. Goots, Alexander A. Moldovyan, Nikolay A. Moldovyan
- MMM-ACNS
- 2001

- Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville
- I. J. Network Security
- 2007

Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed with so called controlled permutation boxes (CPB) which are fast while implemented in cheap hardware. The latter defines the efficiency of the embedding of CPB in microcontrollers… (More)

- Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nikolay A. Moldovyan
- MMM-ACNS
- 2003

- Nikolay A. Moldovyan
- I. J. Network Security
- 2011

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards. The last protocols are also the first implementation of the blind… (More)