Search Results - "Chugunkov, Ilya"
-
1
Using Neural Networks to Create and Test Pseudorandom Number Generators
ISSN: 2074-7128, 2074-7136Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.12.2023Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.12.2023)“…The article presents an overview of modern researches in the field of neural cryptography in relation to pseudorandom number generators (PRNG). Various types…”
Get full text
Journal Article -
2
Phishing Attacks and Protection Against Them
ISSN: 2376-6565Published: IEEE 26.01.2021Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (26.01.2021)“…Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such…”
Get full text
Conference Proceeding -
3
Stochastic ARX Algorithms: a New Look at Related Keys Analysis
ISSN: 2376-6565Published: IEEE 25.01.2022Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (25.01.2022)“…The paper is devoted to the problem of a related keys security analysis of ARX stochastic algorithms. The authors provide a new related key function. A new…”
Get full text
Conference Proceeding -
4
Issues of Static and Dynamic Graphical Testing of Stochastic Transformations Results
ISSN: 2376-6565Published: IEEE 26.01.2021Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (26.01.2021)“…The article deals with the pseudorandom number generators exploration using graphical methods. In this paper, we defined the necessary tools for building…”
Get full text
Conference Proceeding -
5
Key Expansion in Block Stochastic Algorithms
ISSN: 2376-6565Published: IEEE 29.01.2024Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (29.01.2024)“…This article is devoted to the issue of increasing the efficiency of block algorithms by expanding the size of the key space. Existing approaches to key…”
Get full text
Conference Proceeding -
6
Using a Pseudorandom Number Generator to Implement Steganographic Channels
ISSN: 2376-6565Published: IEEE 29.01.2024Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (29.01.2024)“…The article is devoted to an approach for constructing a steganographic information transmission channel using a pseudorandom number generator. It discusses…”
Get full text
Conference Proceeding -
7
Statistical Tests for Replacement Blocks Assessment
ISSN: 2376-6565Published: IEEE 26.01.2021Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (26.01.2021)“…The basic operations of the round function of any block cipher are substitution and permutation. The article discusses approaches to the implementation of the…”
Get full text
Conference Proceeding -
8
Improvement of P-box Efficiency
ISSN: 2376-6565Published: IEEE 01.01.2020Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2020)“…Modern block ciphers are built by combining the substitution blocks (S-boxes) with the permutation blocks (P-boxes). The principles of P-box building are…”
Get full text
Conference Proceeding -
9
Pseudorandom Number Generators with Predeterminated Period and Pre-period
ISSN: 2376-6565Published: IEEE 01.01.2020Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2020)“…One of the characteristics of pseudorandom number generator is the period of the sequence generated by it. Usually it is required that the period value should…”
Get full text
Conference Proceeding -
10
New Class of Pseudorandom Number Generators for Logic Encryption Realization
ISSN: 2376-6565Published: IEEE 01.01.2020Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2020)“…Pseudorandom number generators (PRNG) are essential elements of any security system. In the tusks of information security PRNG provide unpredictable operation…”
Get full text
Conference Proceeding -
11
Pseudorandom numbers generators quality assessment using graphic tests
ISBN: 9781479925933, 1479925934Published: IEEE 01.02.2014Published in Proceedings of the 2014 IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference : 3-5 February 2014 (01.02.2014)“…In this paper we address testing methodologies of pseudorandom numbers generators (PRNGs) and propose improved approaches which increase testing efficiency. At…”
Get full text
Conference Proceeding -
12
Hash Functions are Based on Three-Dimensional Stochastic Transformations
ISSN: 2376-6565Published: IEEE 01.01.2019Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2019)“…The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective…”
Get full text
Conference Proceeding -
13
Construction of Multidimensional Stochastic Transformation Blocks
Published: IEEE 01.09.2019Published in 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS) (01.09.2019)“…The article is devoted to the improvement of stochastic transformation blocks (R-blocks). The principles of R- blocks construction are considered. We review…”
Get full text
Conference Proceeding -
14
The Log Data Collection Service for Cloud Robotics
ISSN: 2472-8586Published: IEEE 01.09.2017Published in 2017 IEEE 11th International Conference on Application of Information and Communication Technologies (AICT) (01.09.2017)“…Mobile robotic systems became essential part of our daily life. They can interact with humans as valued helpers, sometimes in relatively sophisticated tasks,…”
Get full text
Conference Proceeding -
15
New techniques of malware detection using FTP Honeypot systems
Published: IEEE 2017Published in 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (2017)“…The paper deals with the increase of protection systems' efficiency by means of the Honeypot technology. The design principles of this technology are…”
Get full text
Conference Proceeding -
16
Computing in Finite Fields
ISSN: 2376-6565Published: IEEE 25.01.2022Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (25.01.2022)“…The mathematical apparatus of Galois field theory is used in coding theory, cryptography, stochastic informatics. The paper considers algorithms for…”
Get full text
Conference Proceeding -
17
The Construction of Contolled S-box
ISSN: 2376-6565Published: IEEE 25.01.2022Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (25.01.2022)“…The development of block cryptoalgorithms does not stand still. There are new architectures and increase of key information. But there is one primitive that…”
Get full text
Conference Proceeding -
18
Generators with the Given Distribution Law
ISSN: 2376-6565Published: IEEE 01.01.2019Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2019)“…Pseudo-random number generators (PRNG) play an important role in the tasks of information security. Reliability and safety of information collection,…”
Get full text
Conference Proceeding -
19
Method for Improving the Statistical Properties of Pseudo-random Number Generators
ISSN: 2376-6565Published: IEEE 01.01.2019Published in IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (01.01.2019)“…The article is devoted to the issues of increasing the statistical safety of pseudo-random number generators by equalizing the properties of the generated…”
Get full text
Conference Proceeding -
20
Creation of datasets from open sources
ISBN: 9781538643396, 1538643391Published: IEEE 01.01.2018Published in 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (01.01.2018)“…Machine learning is one of the fastest growing spheres in IT, but it still has some fundamental problems. Before training a neural network, it's necessary to…”
Get full text
Conference Proceeding

