Papers by Avtandil Gagnidze
Developing Security Recommender System Using Content-Based Filtering Mechanisms
Lecture notes on data engineering and communications technologies, 2023

International Journal of Cyber-Security and Digital Forensics, 2018
Active work is being done to create and develop quantum computers. Traditional digital signature ... more Active work is being done to create and develop quantum computers. Traditional digital signature systems that are used in practice are vulnerable to quantum computers attacks. The security of these systems is based on the problem of factoring large numbers and calculating discrete logarithms. Scientists are working on the development of alternatives to RSA, which are protected from attacks by quantum computer. One of the alternatives are hash based digital signature schemes. In the article hash based one-time signatures are considered, their analysis and comparison are done. It is shown that, using Winternitz one-time signature scheme, the length of the signature and of the keys is substantially reduced. But also this scheme has disadvantages, in the case of generating keys, creating a signature and verifying a signature, one-way function should be used much more times, then in Lamport signature scheme. So, must be paid serious attention at the choice of this function, it should be quickly executed and safe.

Journal of Business
Various types of recent research point out the fact that Georgia’s energy sector (and in particu... more Various types of recent research point out the fact that Georgia’s energy sector (and in particular hydro energy sector) is one of the most attractive ones when it comes to investment opportunities. Hydro power remains the cheapest and the most “ecofriendly” source of power for Georgia. An essential part of Georgia’s hydro energy potential is still untapped (in fact, the current electricity generation represents just about 40% of Georgia’s estimated annual hydropower output potential). Currently, Ministry of Energy of Georgia has more than 60 HPP projects available for investment. For every potential investor, it is of vital importance to have general knowledge about what to expect from the desired sector, what the risks that could hurt the success of the investment are and if the expected rate of return equals or exceeds his or her required rate of return. This article is based on our previous article and develops three different scenarios forinvestment opportunities in Georgia’s ...
Russian Mathematical Surveys, 1984
We report experimental evidence for a weak first-order nematic-nematic transition in thin (∼ 1-2 ... more We report experimental evidence for a weak first-order nematic-nematic transition in thin (∼ 1-2 µm) cells of the strongly polar nematogen, p-cyanophenyl p-n heptylbenzoate. The transition temperature TNN increases as the thickness of the cell decreases indicating that, in the bulk, this transition may occur at temperatures well below the ambient one. Optical and dielectric measurements of the order parameters in thin cells show that there is considerable enhancement compared to the bulk values. TNN can be increased significantly by moderate electric and magnetic fields. The transition probably indicates a jump in the concentration of neighbours with antiparallel configurations compared to those with parallel configurations. The results imply that the order parameter coherence length in the compound is relatively large.
Real Time Self-developing Cybersecurity Function for 5G
Lecture notes in networks and systems, 2022
Georgian Mathematical Journal, 1998
The heat equation with a small parameter, (1 + ε −m χ(x ε))ut = uxx, is considered, where ε ∈ (0,... more The heat equation with a small parameter, (1 + ε −m χ(x ε))ut = uxx, is considered, where ε ∈ (0, 1), m < 1 and χ is a finite function. A complete asymptotic expansion of the solution in powers ε is constructed.

Time-Series Forecasting of Bicoin Prices
Since 2008, when the cryptocurrency was first introduced under the name Satoshi Nakamoto, more an... more Since 2008, when the cryptocurrency was first introduced under the name Satoshi Nakamoto, more and more people are interested in the «new money» – Bitcoin. Bitcoin is the first cryptocurrency and although many other cryptocurrencies were created and will be created in the future, Bitcoin remains the most popular cryptocurrency to this day. Naturally, along with the rapid growth of information technologies and their applications, many new «computerized» currencies will emerge. Because anyone can buy and sell cryptocurrency (e.g. bitcoin) and, thus, cryptocurrency is a subject of trade, hence cryptocurrency and in particular bitcoin is a product. Naturally, questions arise about the determinants of cryptocurrency price changes. In particular: Are the changes in the prices of cryptocurrency (and in particular Bitcoin) related to the development trends of the global economy? Are changes in the prices of cryptocurrency (and in particular Bitcoin) related to indicators of the state of the...
Time-Series Forecasting of Bitcoin Prices
Collection of Scientific Papers, Apr 4, 2021
Journal of Soviet Mathematics, 1990
The dependence of the uniqueness classes of the solutions of boundary value problems for second-o... more The dependence of the uniqueness classes of the solutions of boundary value problems for second-order parabolic equations on the coefficients of the equation and on the geometry of an unbounded domain is investigated. C~Dn+ 1 We consider the unbounded domain ~ ~x,t , included between the planes {x, ~:t=0} and ~, l:t=T}, T=cons[>0, and a surface y. Assume that the boundary of the domain m is such that a~=~0U~TU~, where ~0=O~n{x, t:t:=0}, ~T=O~N{x, t:t=T}and ~=O~n{x, l:O<l<Y}. We assume that the surface y is such that it does not intersect anywhere a plane of the form {x, t:t =const}. We
General boundary value problems are considered for general parabolic (in the Douglas-Nirenberg-So... more General boundary value problems are considered for general parabolic (in the Douglas-Nirenberg-Solonnikov sense) systems. The dependence of solution uniqueness classes of these problems on the geometry of a nonbounded domain is established.
Springer Handbook of Optical Networks
Springer Handbooks, 2020
EURASIAN JOURNAL OF BUSINESS AND MANAGEMENT http://www.eurasianpublications.com SOME ASPECTS OF POST-QUANTUM CRYPTOSYSTEMS*
The article describes alternatives to RSA system, resistant to quantum attacks. There are describ... more The article describes alternatives to RSA system, resistant to quantum attacks. There are described Hash-based Digital Signature Schemes and McEliece system, based on the theory of algebraic coding. We analyzed their advantages and disadvantages, and considered some of the attacks on these systems. It is shown that today we are not prepared to transfer cryptosystems to post-quantum era.
Use of Content-Filtering Method for Hardware Vulnerabilities Identification System
2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)

Advances in Computer Science for Engineering and Education IV, 2021
Content filtering systems today are helping the users to find the most relevant content based on ... more Content filtering systems today are helping the users to find the most relevant content based on their needs and interests. The recommender systems are widely used for content filtering by different web platforms like online shops, movie or travel databases, educational systems and many more. The security of users is extremely important for any digital system today. Hackers are performing attacks using different techniques and approaches. Very commonly the targets of the attacks are hardware-based systems. Much more effective results can be achieved with the machine learning mechanisms built into the existing recommendation systems. Such approach will significantly increase the level of security for hardware-based systems. The concepts used in content-based mechanisms often relies on information retrieval systems. These information retrieval systems are providing the user with relevant search results and together with that are analyzing the behavior of the user to determine how useful was the result of the user search query. Content-based recommendation system model can be applied to security mechanisms used today. The web-based system developed in the frame of our research uses built-in filtering mechanism to calculate term frequency from user input and provides end user with relevant content. The main advantage of such system is interaction with concrete user cases. It needs to be considered, that content-based systems cannot work fully with capturing of inter-dependencies and more complex actions from user-side. And this is a great field of the research for scientist worldwide.

Data encryption is the classical way of ensuring the various types of the sensitive data. The glo... more Data encryption is the classical way of ensuring the various types of the sensitive data. The global release of quantum computers is expected in the near future. Quantum computers have the ability to break the existing classical digital signatures. Because, the classical digital signature schemes are vulnerable to the attacks of quantum computers. This fact involves the different research efforts that look for digital signatures that are secure against quantum computer-based attacks. In the paper, we analyze some digital signature schemes, which are secure against attack of quantum computers. The described schemes have various efficiency problems. Merkle signature scheme is analyzed, it’s great problem is the very big size of the key pair. The paper analyzes the quantum key distribution protocols. BB84 key distribution protocol is described and analyzed. In the paper, we offer the novel scheme with reduced size of the key. The security of the scheme is analyzed. The key of the novel...

Analysis of one-time signature schemes
Active work is being done to create and develop quantum computers. Traditional digital signature ... more Active work is being done to create and develop quantum computers. Traditional digital signature systems that are used in practice are vulnerable to quantum computers attacks. The security of these systems is based on the problem of factoring large numbers and calculating discrete logarithms. Scientists are working on the development of alternatives to RSA, which are protected from attacks by quantum computer. One of the alternatives are hash based digital signature schemes. In the article hash based one-time signatures are considered, their analysis and comparison are done. It is shown that, using Winternitz one-time signature scheme, the length of the signature and of the keys is substantially reduced. But this scheme also has disadvantages, in the case of generating keys, creating a signature and verifying a signature, oneway function should be used much more times, than in Lamport signature scheme. So, as we see, must be paid serious attention at the choice of this function, it ...

Active work is performed to create quantum computers. Quantum computers can break existing public... more Active work is performed to create quantum computers. Quantum computers can break existing public key cryptography. So they can break Diffie-Hellman key exchange protocol. Matrix algorithms of key exchange can be considered as the alternative to Diffie-Hellman key exchange protocol. The improved method of key-exchange protocol is offered in the article. The method deals with the original matrix one-way function and the generalized method of processing the corresponding high order matrix multiplicative finite commutative group. The general method of the insertion-enlarging method of building the primitive elements of the field is derived from elements of the matrix groups with different power. The article describes the results that give us the prospect of generating the high order multiplicative Abelian matrix groups and of creating key-exchange protocol, resistant to quantum computers attacks by means of this groups. Keywords— Matrix One-way Function, Abelian Finite Field, Asymmetri...

Scientists are actively working on the creation of quantum computers. Quantum computers can easil... more Scientists are actively working on the creation of quantum computers. Quantum computers can easily solve the problem of factoring the large numbers. As the result of it quantum computers are able to break the crypto system RSA, which is used in many products. Hash based digital signatures are the alternative to RSA. These systems use cryptographic hash function. The security of these systems depends on the resistance to collisions of the hash functions that they use. The paper analyzes hash based digital signature schemes. It is shown, that hash and one way functions must be used many times during the implementation of the hash based digital signature schemes. Great attention must be paid on the security and the efficiency of these functions. Hash functions are considered to be resistant to quantum computer attacks, but the Grover algorithm allows us to achieve quadratic acceleration in the search algorithms. It means that hash functions must be complicated to be secure against quan...

Quantum computers are able to destroy most, if not absolutely all conventional cryptosystems that... more Quantum computers are able to destroy most, if not absolutely all conventional cryptosystems that are widely used in practice, specifically, systems based on the problem of factoring integers (e.g., RSA). Some cryptosystems like RSA system with 4 000bit keys are considered useful to protect classic computers from attacks, but probably absolutely useless against attacks on quantum computers. One of the alternatives are post-quantum systems, systems based on lattices. These systems are known for high security levels based on the worst-case hardness. They are based on the complexity of the problems grids, the main of which is the problem of the shortest vector (SVP). In fact, we consider the approximate option when we find a lattice vector, with the length of (n) times more than the shortest nonzero vector. ±(n) is the approximation coefficient, n is the lattice size. The best known algorithm for grids problems is LLL algorithm. This algorithm needs polynomial time with approximation ...

Based on the researches, usually users are not familiar with different security mechanisms of the... more Based on the researches, usually users are not familiar with different security mechanisms of the systems and do not understand how to use them in everyday life. Special research field analyzing user behavior in the technological systems and in computer security world is called human computer interaction (HCI), is also known as usable security. TLS or Transport Layer Security is one of the most commonly used secure protocols today. It is used to protect data that travels between client and server using HTTPS. Data protection is critical issue, especially when users are sending sensitive information. TLS uses cryptographic algorithms to protect data transmitted via HTTPS protocol. In this paper we will offer balanced and more userfriendly generation process of one of the most frequently used security mechanism on websites Transport Layer Security (TLS) certificate for establishing HTTPS connection between client and server. Our system will check all the requirements of the website an...
Uploads
Papers by Avtandil Gagnidze