RUS  ENG
Full version
PEOPLE

Alekseev Evgeny Konstantinovich

Publications in Math-Net.Ru

  1. Two-party GOST signature scheme

    Mat. Vopr. Kriptogr., 15:2 (2024),  7–28
  2. Forcing future public ephemeral keys to attack authenticated key establishment protocols

    Prikl. Diskr. Mat., 2024, no. 66,  60–77
  3. Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols

    Prikl. Diskr. Mat. Suppl., 2024, no. 17,  51–57
  4. On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threat

    Mat. Vopr. Kriptogr., 14:3 (2023),  49–73
  5. On the (im)possibility of secure ElGamal blind signatures

    Mat. Vopr. Kriptogr., 14:2 (2023),  25–42
  6. $\mathsf{sMGM}$: parameterizable AEAD mode

    Mat. Vopr. Kriptogr., 14:2 (2023),  7–24
  7. On blindness of several ElGamal-type blind signatures

    Prikl. Diskr. Mat., 2023, no. 62,  13–20
  8. IQRA: Incremental Quadratic Re-keying friendly Authentication scheme

    Mat. Vopr. Kriptogr., 13:3 (2022),  5–35
  9. Secure implementation of digital signature using semi-trusted computational core

    Mat. Vopr. Kriptogr., 12:4 (2021),  5–23
  10. Improving the security of ElGamal-type signatures

    Mat. Vopr. Kriptogr., 12:3 (2021),  5–30
  11. On methods of shortening ElGamal-type signatures

    Mat. Vopr. Kriptogr., 12:2 (2021),  75–91
  12. Impact of randomization in VKO mechanisms on overall security level

    Prikl. Diskr. Mat., 2021, no. 54,  77–93
  13. On security of the SESPAKE protocol

    Prikl. Diskr. Mat., 2020, no. 50,  5–41
  14. Data storage security and full disk encryption

    Prikl. Diskr. Mat., 2020, no. 49,  78–97
  15. Practical significance of security bounds for standardized internally re-keyed block cipher modes

    Mat. Vopr. Kriptogr., 10:2 (2019),  31–46
  16. On the security properties of Russian standardized elliptic curves

    Mat. Vopr. Kriptogr., 9:3 (2018),  5–32
  17. On cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systems

    Mat. Vopr. Kriptogr., 9:2 (2018),  23–46
  18. On construction of correlation-immune functions via minimal functions

    Mat. Vopr. Kriptogr., 9:2 (2018),  7–22
  19. Generalization of one method of a filter generator key recovery

    Diskr. Mat., 29:4 (2017),  3–27
  20. Solving systems of linear Boolean equations with noisy right-hand sides over the reals

    Diskr. Mat., 29:1 (2017),  3–9
  21. On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing

    Mat. Vopr. Kriptogr., 8:2 (2017),  39–50
  22. A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction

    Mat. Vopr. Kriptogr., 7:4 (2016),  7–28
  23. On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012

    Mat. Vopr. Kriptogr., 7:1 (2016),  5–38
  24. Classification of correlation-immune and minimal correlation-immune Boolean functions of 4 and 5 variables

    Diskr. Mat., 27:1 (2015),  22–33
  25. On the performance of one perspective LSX-based block cipher

    Mat. Vopr. Kriptogr., 6:2 (2015),  7–17
  26. On some measures of nonlinearity for Boolean functions

    Prikl. Diskr. Mat., 2011, no. 2(12),  5–16
  27. On some algebraic and combinatorial properties of correlation-immune Boolean functions

    Diskr. Mat., 22:3 (2010),  110–126


© Steklov Math. Inst. of RAS, 2026