### Article

## Об одной схеме гибридного шифрования

A new hybrid encryption scheme based on ElGamal asymmetric encryption scheme with distributed secret keys is presented. The keys are used for defence against unauthorised intrusion of encrypted messages. The security of the scheme is based on elliptic curve discrete logarithm problem. The main feature of the scheme is the fact that plain message is not represented as a point of elliptic curve, hence, we can encrypt a long messages. We validate the cryptographic properties of the scheme and give some examples of its practical evaluations.

We present a new variant of Diffie-Hellman protocol, which is realized in a group of points of elliptic curve over finite field and contains a possibility of key confirmation. An important feature of this protocol is mutual authentication of protocol entities. We make some security demands to the protocol such as key security, long-term keys security, known key security, forward secrecy, key compromise impersonation, unknown key sharing and no key control. We show that our protocol are meets our expectations.

Trigonometric degeneration of the Baxter-Belavin elliptic r matrix is described by the degeneration of the twisted WZW model on elliptic curves. The spaces of conformal blocks and conformal coinvariants of the degenerate model are factorised into those of the orbifold WZW model.

In this work we present two new protocols for secure management of remote objects. These protocols are released in group of points of elliptic curve, defined over finite field, with usage of russian cryptography standards.

This book constitutes the refereed post-conference proceedings of the 29th International Workshop on Combinatorial Algorithms, IWOCA 2018, held in Singapore, Singapore, in July 2018. The 31 regular papers presented in this volume were carefully reviewed and selected from 69 submissions. They cover diverse areas of combinatorical algorithms, complexity theory, graph theory and combinatorics, combinatorial optimization, cryptography and information security, algorithms on strings and graphs, graph drawing and labelling, computational algebra and geometry, computational biology, probabilistic and randomised algorithms, algorithms for big data analytics, and new paradigms of computation.

The paper provides an overview and analysis of existing authentication methods in wireless body area networks (WBAN). The novel Bodycom technology is presented. We give a detailed comparative analysis showing advantages and disadvantages of each approach and propose the most appropriate authentication technology.

This proceedings publication is a compilation of selected contributions from the “Third International Conference on the Dynamics of Information Systems” which took place at the University of Florida, Gainesville, February 16–18, 2011. The purpose of this conference was to bring together scientists and engineers from industry, government, and academia in order to exchange new discoveries and results in a broad range of topics relevant to the theory and practice of dynamics of information systems. Dynamics of Information Systems: Mathematical Foundation presents state-of-the art research and is intended for graduate students and researchers interested in some of the most recent discoveries in information theory and dynamical systems. Scientists in other disciplines may also benefit from the applications of new developments to their own area of study.