default search action
Nikolay Poluyanenko
Person information
- affiliation: V. N. Karazin Kharkiv National University, Ukraine
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy:
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. Cryptogr. 8(2): 17 (2024) - [j6]Alexandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy, Oleksandr Peliukh:
A new cost function for heuristic search of nonlinear substitutions. Expert Syst. Appl. 237(Part C): 121684 (2024) - [j5]Alexandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy, Olha Pieshkova:
Optimized simulated annealing for efficient generation of highly nonlinear S-boxes. Soft Comput. 28(5): 3905-3920 (2024) - [j4]Alexandr Kuznetsov, Serhii Kandii, Emanuele Frontoni, Nikolay Poluyanenko:
SBGen: A high-performance library for rapid generation of cryptographic S-boxes. SoftwareX 27: 101788 (2024) - [c7]Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Marco Arnesano, Oleksii Smirnov:
Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers. CQPC 2024: 1-11 - [i1]Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Marco Arnesano, Oleksii Smirnov:
Evolutionary Approach to S-box Generation: Optimizing Nonlinear Substitutions in Symmetric Ciphers. CoRR abs/2407.03510 (2024) - 2023
- [c6]Oleksandr Kuznetsov, Oleksandr Peliukh, Nikolay Poluyanenko, Serhii Bohucharskyi, Ievgeniia Kolovanova:
Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems. CPITS II 2023: 81-94 - 2022
- [b1]Alexandr Alexandrovich Kuznetsov, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko, Natalia Kryvinska:
Stream Ciphers in Modern Real-time IT Systems - Analysis, Design and Comparative Studies. Springer 2022, ISBN 978-3-030-79769-0, pp. 1-527 - [j3]Alexandr Kuznetsov, Lukasz Wieclaw, Nikolay Poluyanenko, Lukasz Hamera, Sergey Kandiy, Yelyzaveta Lohachova:
Optimization of a Simulated Annealing Algorithm for S-Boxes Generating. Sensors 22(16): 6073 (2022) - 2021
- [c5]Alexandr Kuznetsov, Yaroslav Derevianko, Nikolay Poluyanenko, Oleksandr Bagmut:
Particle Swarm Optimization based on S-Boxes Generation. CPITS II (2) 2021: 120-134 - 2020
- [j2]Alexandr Kuznetsov, Oleksandr Potii, Nikolay Poluyanenko, Oleksii Smirnov, Igor Stelnyk, Danylo Mialkovskyi:
Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register. Int. J. Comput. 19: 247-256 (2020) - [c4]Nikolay Poluyanenko, Alexandr Kuznetsov, Elizaveta Lazareva, Andrey Marakushyn:
Extrapolation to calculate the probability of a double spending attack. CMIS 2020: 610-620 - [c3]Oleksandr Kurbatov, Pavel Kravchenko, Nikolay Poluyanenko, Yevhenii Demenko, Tetiana Kuznetsova:
Global Digital Identity and Public Key Infrastructure. ICTERI Workshops 2020: 1-12
2010 – 2019
- 2019
- [j1]Alexandr Kuznetsov, Oleksandr Potii, Nikolay Poluyanenko, Serhii Ihnatenko, Igor Stelnyk, Danylo Mialkovskyi:
Opportunities to minimize Hardware and Software Costs for Implementing Boolean Functions in Stream Ciphers. Int. J. Comput. 18: 443-452 (2019) - [c2]Oleksandr Kurbatov, Pavel Kravchenko, Oleksiy Shapoval, Nikolay Poluyanenko, Mariana Malchyk, Alina Sakun, Vladyslav Kovtun:
Anonymous Decentralized E-Voting System. CMiGIN 2019: 12-22 - [c1]Nikolay Poluyanenko, Nadia Pisarenko, Vladyslav Safonenko, Tymur Makushenko, Olha Pushko, Yevhena Zaburmekha, Kateryna Kuznetsova:
Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol. CybHyg 2019: 32-59
Coauthor Index
aka: Alexandr Alexandrovich Kuznetsov
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint