|
|
Publications in Math-Net.Ru
-
Two-party GOST signature scheme
Mat. Vopr. Kriptogr., 15:2 (2024), 7–28
-
Forcing future public ephemeral keys to attack authenticated key establishment protocols
Prikl. Diskr. Mat., 2024, no. 66, 60–77
-
Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols
Prikl. Diskr. Mat. Suppl., 2024, no. 17, 51–57
-
On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threat
Mat. Vopr. Kriptogr., 14:3 (2023), 49–73
-
On the (im)possibility of secure ElGamal blind signatures
Mat. Vopr. Kriptogr., 14:2 (2023), 25–42
-
$\mathsf{sMGM}$: parameterizable AEAD mode
Mat. Vopr. Kriptogr., 14:2 (2023), 7–24
-
On blindness of several ElGamal-type blind signatures
Prikl. Diskr. Mat., 2023, no. 62, 13–20
-
IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
Mat. Vopr. Kriptogr., 13:3 (2022), 5–35
-
Secure implementation of digital signature using semi-trusted computational core
Mat. Vopr. Kriptogr., 12:4 (2021), 5–23
-
Improving the security of ElGamal-type signatures
Mat. Vopr. Kriptogr., 12:3 (2021), 5–30
-
On methods of shortening ElGamal-type signatures
Mat. Vopr. Kriptogr., 12:2 (2021), 75–91
-
Impact of randomization in VKO mechanisms on overall security level
Prikl. Diskr. Mat., 2021, no. 54, 77–93
-
On security of the SESPAKE protocol
Prikl. Diskr. Mat., 2020, no. 50, 5–41
-
Data storage security and full disk encryption
Prikl. Diskr. Mat., 2020, no. 49, 78–97
-
Practical significance of security bounds for standardized internally re-keyed block cipher modes
Mat. Vopr. Kriptogr., 10:2 (2019), 31–46
-
On the security properties of Russian standardized elliptic curves
Mat. Vopr. Kriptogr., 9:3 (2018), 5–32
-
On cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systems
Mat. Vopr. Kriptogr., 9:2 (2018), 23–46
-
On construction of correlation-immune functions via minimal functions
Mat. Vopr. Kriptogr., 9:2 (2018), 7–22
-
Generalization of one method of a filter generator key recovery
Diskr. Mat., 29:4 (2017), 3–27
-
Solving systems of linear Boolean equations with noisy right-hand sides over the reals
Diskr. Mat., 29:1 (2017), 3–9
-
On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
Mat. Vopr. Kriptogr., 8:2 (2017), 39–50
-
A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction
Mat. Vopr. Kriptogr., 7:4 (2016), 7–28
-
On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
Mat. Vopr. Kriptogr., 7:1 (2016), 5–38
-
Classification of correlation-immune and minimal correlation-immune Boolean functions of 4 and 5 variables
Diskr. Mat., 27:1 (2015), 22–33
-
On the performance of one perspective LSX-based block cipher
Mat. Vopr. Kriptogr., 6:2 (2015), 7–17
-
On some measures of nonlinearity for Boolean functions
Prikl. Diskr. Mat., 2011, no. 2(12), 5–16
-
On some algebraic and combinatorial properties of correlation-immune Boolean functions
Diskr. Mat., 22:3 (2010), 110–126
© , 2026