Follow
Maksim Iavich
Maksim Iavich
Caucasus University
Verified email at cu.edu.ge
Title
Cited by
Cited by
Year
High-speed and secure PRNG for cryptographic applications
Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich
International Journal of Computer Network and Information Security 12 (3), 1-10, 2020
722020
Ýëåêòðîííûé ó÷åáíèê, åãî ïðåèìóùåñòâà è íåäîñòàòêè
ÌÏ ßâè÷
Ñîâðåìåííûå íàó÷íûå èññëåäîâàíèÿ è èííîâàöèè, 4-4, 2012
392012
Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems
E Jintcharadze, M Iavich
2020 IEEE East-West Design & Test Symposium (EWDTS), 1-5, 2020
382020
Novel Version of Merkle Cryptosystem
A Gagnidze, M Iavich, G Iashvili
Bull. Georg. Natl. Acad. Sci 11 (4), 28-33, 2017
322017
The novel system of attacks detection in 5G
M Iavich, S Gnatyuk, R Odarchenko, R Bocu, S Simonov
International Conference on Advanced Information Networking and Applications …, 2021
302021
Lattice based merkle.
M Iavich, A Gagnidze, G Iashvili, S Gnatyuk, V Vialkova
IVUS, 13-16, 2019
282019
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks.
S Gnatyuk, V Kinzeryavyy, M Iavich, D Prysiazhnyi, K Yubuzova
Proceedings of the 14th International Conference on ICT in Education …, 2018
282018
Hybrid encryption model of AES and ElGamal cryptosystems for flight control systems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, R Odarchenko
2018 IEEE 5th International Conference on Methods and Systems of Navigation …, 2018
232018
Efficient and secure digital signature scheme for post quantum epoch
M Iavich, G Iashvili, S Gnatyuk, A Tolbatov, L Mirtskhulava
Information and Software Technologies: 27th International Conference, ICIST …, 2021
212021
Cyber security European standards in business
M Iavich, S Gnatyuk, G Fesenko
Scientific and practical cyber security journal, 2019
192019
High-Speed Privañy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Z Hu, S Gnatyuk, T Okhrimenko, V Kinzeryavyy, M Iavich, K Yubuzova
ICTERI Workshops, 810-821, 2019
192019
Practices of using blockchain technology in ICT under the digitalization of the world economy
N Kraus
Proceedings of the International Workshop on Conflict Management in Global …, 2019
182019
Analysis of Post-Quantum Cryptography Use in Practice
A Gagnidze, M Iavich, G Iashvili
Bull. Georg. Natl. Acad. Sci 11 (2), 2017
182017
Some Aspects Of Post-Quantum Cryptosystems
A Gagnidze, M Iavich, G Iashvili
Eurasian journal of business and management 5 (1), 16-20, 2017
172017
Novel certification method for quantum random number generators
M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko
International Journal of Computer Network and Information Security 13 (3), 28-38, 2021
152021
Securing medical data in 5G and 6G via multichain blockchain technology using post-quantum signatures
L Mirtskhulava, M Iavich, M Razmadze, N Gulua
2021 IEEE International Conference on Information and Telecommunication …, 2021
142021
Intruder control mode simulation of deterministic quantum cryptography protocol for depolarized quantum channel
S Gnatyuk, T Okhrimenko, M Iavich, R Berdibayev
2019 IEEE International Scientific-Practical Conference Problems of …, 2019
142019
Combined system of phase synchronization with increased astatism order in frequency monitoring mode
O Turovsky, Y Khlaponin, MMA Hassan, T Okhrimenko, I Goncharenko, ...
CEUR Workshop Proceedings, 53-62, 2020
132020
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ...
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019
132019
Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. Ó 2020 IEEE East-West Design & Test Symposium (EWDTS)
E Jintcharadze, M Iavich
IEEE. https://doi. org/10.1109/ewdts50664, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20