Sergey Agievich
Sergey Agievich
Belarusian State University, Research Institute for Applied Problems of Mathematics and Informatics
Verified email at - Homepage
Cited by
Cited by
Математические и компьютерные основы криптологии
ЮС Харин, ВИ Берник, ГВ Матвеев, СВ Агиевич
Новое знание, 2003
On the representation of bent functions by bent rectangles
S Agievich
Probabilistic Methods in Discrete Mathematics: Proceedings of the Fifth …, 2002
Mathematical methods in solutions of the problems presented at the third international students''Olympiad in cryptography
N Tokareva, A Gorodilova, S Agievich, V Idrisova, N Kolomeec, ...
Прикладная дискретная математика, 2018
Mathematical and Computer Foundations of Cryptology
YS Kharin, VI Bernik, GV Matveev, SV Agievich
Novoye Znaniye, Minsk, 2003
Bent rectangles
S Agievich
Proc. of NATO Advanced Study Institute on Boolean Functions in Cryptology …, 2008
Problems, solutions and experience of the first international student''s Olympiad in cryptography
S Agievich, A Gorodilova, N Kolomeec, N Svetla, P Bart, R Vincent, ...
Прикладная дискретная математика, 2015
On the affine classification of cubic bent functions
S Agievich
Trudy Instituta matematiki NAN Belarusi 14 (1), 3-11, 2006
Mathematical problems of the Second International Students’ Olympiad in Cryptography
S Agievich, A Gorodilova, V Idrisova, N Kolomeec, G Shushuev, ...
Cryptologia 41 (6), 534-565, 2017
Exponential S-boxes
S Agievich, A Afonenko
Vesti NAN Belarusi 2005 (1), 106–112, 2005
The Fifth International Students’ Olympiad in cryptography—NSUCRYPTO: Problems and their solutions
A Gorodilova, S Agievich, C Carlet, X Hou, V Idrisova, N Kolomeec, ...
Cryptologia 44 (3), 223-256, 2020
Bash-f: another LRX sponge function
S Agievich, V Marchuk, A Maslau, V Semenov
Mat. Vopr. Kriptogr. 8 (2), 7-28, 2017
Problems and solutions from the fourth International Students’ Olympiad in Cryptography (NSUCRYPTO)
A Gorodilova, S Agievich, C Carlet, E Gorkunov, V Idrisova, N Kolomeec, ...
Cryptologia 43 (2), 138-174, 2019
EHE: nonce misuse-resistant message authentication
S Agievich
Prikl. Diskr. Mat. 39, 33-41, 2018
An improved Buchberger's algorithm
SV Agievich
Trudy Instituta Matematiki 20 (1), 3-13, 2012
Алгоритм блочного шифрования BelT
СВ Агиевич, ВА Галинский, ЮС Харин, НД Микулич
Управление защитой информации, т. 6,№ 4, 2002, с. 407–412, 2002
XS-circuits in Block Ciphers
S Agievich
IACR Cryptology ePrint Archive 2018, 592, 2018
Two-stage allocations and the double Q-function
S Agievich
The Electronic Journal of Combinatorics 10 (1), R21, 2003
On the Sixth International Olympiad in Cryptography NSUCRYPTO
A Gorodilova, N Tokareva, S Agievich, C Carlet, E Gorkunov, V Idrisova, ...
arXiv preprint arXiv:2005.09563, 2020
On the continuation to bent functions and upper bounds on their number
SV Agievich
Prikladnaya Diskretnaya Matematika. Supplement, 18-21, 2020
The Counter mode with encrypted nonces and its extension to authenticated encryption
SV Agievich
Математические вопросы криптографии 11 (2), 7-24, 2020
The system can't perform the operation now. Try again later.
Articles 1–20