Vasyl Ustimenko

Orcid: 0000-0002-2138-2357

Affiliations:
  • Maria Curie-Skłodowska University, Poland


According to our database1, Vasyl Ustimenko authored at least 85 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Jordan-Gauss graphs and new multivariate public keys.
IACR Cryptol. ePrint Arch., 2024

On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography.
IACR Cryptol. ePrint Arch., 2024

On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings Z<sub>2<sup>s</sup>,</sub> s>1.
IACR Cryptol. ePrint Arch., 2024

On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2024

On short digital signatures with Eulerian transformations.
IACR Cryptol. ePrint Arch., 2024

On affine forestry over integral domains and families of deep Jordan-Gauss graphs.
IACR Cryptol. ePrint Arch., 2024

On Schubert cells of projective geometry and pseudo-quadratic public keys of multivariate cryptography (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Implementation of New Families of Graph-based Stream Ciphers with the Hidden Multivariate Nature.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
Extremal algebraic graphs, quadratic multivariate public keys and temporal rules.
IACR Cryptol. ePrint Arch., 2023

On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys.
IACR Cryptol. ePrint Arch., 2023

On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature.
IACR Cryptol. ePrint Arch., 2023

Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography.
IACR Cryptol. ePrint Arch., 2023

On families of stream ciphers based on the approximations of regular forests.
Proceedings of the 3rd International Workshop on Information Technologies: Theoretical and Applied Problems 2023, 2023

Schubert cells and quadratic public keys of Multivariate Cryptography.
Proceedings of the 3rd International Workshop on Information Technologies: Theoretical and Applied Problems 2023, 2023

Linear Codes of Schubert Type and Quadratic Public Keys of Multivariate Cryptography (short paper).
Proceedings of the Workshop on Classic, 2023

Families of Stream Ciphers based on Non-Bijective Multivariate Encryption Maps of High Degree.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Expanding Extremal Graphs and Implemented Solutions of Post Quantum Cryptography.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

2022
On the families of graphs with the fastest growth of girth and their usage in cryptography.
IACR Cryptol. ePrint Arch., 2022

On Extremal Algebraic Graphs and Multivariate Cryptosystems.
IACR Cryptol. ePrint Arch., 2022

New results on algebraic graphs of large girth and their impact on Extremal Graph Theory and Algebraic Cryptography.
IACR Cryptol. ePrint Arch., 2022

On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory.
IACR Cryptol. ePrint Arch., 2022

On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files.
IACR Cryptol. ePrint Arch., 2022

On D(n; q) quotients of large girth and hidden homomorphism based cryptographic protocols.
Proceedings of the Communication Papers of the 17th Conference on Computer Science and Intelligence Systems, 2022

On-Time Dependent Linguistic Graphs and Solutions of Postquantum Multivariate Cryptography (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

On Multivariate Maps of High Degree for the Post Quantum Protection of Virtual Organizations (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

2021
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
IACR Cryptol. ePrint Arch., 2021

On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems.
IACR Cryptol. ePrint Arch., 2021

On computations with Double Schubert Automaton and stable maps of Multivariate Cryptography.
CoRR, 2021

Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

New Cryptosystems of Noncommutative Cryptography based on Eulerian Semigroups of Multivariate Transformations (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

2020
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
IACR Cryptol. ePrint Arch., 2020

On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
IACR Cryptol. ePrint Arch., 2020

On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
IACR Cryptol. ePrint Arch., 2020

2019
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree.
Secur. Commun. Networks, 2019

On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces.
IACR Cryptol. ePrint Arch., 2019

On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
IACR Cryptol. ePrint Arch., 2019

On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem.
IACR Cryptol. ePrint Arch., 2019

On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2019

Expanding graphs of the Extremal Graph Theory and expanded platforms of Post Quantum Cryptography.
Proceedings of the Position Papers of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
On the implementation of new symmetric ciphers based on non-bijective multivariate maps.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2017
On desynchronised El Gamal algorithm.
IACR Cryptol. ePrint Arch., 2017

On new multivariate cryptosystems based on hidden Eulerian equations over finite fields.
IACR Cryptol. ePrint Arch., 2017

A geometric approach to orbital recognition in Chevalley-type coherent configurations and association schemes.
Australas. J Comb., 2017

2015
Graph based cubical multivariate maps and their cryptographical applications.
Proceedings of the Advances on Superelliptic Curves and their Applications, 2015

Algorithms for generation of Ramanujan graphs, other Expanders and related LDPC codes.
Ann. UMCS Informatica, 2015

2014
On New Examples of Families of Multivariate Stable Maps and their Cryptographical Applications.
Ann. UMCS Informatica, 2014

On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition.
Ann. UMCS Informatica, 2014

On two windows multivariate cryptosystem depending on random parameters.
IACR Cryptol. ePrint Arch., 2014

On multivariate cryptosystems based on maps with logarithmically invertible decomposition corresponding to walk on graph.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

2013
On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines.
Proceedings of the Artificial Intelligence, Evolutionary Computing and Metaheuristics, 2013

On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography.
Proceedings of the Artificial Intelligence, Evolutionary Computing and Metaheuristics, 2013

On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree.
Ann. UMCS Informatica, 2013

On the applications of Extremal Graph Theory to Coding Theory and Cryptography.
Electron. Notes Discret. Math., 2013

On the key exchange with nonlinear polynomial maps of stable degree
CoRR, 2013

Examples of Ramanujan and expander graphs for practical applications.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography.
Ann. UMCS Informatica, 2012

On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2.
Ann. UMCS Informatica, 2012

LDPC Codes Based on Algebraic Graphs.
Ann. UMCS Informatica, 2012

On Families of Graphs of Large Cycle Indicator, Matrices of Large Order and Key Exchange Protocols With Nonlinear Polynomial Maps of Small Degree.
Math. Comput. Sci., 2012

On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator.
Math. Comput. Sci., 2012

On some mathematical aspects of data protection in cloud computing.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

On LDPC Codes Corresponding to Infinite Family of Graphs A(k;K).
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

2011
On the key expansion of <i>D</i>(<i>n, K</i>)-based cryptographical algorithm.
Ann. UMCS Informatica, 2011

Performance of algebraic graphs based stream-ciphers using large finite fields.
Ann. UMCS Informatica, 2011

On the key exchange with new cubical maps based on graphs.
Ann. UMCS Informatica, 2011

On LDPC codes corresponding to affine parts of generalized polygons.
Ann. UMCS Informatica, 2011

The implementation of cubic public keys based on a new family of algebraic graphs.
Ann. UMCS Informatica, 2011

On the implementation of stream ciphers based on a new family of algebraic graphs.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
On the implementation of public keys algorithms based on algebraic graphs over finite commutative rings.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010

2009
On the Cryptographical Properties of Extremal Algebraic Graphs.
Proceedings of the Algebraic Aspects of Digital Communications, 2009

2008
On the hidden discrete logarithm for some polynomial stream ciphers.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2003
Extremal properties of regular and affine generalized m-gons as tactical configurations.
Eur. J. Comb., 2003

2001
CRYPTIM: Graphs as Tools for Symmetric Encryption.
Proceedings of the Applied Algebra, 2001

1999
Polarities and 2k-cycle-free graphs.
Discret. Math., 1999

1997
New upper bounds on the order of cages.
Electron. J. Comb., 1997

1996
A characterization of the components of the graphs D(k, q).
Discret. Math., 1996

1995
Graphs of Prescribed Girth and Bi-Degree.
J. Comb. Theory B, 1995

Explicit Construction of Graphs with an Arbitrary Large Girth and of Large Size.
Discret. Appl. Math., 1995

1994
Properties of Certain Families of 2<i>k</i>-Cycle-Free Graphs.
J. Comb. Theory B, 1994

New Constructions of Bipartite Graphs on <i>m</i>, <i>n</i> Vertices with Many Edges and Without Small Cycles.
J. Comb. Theory B, 1994

1993
New Examples of Graphs without Small Cycles and of Large Size.
Eur. J. Comb., 1993

1992
Some Algebraic Constructions of Dense Graphs of Large Girth and of Large Size.
Proceedings of the Expanding Graphs, 1992

1989
On a New Family of (P and Q)-polynomial Schemes.
Eur. J. Comb., 1989


  Loading...