Choosing Substitutions for Symmetric Cryptographic Algorithms Based on the Analysis of Their Algebraic Properties substitution, algebraic attack, and criterion | Feb 10, 2010 Russian: PDF Continue reading »
Construction of an Overdefined System of Equations Describing the Cipher "Labyrinth" algebraic attack, Labyrinth, and system of equations | Oct 2, 2009 Russian: PDF Continue reading »
Goals and Requirements of ICAO to PKI for Electronic Passports ICAO, PKI, and passports | Mar 30, 2008 Russian: PDF Continue reading »