«I interacted with Stanislav in the science field, particularly in Maths and Cryptography. I would like to note that Stanislav has really high mathematical skills, as well as his sense of duty and responsibility in all aspects of our cooperation. I wish Stanislav great success in career and I'm sure he would be very valuable specialist in any team connected with cryptography, Maths, information security or IT.»
Stanislav Smyshlyaev
Москва, Москва, Россия
493 отслеживающих
487 контактов
Опыт работы
-
CryptoPro
-
-
-
-
-
-
-
-
Образование
Публикации
-
On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
Mat. Vopr. Kriptogr.
Security bounds for the Magma cipher CTR encryption mode with the CryptoPro Key Meshing (CPKM) re-keying method are obtained for the standard security model and side channel information model. A modified re-keying method better than CPKM is proposed. Operational features of the Kuznyechik cipher CTR encryption mode for several re-keying methods are discussed.
Другие авторыСм. публикацию -
RFC 8133: The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol
This document describes the Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) protocol. The SESPAKE protocol provides password-authenticated key exchange for usage in systems for protection of sensitive information. The security proofs of the protocol were made for situations involving an active adversary in the channel, including man-in-the-middle (MitM) attacks and attacks based on the impersonation of one of the subjects.
Другие авторыСм. публикацию -
A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction
Mat. Vopr. Kriptogr.
We consider a family of protocols permitting the parties sharing a weak key (a password) to generate a strong common key using the unprotected channel. It is supposed that to check the password correctness the adversary should interact with legitimate participants. A review of the known vulnerabilities of the protocols of the family considered is given. This review is used to explain the main principles of the SESPAKE protocol construction.
Другие авторыСм. публикацию -
On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
Mat. Vopr. Kriptogr.
For a number of commonly accepted models of eavesdropper the cryptographic properties of the algorithms accompanying the standards GOST R 34.11-2012 and GOST R 34.10-2012 are justified, namely, the algorithm generating the message autentication codes, algorithms generating pseudorandom sequences and key exchange algorithm. The conclusions on the security of these algorithms are based on the properties of the GOST R 34.11-2012 algorithm and on the classical complexity-theoretical problems…
For a number of commonly accepted models of eavesdropper the cryptographic properties of the algorithms accompanying the standards GOST R 34.11-2012 and GOST R 34.10-2012 are justified, namely, the algorithm generating the message autentication codes, algorithms generating pseudorandom sequences and key exchange algorithm. The conclusions on the security of these algorithms are based on the properties of the GOST R 34.11-2012 algorithm and on the classical complexity-theoretical problems (decisional and computational Diffie – Hellman problems).
Другие авторыСм. публикацию -
RFC 7836: Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012
The purpose of this document is to make the specifications of the cryptographic algorithms defined by the Russian national standards GOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet community for their implementation in the cryptographic protocols based on the accompanying algorithms.
These specifications define the pseudorandom functions, the key agreement algorithm based on the Diffie-Hellman algorithm and a hash function, the parameters of elliptic curves, the key…The purpose of this document is to make the specifications of the cryptographic algorithms defined by the Russian national standards GOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet community for their implementation in the cryptographic protocols based on the accompanying algorithms.
These specifications define the pseudorandom functions, the key agreement algorithm based on the Diffie-Hellman algorithm and a hash function, the parameters of elliptic curves, the key derivation functions, and the key export functions.Другие авторыСм. публикацию -
On the performance of one perspective LSX-based block cipher
Mat. Vopr. Kriptogr.
We consider certain performance issues related to one block cipher scheme that is based on LSX transformations. A number of software implementation tweaks that manage to improve total speed characteristics are presented, helping to understand general performance properties of the proposed scheme.
Другие авторыСм. публикацию -
Construction of RNG using random automata and one-way functions
Mat. Vopr. Kriptogr.
-
On the invariance of perfect balancedness property under the choice of tapping sequence
Mat. Vopr. Kriptogr.
The property of perfect balancedness of k-valued functions is of primary importance for cryptographic properties of stream ciphers constructed with such functions. The problem of description of the set of perfectly balanced k-valued functions for which the property of perfect balancedness is preserved for any choice of tapping sequence is considered. For the case of 2-valued (Boolean) functions this problem was raised in 1996 by Golić and later addressed and fully solved in 2009 by the author.…
The property of perfect balancedness of k-valued functions is of primary importance for cryptographic properties of stream ciphers constructed with such functions. The problem of description of the set of perfectly balanced k-valued functions for which the property of perfect balancedness is preserved for any choice of tapping sequence is considered. For the case of 2-valued (Boolean) functions this problem was raised in 1996 by Golić and later addressed and fully solved in 2009 by the author. Recently we obtained some results for the case of k-valued functions. A classification of the known results on this subject (both obtained earlier and new) is provided, open problems and questions are formulated.
-
Perfectly balanced k-valued functions and the Golić condition
Discrete Mathematics and Applications
Problems of k-valued logic generalisations of the Golic conjecture are considered. In the case of prime k, a number of results on correctness of the k-valued analogue of the Golic conjecture are obtained in many subcases. We also present a full proof of incorrectness of the k-valued analogue of the Golic conjecture in the case of composite k.
-
Countermeasures against attacks on TLS protocol (in Russian)
Highly available systems
-
Boolean Functions in Coding Theory and Cryptology (2nd, 3rd editions, in Russian)
URSS
This book offers a systematic presentation of cryptographic and code-theoretic aspects of the theory of Boolean functions. Both classical and recent results are thoroughly presented. Prerequisites for the book include basic knowledge of linear algebra, group theory, theory of finite fields, combinatorics, and probability. The book can be used by research mathematicians and graduate students interested in discrete mathematics, coding theory, and cryptography.
Другие авторы -
Providing Secure Key Access in Systems with Low Security Level (in Russian)
Highly available systems
Другие авторы -
On Certain Issues of Logical Cryptanalysis of Hash Functions
Mabit-2010 Proceedings, MCCME
Другие авторы -
Barriers of perfectly balanced Boolean functions
Discrete Mathematics and Applications
-
Logical Cryptanalysis of LILI-128 Stream Cipher (in Russian)
Mabit-2009 Proceedings, MCCME
Другие авторы -
New methods of investigation of perfectly balanced Boolean functions
Discrete Mathematics and Applications
-
Symbolic Dynamics, Codes and Perfectly Balanced Functions
Proceedings of the NATO ARW on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
Другие авторы
Звания и награды
-
Presidental Grant for Ph.D. Students
-
-
Presidental Grant for Ph.D. Students
-
-
Honours Degree
Lomonosov Moscow State University (MSU)
-
Presidental Grant for Students
-
-
MSU Grant for Scientists (<35 years old)
-
Языки
-
English
Профессиональное владение
-
Russian
Родной язык или второй родной язык
-
German
Элементарное владение
Полученные рекомендации
3 человека порекомендовали участника Stanislav
Присоединиться для просмотра