|
|
Publications in Math-Net.Ru
-
How to protect integrity of $2^{75}$ blocks using the Magma cipher and a single key?
Mat. Vopr. Kriptogr., 16:2 (2025), 25–58
-
WOTS-BC — Winternitz signature scheme based on lightweight block ciphers
Prikl. Diskr. Mat. Suppl., 2025, no. 18, 137–146
-
About «$k$-bit security» of MACs based on hash function Streebog
Mat. Vopr. Kriptogr., 15:2 (2024), 47–68
-
On the security aspects of protocol CRISP
Mat. Vopr. Kriptogr., 15:1 (2024), 57–81
-
“Sandwich”-like keyed algorithm based on the “Streebog” hash function
Prikl. Diskr. Mat., 2024, no. 63, 24–48
-
Keyed Streebog is a secure PRF and MAC
Mat. Vopr. Kriptogr., 14:2 (2023), 77–96
-
Related-key attacks on the compression function of Streebog
Mat. Vopr. Kriptogr., 14:2 (2023), 59–76
-
Key-recovery security of keyed hash functions based on GOST 34.11-2018 (“Streebog”)
Prikl. Diskr. Mat. Suppl., 2023, no. 16, 96–98
-
Streebog compression function as PRF in secret-key settings
Mat. Vopr. Kriptogr., 13:2 (2022), 99–116
-
An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers
Mat. Vopr. Kriptogr., 12:2 (2021), 93–109
-
Related-key attack on 5-round Kuznyechik
Mat. Vopr. Kriptogr., 11:2 (2020), 53–67
-
Exact maximum expected differential and linear probability for $2$-round Kuznyechik
Mat. Vopr. Kriptogr., 10:2 (2019), 107–116
© , 2026