Presentations
2022
2019
2018
- Kan krypto gjøre at hvor data lagres blir uvesentlig?
- Getting benefits of OWASP ASVS at initial phases
2017
2016
2015
- A New Standard of Ukraine: The Kupyna Hash Function
- A New Encryption Standard of Ukraine: The Kalyna Block Cipher
- Halfway to Ph.D.? What will happen next?
2014
- Algebraic-differential Cryptanalysis and Addition Modulo \( 2^n \)
- Methods and Tools for Analysis of Symmetric Cryptographic Primitives
- Homomorphic encryption
- Algebraic Attacks Using Binary Decision Diagrams
- A Sage Library for Analysis of Nonlinear Binary Mappings
- Binary Decisions Diagrams for Algebraic Attacks
- Methods and Tools to Generate Nonlinear Substitution Boxes for Symmetric Cryptographic Algorithms
2013
- A Library for Analysis of Substitutions
- Extended Criterion for Absence of Fixed Points
- Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
- A Method for Generation of High-Nonlinear S-Boxes Based on Gradient Descent
- Open Problems in the Generation Substitution Field
- Revised Attacks on Norwegian Banks
2012
- Nonlinear Feedback Shift Registers With Maximal Period
- Cryptographic Properties of Substitutions
- Verification of EA-equivalence for Vectorial Boolean Functions
- Prototype of Russian Hash Function "Stribog"