| Publication | Date of Publication | Type |
|---|
Two-party GOST signature scheme Matematicheskie Voprosy Kriptografii | 2024-09-05 | Paper |
On blindness of several ElGamal-type blind signatures Prikladnaya Diskretnaya Matematika | 2024-05-02 | Paper |
О стойкости режима аутентифицированного шифрования с дополнительными данными MGM к угрозе нарушения конфиденциальности;On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threat Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2024-02-23 | Paper |
$\mathsf{sMGM}$: parameterizable AEAD mode Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2023-09-20 | Paper |
On the (im)possibility of secure ElGamal blind signatures Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2023-09-20 | Paper |
IQRA: Incremental Quadratic Re-keying friendly Authentication scheme Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2023-01-19 | Paper |
Improving the security of ElGamal-type signatures Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2022-04-21 | Paper |
On methods of shortening ElGamal-type signatures Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2022-04-21 | Paper |
Secure implementation of digital signature using semi-trusted computational core Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2022-04-21 | Paper |
| Impact of randomization in VKO mechanisms on overall security level | 2022-04-06 | Paper |
Practical significance of security bounds for standardized internally re-keyed block cipher modes Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-23 | Paper |
On construction of correlation-immune functions via minimal functions Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
A review of the password authenticated key exchange protocols vulnerabilities and principles of the \textit{SESPAKE} protocol construction Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro key meshing Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
On cryptographic properties of the \(CVV\) and \(PVV\) parameters generation procedures in payment systems Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
On the security properties of Russian standardized elliptic curves Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
On the performance of one perspective LSX-based block cipher Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012 Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
| On internal re-keying | 2021-07-06 | Paper |
| On security of the SESPAKE protocol | 2021-04-27 | Paper |
DATA STORAGE SECURITY AND FULL DISK ENCRYPTION Prikladnaya Diskretnaya Matematika | 2021-02-17 | Paper |
| scientific article; zbMATH DE number 7310064 (Why is no real title available?) | 2021-02-15 | Paper |
Generalization of one method of a filter generator key recovery Discrete Mathematics and Applications | 2019-09-04 | Paper |
Solving systems of linear Boolean equations with noisy right-hand sides over the reals Discrete Mathematics and Applications | 2018-04-23 | Paper |
Classification of correlation-immune and minimal correlation-immune Boolean functions of 4 and 5 variables Discrete Mathematics and Applications | 2016-09-13 | Paper |
On some algebraic and combinatorial properties of correlation-immune Boolean functions Discrete Mathematics and Applications | 2010-11-17 | Paper |