default search action
Stanislav Smyshlyaev
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j3]Evgeniy K. Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev:
The threat of forcing the identical roles for authenticated key establishment protocols. J. Comput. Virol. Hacking Tech. 20(2): 225-230 (2024) - 2021
- [j2]Evgeny K. Alekseev, Liliya R. Akhmetzyanova, V. D. Nikolaev, Stanislav V. Smyshlyaev, A. I. Bondarenko:
On Cryptographic Properties of the NB-Fi Protocol. Autom. Control. Comput. Sci. 55(8): 1180-1187 (2021) - 2012
- [j1]Stanislav Smyshlyaev:
Perfectly Balanced Boolean Functions and Golić Conjecture. J. Cryptol. 25(3): 464-483 (2012)
Conference and Workshop Papers
- 2020
- [c2]Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan:
Limiting the impact of unreliable randomness in deployed security protocols. CSF 2020: 277-287 - [c1]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav Smyshlyaev, Igor B. Oshkin:
On Internal Re-keying. SSR 2020: 23-45
Parts in Books or Collections
- 2009
- [p1]Oleg A. Logachev, Alexei A. Salnikov, Stanislav V. Smyshlyaev, Valery V. Yashchenko:
Symbolic Dynamics, Codes, and Perfectly Balanced Functions. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 222-233
Informal and Other Publications
- 2024
- [i19]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev:
Two-party GOST in two parts: fruitless search and fruitful synthesis. IACR Cryptol. ePrint Arch. 2024: 89 (2024) - 2023
- [i18]Stanislav Smyshlyaev, Evgeny K. Alekseev, Ekaterina Griboedova, Alexandra Babueva, Lidiia Nikiforova:
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3. RFC 9367: 1-71 (2023) - 2022
- [i17]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Stanislav Smyshlyaev:
On the (im)possibility of ElGamal blind signatures. IACR Cryptol. ePrint Arch. 2022: 1128 (2022) - [i16]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev:
sMGM: parameterizable AEAD-mode. IACR Cryptol. ePrint Arch. 2022: 1291 (2022) - [i15]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev:
Misuse-resistant MGM2 mode. IACR Cryptol. ePrint Arch. 2022: 1590 (2022) - [i14]Stanislav Smyshlyaev, Dmitry Belyavsky, Evgeny K. Alekseev:
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.2. RFC 9189: 1-92 (2022) - 2021
- [i13]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Stanislav Smyshlyaev:
On methods of shortening ElGamal-type signatures. IACR Cryptol. ePrint Arch. 2021: 148 (2021) - [i12]Stanislav Smyshlyaev, Vladislav Nozdrunov, Vasily Shishkin, Ekaterina Griboedova:
Multilinear Galois Mode (MGM). RFC 9058: 1-25 (2021) - 2020
- [i11]Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan, Christopher A. Wood:
Randomness Improvements for Security Protocols. RFC 8937: 1-9 (2020) - 2019
- [i10]Stanislav Smyshlyaev:
Re-keying Mechanisms for Symmetric Keys. RFC 8645: 1-69 (2019) - 2018
- [i9]Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev:
Security bound for CTR-ACPKM internally re-keyed encryption mode. IACR Cryptol. ePrint Arch. 2018: 950 (2018) - [i8]Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev:
Security Analysis for Randomness Improvements for Security Protocols. IACR Cryptol. ePrint Arch. 2018: 1057 (2018) - 2017
- [i7]Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev:
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying. IACR Cryptol. ePrint Arch. 2017: 697 (2017) - [i6]Stanislav Smyshlyaev, Evgeny K. Alekseev, Igor B. Oshkin, Vladimir Popov:
The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol. RFC 8133: 1-51 (2017) - 2016
- [i5]Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina:
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing. IACR Cryptol. ePrint Arch. 2016: 628 (2016) - [i4]Stanislav Smyshlyaev, Evgeny K. Alekseev, Igor B. Oshkin, Vladimir Popov, Serguei Leontiev, Vladimir Podobaev, Dmitry Belyavsky:
Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012. RFC 7836: 1-32 (2016) - 2015
- [i3]Stanislav Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova:
On the Security of One Password Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2015: 1237 (2015) - 2010
- [i2]Stanislav Smyshlyaev:
Perfectly Balanced Boolean Functions and Golic Conjecture. IACR Cryptol. ePrint Arch. 2010: 415 (2010) - 2009
- [i1]Oleg A. Logachev, A. A. Salnikov, Stanislav Smyshlyaev, V. V. Yashchenko:
Perfectly Balanced Functions in Symbolic Dynamics. IACR Cryptol. ePrint Arch. 2009: 296 (2009)
Coauthor Index
aka: Evgeniy K. Alekseev
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint