Nikolay Poluyanenko

Affiliations:
  • V. N. Karazin Kharkiv National University, Ukraine


According to our database1, Nikolay Poluyanenko authored at least 13 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
Cryptogr., June, 2024

Optimized simulated annealing for efficient generation of highly nonlinear S-boxes.
Soft Comput., March, 2024

A new cost function for heuristic search of nonlinear substitutions.
Expert Syst. Appl., March, 2024

2023
Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
Sensors, 2022

Stream Ciphers in Modern Real-time IT Systems - Analysis, Design and Comparative Studies
375, Springer, ISBN: 978-3-030-79769-0, 2022

2021
Particle Swarm Optimization based on S-Boxes Generation.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register.
Int. J. Comput., 2020

Global Digital Identity and Public Key Infrastructure.
Proceedings of the 16th International Conference on ICT in Education, 2020

Extrapolation to calculate the probability of a double spending attack.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

2019
Opportunities to minimize Hardware and Software Costs for Implementing Boolean Functions in Stream Ciphers.
Int. J. Comput., 2019

Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Anonymous Decentralized E-Voting System.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...