• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 30
Sort:
by name
by year
Article
Семенов А. М. Математические вопросы криптографии. 2017. Vol. 8. No. 2. P. 131-142.

We study several Russian key-agreement cryptographic protocols for compliance with specified security properties in view of possible adoption of these protocols as standardized solutions intended to be used in the Russian Federation. We have used a number of automatic cryptographic protocol verification tools available in the Internet such as Proverif, AVISPA-SPAN and Scyther, to simulate examined protocols. We find a number of vulnerabilities and propose ways to fix them.

Added: Nov 28, 2017
Article
A. Yu. Nesterenko. Математические вопросы криптографии. 2017. Vol. 8. No. 2. P. 117-130.

In this article we present a new authenticated encryption mode for arbitrary block cipher. This mode is a combination of well known XEX (XorEncryption-Xor) mechanism used in XTS encryption mode and universal hash function with predetermined properties from special class of functions. The bit length of authentication code being twice as much as the length of a cipher block is an important feature of our mode. The other important feature is the possibility of parallel implementation. The description, some security considerations and aspects of practical implementation are supplied. 

Added: Jan 20, 2018
Article
Fomin D. Математические вопросы криптографии. 2016. Vol. 7. No. 2. P. 121-130.

A timing attack against an AES-type block cipher CUDA implementa- tion is presented. Our experiments show that it is possible to extract a secret AES 128-bit key with complexity of 2^32 chosen plaintext encryptions. This approach may be applied to AES with other key sizes and, moreover, to any block cipher with a linear transform that is a composition of two types of linear transformations on a substate.

Added: May 4, 2019
Article
Lebedev P. A. Математические вопросы криптографии. 2013. Vol. 4. No. 2. P. 73-80.

We present optimization guidelines and implementations of cryptographic hash functions GOST R 34.11-94 and GOST R 34.11-2012. Results for x86_64 CPUs and NVIDIA CUDA-capable GPUs are provided for our and several other well-known implementations. It is shown that the new standard may be twice as fast as the old one on modern CPUs, but it may be slower on embedded devices and GPUs. The results given for our implementation are the fastest among all the tested implementations on both platforms.

Added: Apr 1, 2013
Article
Nesterenko A. Математические вопросы криптографии. 2019. Vol. 10. No. 2. P. 135-144.

An algorithm for the construction of elliptic curves satisfying special requirements is presented. The choice of requirements aims to prevent known attacks on the elliptic curve discrete logarithm problem in special cases. The results of practical experiments are discussed, some parameters of concrete elliptic curves are given.

Added: Aug 26, 2019
Article
Nesterenko A. Математические вопросы криптографии. 2014. Vol. 5. No. 2. P. 99-102.

In this article we present an algorithm for constructing an elliptic curve endomorphism for given complex irrationality. This endomorphism can be used for speeding up a group operation on elliptic curve.

Added: Feb 2, 2015
Article
Mironkin V., Bogdanov D. S. Математические вопросы криптографии. 2019. Vol. 10. No. 2. P. 61-74.

The project of the standard of neural network biometric containers protection using cryptographic algorithms is analysed. The inconsistency of the suggested combination of password and neural network biometric information protection systems is shown.

Added: Jul 30, 2019
Article
Dygin D., Grebnev S.V. Математические вопросы криптографии. 2013. Vol. 4. No. 2. P. 47-57.

We present an approach to build an efficient implementation of the Russian national digital signature scheme GOST R 34.10 in view of the recently proposed extensions to the standard. We describe practical issues arising with the usage of modern algorithms for scalar multiplication together with various alternative representations of elliptic curves over prime finite fields under restrictions imposed by the standard. Finally, we present results of numerical experiments and propose recommendations on selection of parameters of described algorithms.

Added: Dec 16, 2014
Article
Fomin D. Математические вопросы криптографии. 2015. Vol. 6. No. 2. P. 99-108.

In this article we consider NVIDIA GPU implementation aspects of an XSL block cipher over the finite field with MDS-matrix linear transformation. We compare obtained results with some other block ciphers.

Added: May 4, 2019
Article
Fomin D. Математические вопросы криптографии. 2019. Vol. 10. No. 2. P. 169-180.

This work introduces new classes of 8-bit permutation based on a butterfly structure. These classes set up a new way for generating 2n-bit permutation from n-bit ones. We introduce some classes that contain permutations with good cryptographic properties and could be efficiently implemented for hardware and software applications.

Added: May 4, 2019
Article
Федоров С. Н. Математические вопросы криптографии. 2019. Vol. 10. No. 2. P. 159-168.
Added: Sep 4, 2019
Article
Grebnev S. Математические вопросы криптографии. 2016. Vol. 7. No. 2. P. 53-60.
Added: Oct 17, 2016
Article
Nesterenko A. Математические вопросы криптографии. 2016. Vol. 7. No. 2. P. 115-120.

We propose an algorithm for solving the discrete logarithm problem on the elliptic curve. This algorithm uses additional information on the multiplicative order of the solution and may be realised in parallel.

Added: Nov 16, 2016
Article
Lozhkin S. A., Shupletsov M. S., Danilov B.R. Математические вопросы криптографии. 2017. Vol. 8. No. 2. P. 87-96.

We propose several asymptotically size-optimal Boolean circuits synthesis methods that implement arbitrary Boolean functions of a given number of Boolean variables with a given protection level from functionality inference when concealing some number of local interconnections. These methods rely on the structure of Boolean circuits over arbitrary finite complete basis. Constructed by methods of generalized decomposition and universal systems of Boolean functions.

Added: Dec 1, 2019
Article
Иванов А. В. Математические вопросы криптографии. 2015. Т. 6. № 3. С. 89-116.
We construct asymptotically optimal criteria for testing two simple hypotheses on the scalar parameter of discrete noise in a combined semicontinuos communication channel for the triangular scheme. Probabilistic characteristics of these criteria are obtained (in particular, asymptotics of the minimal sample size for given error probabilities of two kinds). It is shown that the minimal sample size depends essentially on the channel parameters.
Added: Oct 8, 2016
Article
Иванов А. В. Математические вопросы криптографии. 2015. Т. 6. № 4. С. 49-64.
Added: Oct 11, 2016
Article
Фомин Д. Б. Математические вопросы криптографии. 2020. Т. 11. № 4. С. 133-149.

We study parameters of some permutations constructed by the «Butterfly» scheme. The influence of these parameters on the algebraic degree of permutation and its differential uniformity is investigated.

Added: Nov 25, 2020
Article
Нестеренко А. Ю. Математические вопросы криптографии. 2013. Т. 4. № 2. С. 101-111.
Added: Sep 2, 2013
Article
Нестеренко А. Ю. Математические вопросы криптографии. 2018. Т. 9. № 1. С. 89-106.

We consider a new approach to the representation of irrational numbers defined by rapidly convergent series in an arbitrary base. For two large classes of such numbers some algorithms of their representation are described; also the number of operations and the memory volume used are estimated. The possibility of efficient realization of these algorithms is studied.

Added: Jul 17, 2018
Article
Нестеренко А. Ю. Математические вопросы криптографии. 2015. Т. 6. № 3. С. 135-151.

We construct a new family of compressing mappings by means of superposition of several bijective mappings and mappings with specified properties. All functions in this family are proved to be universal hash functions. Concrete examples of functions from the family which are suitable for cryptographic applications are supplied.

Added: Mar 14, 2016
Article
Миронкин В. О., Михайлов В. Г. Математические вопросы криптографии. 2018. Т. 9. № 3. С. 99-108.

The properties of the graph of $k$-fold iteration of uniform random mapping f: {1,...,n}  to {1,...,n}. are being studied. Some recurrence formulas for the probabilities for a random vertex to belong to the set of images f^k({1,...,n}) and to the set of the initial vertices in the graph of f^k are obtained.

Added: Sep 14, 2018
1 2