Follow
Khalicha Yubuzova
Title
Cited by
Cited by
Year
Secure hash function constructing for future communication systems and networks
S Gnatyuk, V Kinzeryavyy, K Kyrychenko, K Yubuzova, M Aleksander, ...
International Conference of Artificial Intelligence, Medical Engineering …, 2018
352018
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks.
S Gnatyuk, V Kinzeryavyy, M Iavich, D Prysiazhnyi, K Yubuzova
Proceedings of the 14th International Conference on ICT in Education …, 2018
242018
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Z Hu, S Gnatyuk, T Okhrimenko, V Kinzeryavyy, M Iavich, K Yubuzova
ICTERI Workshops, 810-821, 2019
152019
Studies on practical cryptographic security analysis for block ciphers with random substitutions
B Akhmetov, S Gnatyuk, V Kinzeryavyy, K Yubuzova
International Journal of Computing 19 (2), 298-308, 2020
32020
Critical Aviation Information Systems: Identification and Protection
S Gnatyuk, Z Hu, V Sydorenko, M Aleksander, Y Polishchuk, KI Yubuzova
Cases on Modern Computer Systems in Aviation, 423-448, 2019
22019
Формирование биометрической базы рукописных образов на казахском языке для программ биометрической аутентификации личностей.
ЮХИ Ахметов Б. С., Алимсеитова Ж. К., Малыгин А. И.
Сборник трудов ІІ Международной научно-практической конференции …, 2015
2*2015
Узагальнена класифікація методів квантової криптографії та зв’язку
Т Жмурко, В Кінзерявий, Х Юбузова, А Стояновіч
Ukrainian Scientific Journal of Information Security 21 (3), 2015
12015
DIFFERENTIAL CRYPTANALYSIS OF THE LIGHTWEIGHT BLOCK CIPHER CYPRESS-256
M Rodinko, R Oliynykov, K Yubuzova
International Journal of Computing 19 (2), 273-281, 2020
2020
EXPERIMENTAL STUDIES OF THE ERROR-CORRECTING CAPABILIY OF REED-SOLOMON NOISE-IMMUNE CODES OVER THE GF (32) GALOIS FIELD WHEN TRANSFERING INFORMATION BY THE DETERMINISTIC …
B Akhmetov, S Gnatyuk, T Okhrimenko, VV Kinzeryavy, K Yubuzova
ВЕСТНИК КазНИТУ, 626, 2019
2019
EXPERIMENTAL RESEARCH OF THE SIMULATION MODEL FOR DETERMINISTIC SECURE COMMUNICATION PROTOCOL IN QUANTUM CHANNEL WITH NOISE
B Akhmetov, S Gnatyuk, T Zhmurko, V Kinzeryavyy, K Yubuzova
Научный журнал «Доклады НАН РК», 5-11, 2018
2018
Cases on Modern Computer Systems in Aviation. Critical Aviation Information Systems: Identification and Protection
YK Gnatyuk S., Hu Zh., Sydorenko V., Aleksander M., Polishchuk Y.
IGI Global. DOI: 10.4018/978-1-5225-7588-7. 1, 00-00, 2018
2018
Approach to Increase Speed for Deterministic Protocols of Quantum Cryptography.
YKI Gnatyuk S.O., Okhrimenko T.O (Zhmurko), Akhmetov B.S., Seilova N.A.
The Eighth World Congress «AVIATION IN THE XXI-st CENTURY – Safety in …, 2018
2018
Новітні квантово-криптографічні системи та технології.
ЮХ Гнатюк С., Охріменко Т.
Матеріали VIII міжнародної науково-технічної конференції «Інфокомунікації …, 2018
2018
Статистическое тестирование псевдослучайных троичных последовательностей для применения в тритовых протоколах квантовой криптографии.
ЮХИ Гнатюк С.А., Жмурко Т.А., Кинзерявий В.Н.
Современные средства связи». – Минск: УО Белорусская государственная …, 2018
2018
Secure Hash Function Constructing for Future Communication Systems and Networks
OR Gnatyuk S., Kinzeryavyy V., Kyrychenko K., Yubuzova Kh., Aleksander M.
17th International Conference on Computer Information Systems and Industrial …, 2018
2018
Deterministic Quantum Cryptography Protocol Model for Depolarized Quantum Channel
YK Gnatyuk S., Zhmurko T., Iavich M.
International Conference on Information and Telecommunication Technologies …, 2018
2018
Experimental study of the simulation model for deterministic secure communication protocol in quantum channel with noise
YK Akhmetov B., Gnatyuk S., Zhmurko T., Kinzeryavyy V.
Reports of he naional academy of sciences of he republic of Kazakhstan. 5 …, 2018
2018
Deterministic Quantum Cryptography Protocol Model for Depolarized Quantum Channel.
YK Gnatyuk S., Zhmurko T., Iavich M.
«International Conference on Information and Telecommunication Technologies …, 2018
2018
Security intruder model in quantum cryptography systems.
YK Gnatyuk S., Zhmurko T., Kinzeryavyy V.
Iнформфацiйна безпека та комп’ютернi технології. ІІІ Міжнародна науково …, 2018
2018
Privacy amplification method for deterministic quantum cryptography protocols.
YK Gnatyuk S., Zhmurko T.
«Актуальні питання забезпечення кібербезпеки та захисту інформації», – К …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20