Personal Information
Organization / Workplace
Ukraine Ukraine
Occupation
Professor at Kharkov National University of Radioelectronics
Industry
Technology / Software / Internet
About
Design and analysis of symmetric cryptographic primitives
Computer networks security
Software security
Tags
block cipher
software security
cryptanalysis
modes of operation
kalyna
ukrainian standard
buffer overflow
encryption performance
encryption
modes of operations
s-box
cryptocurrency
rscoin
integer overflow
format string vulnerabilties
look-up tables
aes
effective software implementation
kupyna
cryptographic hash
canary word
aslr
nx bit
exploit
security
shellcode
See more
Presentations
(10)Personal Information
Organization / Workplace
Ukraine Ukraine
Occupation
Professor at Kharkov National University of Radioelectronics
Industry
Technology / Software / Internet
About
Design and analysis of symmetric cryptographic primitives
Computer networks security
Software security
Tags
block cipher
software security
cryptanalysis
modes of operation
kalyna
ukrainian standard
buffer overflow
encryption performance
encryption
modes of operations
s-box
cryptocurrency
rscoin
integer overflow
format string vulnerabilties
look-up tables
aes
effective software implementation
kupyna
cryptographic hash
canary word
aslr
nx bit
exploit
security
shellcode
See more