- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Network Security and Intrusion Detection
- Security and Verification in Computing
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- graph theory and CDMA systems
- Cellular Automata and Applications
- Intelligence, Security, War Strategy
- Advanced Steganography and Watermarking Techniques
- Economic and Technological Developments in Russia
- Peer-to-Peer Network Technologies
- Smart Grid Security and Resilience
- Privacy-Preserving Technologies in Data
- Parallel Computing and Optimization Techniques
- Natural Language Processing Techniques
- Fractal and DNA sequence analysis
- Microtubule and mitosis dynamics
- DNA and Biological Computing
- Distributed systems and fault tolerance
- Economic, Social, and Public Health Issues in Russia and Globally
University of Luxembourg
2016-2025
State Duma
2019-2021
Plekhanov Russian University of Economics
2019
Linköping University
2018
Sectra (Sweden)
2018
University of Malta
2018
UCLA Health
2018
Vanderbilt University
2018
Luxembourg School of Business
2015
Recherches Scientifiques Luxembourg
2007-2010
Bitcoin is a digital currency which relies on distributed set of miners to mint coins and peer-to-peer network broadcast transactions. The identities users are hidden behind pseudonyms (public keys) recommended be changed frequently in order increase transaction unlinkability.
Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard trace their origin it can also provide receiver privacy for Internet services through a feature called "hidden services". In this paper we expose flaws both in design and implementation Tor's hidden that allow an attacker measure popularity arbitrary services, take down deanonymize services. We give practical evaluation our techniques by...
Bit coin is a decentralized P2P digital currency in which coins are generated by distributed set of miners and transactions broadcasted via peer-to-peer network. While provides some level anonymity (or rather pseudonymity) encouraging the users to have any number random-looking addresses, recent research shows that this low. This encourages connect network through anonymizers like Tor motivates development default functionality for popular mobile SPV clients. In paper we show combining...
We present a new hash function Argon2, which is oriented at protection of low-entropy secrets without secret keys. It requires certain (but tunable) amount memory, imposes prohibitive time-memory and computation-memory tradeoffs on memory-saving users, exceptionally fast regular PC. Overall, it can provide ASIC-and botnet-resistance by filling the memory in 0.6 cycles per byte non-compressible way.
Tor hidden services allow running Internet while protecting the location of servers. Their main purpose is to enable freedom speech even in situations which powerful adversaries try suppress it. However, providing privacy and client anonymity also makes an attractive platform for every kind imaginable shady service. The ease with can be set up has spurred a huge growth anonymously provided both types. In this paper we analyse landscape services. We have studied 39824 service descriptors...
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey GPU-, ASIC-, botnet-equipped users. The attempts to rely on memory-intensive computations order remedy disparity between architectures have resulted slow or broken schemes. In this paper we solve open problem show how construct asymmetric proof-of-work (PoW) based computationally-hard problem, which requires great deal...
Bitcoin, introduced in 2008 and launched 2009, is the first digital currency to solve double spending problem without relying on a trusted third party. Bitcoin provides way transact any intermediary, but its privacy guarantees are questionable. Despite fact that addresses not linked identity, multiple deanonymization attacks have been proposed. Alternative cryptocurrencies such as Dash, Monero, Zcash aim provide stronger by using sophisticated cryptographic techniques obfuscate transaction...