Stanislav Smyshlyaev

Orcid: 0000-0001-8586-5959

According to our database1, Stanislav Smyshlyaev authored at least 24 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The threat of forcing the identical roles for authenticated key establishment protocols.
J. Comput. Virol. Hacking Tech., June, 2024

Two-party GOST in two parts: fruitless search and fruitful synthesis.
IACR Cryptol. ePrint Arch., 2024

2023
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3.
RFC, February, 2023

2022
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.2.
RFC, March, 2022

Misuse-resistant MGM2 mode.
IACR Cryptol. ePrint Arch., 2022

sMGM: parameterizable AEAD-mode.
IACR Cryptol. ePrint Arch., 2022

On the (im)possibility of ElGamal blind signatures.
IACR Cryptol. ePrint Arch., 2022

2021
Multilinear Galois Mode (MGM).
RFC, June, 2021

On methods of shortening ElGamal-type signatures.
IACR Cryptol. ePrint Arch., 2021

On Cryptographic Properties of the NB-Fi Protocol.
Autom. Control. Comput. Sci., 2021

2020
Randomness Improvements for Security Protocols.
RFC, October, 2020

On Internal Re-keying.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

Limiting the impact of unreliable randomness in deployed security protocols.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Re-keying Mechanisms for Symmetric Keys.
RFC, August, 2019

2018
Security Analysis for Randomness Improvements for Security Protocols.
IACR Cryptol. ePrint Arch., 2018

Security bound for CTR-ACPKM internally re-keyed encryption mode.
IACR Cryptol. ePrint Arch., 2018

2017
The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol.
RFC, March, 2017

Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying.
IACR Cryptol. ePrint Arch., 2017

2016
Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012.
RFC, March, 2016

On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing.
IACR Cryptol. ePrint Arch., 2016

2015
On the Security of One Password Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2015

2012
Perfectly Balanced Boolean Functions and Golić Conjecture.
J. Cryptol., 2012

2009
Symbolic Dynamics, Codes, and Perfectly Balanced Functions.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Perfectly Balanced Functions in Symbolic Dynamics.
IACR Cryptol. ePrint Arch., 2009


  Loading...