Maxim Deryabin
Maxim Deryabin
Samsung Advanced Institute of Technologies
Verified email at samsung.com - Homepage
Title
Cited by
Cited by
Year
Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem
NI Chervyakov, AS Molahosseini, PA Lyakhov, MG Babenko, ...
International journal of computer mathematics 94 (9), 1833-1849, 2017
362017
AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage
A Tchernykh, M Babenko, N Chervyakov, V Miranda-López, V Kuchukov, ...
International Journal of Approximate Reasoning 102, 60-73, 2018
252018
An efficient method of error correction in fault-tolerant modular neurocomputers
NI Chervyakov, PA Lyakhov, MG Babenko, AI Garyanina, IN Lavrinenko, ...
Neurocomputing 205, 32-44, 2016
252016
Towards mitigating uncertainty of data security breaches and collusion in cloud computing
A Tchernykh, M Babenko, N Chervyakov, JM Cortés-Mendoza, ...
2017 28th International Workshop on Database and Expert Systems Applications …, 2017
172017
Computation of positional characteristics of numbers in RNS based on approximate method
NI Chervyakov, MG Babenko, MA Deryabin, AS Nazarov, MN Shabalina
2016 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2016
102016
Использование модулярной арифметики для ускорения выполнения операций над числами большой разрядности
МА Дерябин, АА Зайцев
Вестник Уфимского государственного авиационного технического университета 17 …, 2013
102013
High performance parallel computing in residue number system
M Deryabin, N Chervyakov, A Tchernykh, M Babenko, M Shabalina
International Journal of Combinatorial Optimization Problems and Informatics …, 2018
92018
A high-speed division algorithm for modular numbers based on the chinese remainder theorem with fractions and its hardware implementation
N Chervyakov, P Lyakhov, M Babenko, A Nazarov, M Deryabin, ...
Electronics 8 (3), 261, 2019
72019
Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack
M Babenko, N Chervyakov, A Tchernykh, N Kucherov, M Deryabin, ...
2018 IEEE Conference of Russian Young Researchers in Electrical and …, 2018
62018
Development of Information Security's Theoretical Aspects in Cloud Technology with the Use of Threshold Structures
N Chervyakov, M Babenko, M Deryabin, A Garianina
2014 International Conference on Engineering and Telecommunication, 38-42, 2014
62014
Theoretic development of active security concept on elliptical curve
NI Chervyakov, MG Babenko, PA Lyakhov, YS Kiyashko, MA Deryabin
World Applied Sciences Journal 30 (11), 1566-1569, 2014
62014
Secure verifiable secret short sharing scheme for multi-cloud storage
M Deryabin, N Chervyakov, A Tchernykh, M Babenko, N Kucherov, ...
2018 International Conference on High Performance Computing & Simulation …, 2018
52018
Cryptanalysis of secret sharing schemes based on spherical spaces
NI Chervyakov, MG Babenko, MA Deryabin, AS Nazarov
2014 IEEE 8th International Conference on Application of Information and …, 2014
52014
Анализ метода параллельного преобразования чисел в систему остаточных классов
НИ Червяков, МА Дерябин, КС Шульженко
Современные технологии в нефтегазовом деле–2014: материалы международной …, 2014
52014
A new model to optimize the architecture of a fault-tolerant modular neurocomputer
NI Chervyakov, PA Lyakhov, MG Babenko, IN Lavrinenko, AV Lavrinenko, ...
Neurocomputing 303, 37-46, 2018
42018
Jitter calculation in Core IMS
BA Alassane, K Karim, NI Chervyakov, MA Deryabin, MG Babenko, ...
2016 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2016
42016
The ec sequences on points of an elliptic curve realization using neural networks
NI Chervyakov, MG Babenko, MA Deryabin, NN Kucherov, ...
Proceedings of the Second International Afro-European Conference for …, 2016
42016
Реализация алгоритма Монтгомери в системе остаточных классов на основе эффективного алгоритма расширения системы оснований
НИ Червяков, МА Дерябин, ИН Лавриненко
Нейрокомпьютеры: разработка, применение, 37-45, 2014
42014
Comparative performance analysis of information dispersal methods
M Deryabin, N Chervyakov, A Tchernykh, V Berezhnoy, A Djurabaev, ...
2019 24th Conference of Open Innovations Association (FRUCT), 67-74, 2019
32019
The development of secure mobile computing network based on secret sharing schemes
NI Chervyakov, MG Babenko, MA Deryabin, MN Shabalina, BA Alassane
2016 IEEE NW Russia Young Researchers in Electrical and Electronic …, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20