KUZNETSOV, OLEKSANDR
 Distribuzione geografica
Continente #
EU - Europa 351
AS - Asia 209
NA - Nord America 125
Totale 685
Nazione #
SG - Singapore 192
DE - Germania 113
US - Stati Uniti d'America 107
RU - Federazione Russa 76
IT - Italia 63
FI - Finlandia 55
MX - Messico 17
FR - Francia 13
HK - Hong Kong 13
GB - Regno Unito 12
AT - Austria 10
UA - Ucraina 5
CN - Cina 2
KZ - Kazakistan 2
NL - Olanda 2
CA - Canada 1
IE - Irlanda 1
RO - Romania 1
Totale 685
Città #
Munich 96
Helsinki 51
The Dalles 45
Chicago 43
Singapore 37
Rome 28
Mexico City 17
Hong Kong 13
Moscow 11
Portsmouth 11
Lauterbourg 10
Carpegna 9
Assago 8
Nuremberg 7
Ashburn 5
Perugia 5
Vienna 5
Venice 4
Santa Clara 3
Turin 3
Dnipro 2
Guangzhou 2
Kropyvnytskyi 2
Milan 2
New Haven 2
Perm 2
Poggiomarino 2
Boydton 1
Braunschweig 1
Bristol 1
Bucharest 1
Dublin 1
Düsseldorf 1
Falkenstein 1
Jyväskylä 1
Karlsruhe 1
Kramatorsk 1
Miami 1
Modena 1
New York 1
Nizhniy Novgorod 1
Porto Sant'Elpidio 1
Totale 440
Nome #
Efficient Zero-Knowledge Proofs for Set Membership in Blockchain-Based Sensor Networks: A Novel OR-Aggregation Approach 194
Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes 44
A new cost function for heuristic search of nonlinear substitutions 23
Adaptive Merkle trees for enhanced blockchain scalability 15
Experimental Studies Of The Modern Symmetric Stream Ciphers 14
Computational Modeling of Enhanced Spread Spectrum Codes for Asynchronous Wireless Communication 14
Adaptive cybersecurity: AI-driven threat intelligence in healthcare systems 14
Blockchain applications in metaverse environments: new horizons 13
Advancing metaverse security with cryptographic innovations 13
Codes for Multiple-Access Asynchronous Techniques 12
Periodic Properties of Cryptographically Strong Pseudorandom Sequences 12
SBGen: A high-performance library for rapid generation of cryptographic S-boxes 12
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation 12
An Empirical Assessment of Leading Blockchain Financial Services 12
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection 12
Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography 11
Enhanced Security and Efficiency in Blockchain with Aggregated Zero-Knowledge Proof Mechanisms 11
Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions 11
New Code Based Fuzzy Extractor for Biometric Cryptography 11
Cryptography in the metaverse: advanced protocols for secure communication 10
Designing of fault-tolerant computer system structures using residue number systems 10
High-Speed Stream Ciphers for Wireless Communication Systems 10
Direct Spread Spectrum Technology for Data Hiding in Audio 10
Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors 10
Harnessing edge computing for real-time cybersecurity in healthcare systems 9
Smart contracts for automated compliance in healthcare cybersecurity 9
Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis 9
Enhancing Cryptographic Primitives through Dynamic Cost Function Optimization in Heuristic Search 9
Solving Blockchain Scalability Problem Using ZK-SNARK 8
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications 8
Residual classes based mathematical model of the computer system's reliability 8
Deep learning-based biometric cryptographic key generation with post-quantum security 8
On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security 7
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities 7
Hiding data in vector images: software implementation and experimental research 7
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography 7
Wireless Network Encryption 7
Formation of Pseudorandom Sequences with Special Correlation Properties 6
Integrating Non-Positional Numbering Systems into E-Commerce Platforms: A Novel Approach to Enhance System Fault Tolerance 6
New Cost Function for S-boxes Generation by Simulated Annealing Algorithm 6
Enhancing Steganography Detection with AI: Fine-Tuning a Deep Residual Network for Spread Spectrum Image Steganography 6
Implementing Recursive Proofs for Efficient Blockchain Verification: A zk-SNARKs Approach 5
Optimization of a Simulated Annealing Algorithm for S-Boxes Generating 5
Optimizing Hill Climbing Algorithm for S-Boxes Generation 5
Optimized simulated annealing for efficient generation of highly nonlinear S-boxes 5
Unrecognizable yet identifiable: Image distortion with preserved embeddings 5
Merkle trees in blockchain: A Study of collision probability and security implications 5
Variance Analysis of Networks Traffic for Intrusion Detection in Smart Grids 5
Exploring zero-knowledge proofs in the metaverse: applications and challenges 5
Fault Tolerance Computer System Structures Functioning in Residue Classes 5
Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images 4
The analysis of the methods of data diagnostic in a residue number system 4
Image steganalysis using deep learning models 4
Generation of Nonlinear Substitutions by Simulated Annealing Algorithm 4
NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization 4
Hiding data in images using a pseudo-random sequence 3
Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Steganography 3
Performance analysis of cryptographic hash functions suitable for use in blockchain 3
Discrete signals with special correlation properties 3
Construction of cascade codes in the frequency domain 3
The method of raising numbers, represented in the system of residual classes to an arbitrary power of a natural number 3
Code-based cryptosystems from NIST PQC 3
Heuristic methods for the design of cryptographic Boolean functions 3
Improved method of determining the alternative set of numbers in residue number system 3
Biometric cryptosystems: Overview, state-of-the-art and perspective directions 3
THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS 3
COMBINING AND FILTERING FUNCTIONS IN THE FRAMEWORK OF NONLINEAR-FEEDBACK SHIFT REGISTER 3
COMBINING AND FILTERING FUNCTIONS IN THE FRAMEWORK OF NONLINEAR-FEEDBACK SHIFT REGISTER 3
Studies on statistical analysis and performance evaluation for some stream ciphers 2
Method of data control in the residue classes 2
Algebraic immunity of non-linear blocks of symmetric ciphers 2
Combinatorial properties of block symmetric ciphers key schedule 2
Periodic characteristics of output feedback encryption mode 2
The Design of Boolean Functions by Modified Hill Climbing Method 2
Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes 2
New Approach to the Implementation of Post-Quantum Digital Signature Scheme 2
Method of diagnostic of non-positional code structures in the system of residue classes basing on the usage of an alternative number set informativeness 2
Statistical testing of blockchain hash algorithms 2
Strumok stream cipher: Specification and basic properties 2
NIST PQC: Code-based CryptoSystems* 2
Malware Correlation Monitoring in Computer Networks of Promising Smart Grids 2
Performance of Hash Algorithms on GPUs for Use in Blockchain 2
Automated software vulnerability testing using deep learning methods 2
Code-based electronic digital signature 2
The Method of Single Errors Correction in the Residue Class 2
A Method for Implementing the Operation of Modulo Addition of the Residues of Two Numbers in the Residue Number System 2
Methods for comparing numbers in non-positional notation of residual classes 2
DISCRETE SIGNALS WITH MULTI-LEVEL CORRELATION FUNCTION 2
Methods of synthesis of signals with prescribed properties 2
Code-based public-key cryptosystems for the post-quantum period 2
Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes 1
Evaluation of Algebraic Immunity of modern block ciphers 1
The research of modern stream ciphers 1
Strumok keystream generator 1
Research of cross-platform stream symmetric ciphers implementation 1
Lightweight stream ciphers for green IT engineering 1
Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2 1
Code-based key encapsulation mechanisms for post-quantum standardization 1
Automated software vulnerability testing using in-depth training methods 1
Development of mathematical and software models of the perspective encryption algorithm for implementation verification 1
Totale 795
Categoria #
all - tutte 3.716
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 3.716


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2024/2025802 0 0 0 0 12 48 166 254 133 189 0 0
Totale 802