Search Results - "Cherckesova Larissa"

Refine Results
  1. 1

    Developing a New Collision-Resistant Hashing Algorithm by Cherckesova, Larissa V., Safaryan, Olga A., Lyashenko, Nikita G., Korochentsev, Denis A.

    Published in Mathematics (Basel) (01-08-2022)
    “…Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making…”
    Get full text
    Journal Article
  2. 2

    Creation of an encryption algorithm resistant to attacks through side channels of leakage by Cherckesova, Larissa, Revyakina, Elena, Buryakova, Olga, Gazizov, Andrey

    Published in E3S web of conferences (2024)
    “…The paper is devoted to.the development of an encryption algorithm resistant to leakage through side channels The objectives of the work were the development…”
    Get full text
    Journal Article
  3. 3

    Circuit engineering solutions for high - temperature analog microcircuits in extreme environmental conditions by Dzhurov, Alexandr, Lyashenko, Kirill, Revyakina, Elena, Cherckesova, Larissa

    Published in E3S web of conferences (01-01-2023)
    “…The current geopolitical situation and import–substitution challenges facing the domestic electronics industry require the creation of devices capable of…”
    Get full text
    Journal Article
  4. 4

    Filtering grayscale images using the Kalman filter by Ionov, Ilya, Boldyrikhin, Nikolay, Cherckesova, Larissa, Saveliev, Vasily

    Published in E3S Web of Conferences (01-01-2022)
    “…This article aims to explore the possibility of using the Kalman filter to filter images. The relevance of the study lies in the fact that at present the tasks…”
    Get full text
    Journal Article Conference Proceeding
  5. 5

    Development of a system for protecting against DDoS attacks at the L7 level of the OSI model - HTTP Flood by Razumov, Pavel, Lyashenko, Kirill, Cherckesova, Larissa, Revyakina, Elena, Yengibaryan, Irina, Revyakin, Alexander

    Published in E3S web of conferences (01-01-2023)
    “…In today’s world of globalization and the development of information technology, it is not possible to build a business and production without using the latest…”
    Get full text
    Journal Article
  6. 6

    Ensuring the security of web applications operating on the basis of the SSL/TLS protocol by Razumov, Pavel, Cherckesova, Larissa, Revyakina, Elena, Morozov, Sergey, Medvedev, Dmitry, Lobodenko, Andrei

    Published in E3S web of conferences (01-01-2023)
    “…SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as…”
    Get full text
    Journal Article
  7. 7

    Exposure of pumping intense external electromagnetic fields on radioelectronic engineering substances with domain structure by Cherckesova, Larissa, Bezuglov, Dmitriy

    Published in MATEC Web of Conferences (01-01-2018)
    “…Recently, the research of interaction processes of materials with domain structure, applied in radioelectronic techniques, with strong electromagnetic fields…”
    Get full text
    Journal Article Conference Proceeding
  8. 8

    Post-Quantum Cryptosystem NTRUEnCrypt and Its Advantage over Pre – Quantum Cryptosystem RSA by Cherckesova, Larissa, Safaryan, Olga, Razumov, Pavel, Kravchenko, Veronica, Morozov, Sergey, Popov, Alexey

    Published in E3S Web of Conferences (01-01-2020)
    “…Cryptography is inextricably linked to the transfer of data, and in addition to ensuring user authorization; it is designed to guarantee the integrity of the…”
    Get full text
    Journal Article Conference Proceeding
  9. 9

    Information system development for restricting access to software tool built on microservice architecture by Safaryan, Olga, Pinevich, Elena, Roshchina, Evgenia, Cherckesova, Larissa, Kolennikova, Nadezhda

    Published in E3S Web of Conferences (01-01-2020)
    “…The article discusses issues related to improving the security of an information system by introducing an authentication system into distributed information…”
    Get full text
    Journal Article Conference Proceeding
  10. 10

    Specific features of the practical implementation of observation planning in systems for monitoring networks with dynamic topology by Razumov, Pavel, Boldyrikhin, Nikolay, Cherckesova, Larissa, Safaryan, Olga, Reshetnikova, Irina, Beryoza, Andrey

    Published in E3S Web of Conferences (01-01-2020)
    “…The article is devoted to the issues of practical implementation of planning observations of information processes flows, the sources of which are dynamic…”
    Get full text
    Journal Article Conference Proceeding
  11. 11

    Speed improvement of the quantum factorization algorithm of P. Shor by upgrade its classical part by Cherckesova, Larissa, Safaryan, Olga, Razumov, Pavel, Pilipenko, Irina, Ivanov, Yuriy, Smirnov, Ivan

    Published in E3S web of conferences (01-01-2020)
    “…This report discusses Shor’s quantum factorization algorithm and ρ–Pollard’s factorization algorithm. Shor’s quantum factorization algorithm consists of…”
    Get full text
    Journal Article Conference Proceeding
  12. 12

    Development of intelligent system for automated traffic control by Revyakina, Yelena, Cherckesova, Larissa, Safaryan, Olga, Porksheyan, Vitaliy, Nikishina, Tatyana, Andryushchenko, Sergey

    Published in E3S Web of Conferences (01-01-2020)
    “…This article is devoted to the issue of regulating traffic congestion in major cities of the world using artificial neural networks. Research is aimed at…”
    Get full text
    Journal Article Conference Proceeding
  13. 13

    Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities by Cherckesova, Larissa, Safaryan, Olga, Razumov, Pavel, Medvedev, Dmitry, Kravchenko, Veronica, Ivanov, Yuriy

    Published in E3S web of conferences (01-01-2020)
    “…This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security…”
    Get full text
    Journal Article Conference Proceeding
  14. 14

    Possibilities of conducting XSS-attacks and the development of countermeasures by Revyakina, Yelena, Cherckesova, Larissa, Safaryan, Olga, Korochentsev, Denis, Boldyrikhin, Nikolay, Ivanov, Yuri

    Published in E3S web of conferences (01-01-2020)
    “…The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches…”
    Get full text
    Journal Article Conference Proceeding
  15. 15

    Investigation of the Possibilities of Optimizing the Temporary Regime of Radiation of Radiotechnical Information System in Order to Increase the Secrecy by Boldyrikhin, Nikolay V., Cherckesova, Larissa V., Razumov, Pavel V.

    “…The article analyzes the possibilities of increasing the secrecy of radiotechnical information system by reducing the operating time for radiation. The…”
    Get full text
    Conference Proceeding
  16. 16

    Development of Fast Exponentiation Algorithm «To Center and Back by Smirnov, Ivan A., Cherckesova, Larissa V., Safaryan, Olga A., Korochentsev, Denis A., Chumakov, Vladislav E., Gavlicky, Alexandr I.

    “…In the present paper the exponentiation algorithm "To Center and Back" based on the idea of the additive chains exponentiation method is developed. The created…”
    Get full text
    Conference Proceeding
  17. 17

    Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation by Chesnokov, Nikita I., Korochentsev, Denis A., Cherckesova, Larissa V., Safaryan, Olga A., Chumakov, Vladislav E., Pilipenko, Irina A.

    “…the purpose of this paper is investigation of existing approaches to formation of electronic digital signatures, as well as the possibility of software…”
    Get full text
    Conference Proceeding
  18. 18

    Cryptographic Algorithm Implementation for Data Encryption in DBMS MS SQL Server by Safaryan, Olga A., Roshchina, Evgenia V., Cherckesova, Larissa V., Pinevich, Elena V., Lobodenko, Andrey G., Akishin, Boris A.

    “…the report discusses issues related to the MS SQL database administration, as well as the basic methods for implementing backup and encryption. It is proposed…”
    Get full text
    Conference Proceeding
  19. 19

    The development of countermeasures against session hijacking by Cherckesova Larissa, Revyakina Elena, Roshchina Evgeniya, Porksheyan Vitaliy

    Published in E3S web of conferences (01-01-2024)
    “…This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and…”
    Get full text
    Journal Article
  20. 20