Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Mikhail A. Kudinov"'
Publikováno v:
Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]. 12:129-145
In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 16:333-341
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achie
Autor:
N.O. Pozhar, Evgeniy O. Kiktenko, Ekaterina Kolycheva, Mikhail A. Kudinov, Aleksey Fedorov, Alexander Borisov, Denis Nabokov, Anton Guglya, Sergey E. Yunakovsky, Maxim Kot
Publikováno v:
EPJ Quantum Technology. 8
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of securit
Autor:
Vitalii Bushaev, Mikhail A. Kudinov, Vladimir Kryzhanovskiy, Vadim Popov, Tasnima Sadekova, Stanislav Kamenev, Sergey Repyevsky, Denis Parkhomenko
Publikováno v:
INTERSPEECH
Publikováno v:
ICASSP
LPCNet vocoder has recently been presented to TTS community and is now gaining increasing popularity due to its effectiveness and high quality of the speech synthesized with it. In this work, we present a modification of LPCNet that is 1.5x faster, h
Autor:
Mikhail S. Kudinov
Publikováno v:
Journal of Siberian Federal University. Engineering & Technologies. 9:1291-1301
Publikováno v:
Business Information Systems Workshops ISBN: 9783030366902
BIS (Workshops)
BIS (Workshops)
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c8b3dd15a6d22197b56c7026bc5e817
https://doi.org/10.1007/978-3-030-36691-9_20
https://doi.org/10.1007/978-3-030-36691-9_20
Publikováno v:
SECRYPT
In the present work, a peculiar property of hash-based signatures allowing detection of their forgery event is explored. This property relies on the fact that a successful forgery of a hash-based signature most likely results in a collision with resp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::faa9e7f0a8605bfeb4cade7e37661c45
Autor:
Mikhail A. Kudinov
Publikováno v:
Speech and Computer ISBN: 9783319231310
SPECOM
SPECOM
We present our first results in applications of recurrent neural networks to Russian. The problem of re-scoring of equiprobable hypotheses has been solved. We train several recurrent neural networks on a lemmatized news corpus to mitigate the problem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9999e52e21d92a691d48d262fbc3131f
https://doi.org/10.1007/978-3-319-23132-7_42
https://doi.org/10.1007/978-3-319-23132-7_42