Stanislav Smyshlyaev

Stanislav Smyshlyaev

Москва, Москва, Россия
493 отслеживающих 487 контактов

Опыт работы

  • CryptoPro

  • -

  • -

  • -

  • -

Образование

Публикации

  • On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing

    Mat. Vopr. Kriptogr.

    Security bounds for the Magma cipher CTR encryption mode with the CryptoPro Key Meshing (CPKM) re-keying method are obtained for the standard security model and side channel information model. A modified re-keying method better than CPKM is proposed. Operational features of the Kuznyechik cipher CTR encryption mode for several re-keying methods are discussed.

    Другие авторы
    См. публикацию
  • RFC 8133: The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol

    This document describes the Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) protocol. The SESPAKE protocol provides password-authenticated key exchange for usage in systems for protection of sensitive information. The security proofs of the protocol were made for situations involving an active adversary in the channel, including man-in-the-middle (MitM) attacks and attacks based on the impersonation of one of the subjects.

    Другие авторы
    См. публикацию
  • A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction

    Mat. Vopr. Kriptogr.

    We consider a family of protocols permitting the parties sharing a weak key (a password) to generate a strong common key using the unprotected channel. It is supposed that to check the password correctness the adversary should interact with legitimate participants. A review of the known vulnerabilities of the protocols of the family considered is given. This review is used to explain the main principles of the SESPAKE protocol construction.

    Другие авторы
    См. публикацию
  • On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012

    Mat. Vopr. Kriptogr.

    For a number of commonly accepted models of eavesdropper the cryptographic properties of the algorithms accompanying the standards GOST R 34.11-2012 and GOST R 34.10-2012 are justified, namely, the algorithm generating the message autentication codes, algorithms generating pseudorandom sequences and key exchange algorithm. The conclusions on the security of these algorithms are based on the properties of the GOST R 34.11-2012 algorithm and on the classical complexity-theoretical problems…

    For a number of commonly accepted models of eavesdropper the cryptographic properties of the algorithms accompanying the standards GOST R 34.11-2012 and GOST R 34.10-2012 are justified, namely, the algorithm generating the message autentication codes, algorithms generating pseudorandom sequences and key exchange algorithm. The conclusions on the security of these algorithms are based on the properties of the GOST R 34.11-2012 algorithm and on the classical complexity-theoretical problems (decisional and computational Diffie – Hellman problems).

    Другие авторы
    См. публикацию
  • RFC 7836: Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012

    The purpose of this document is to make the specifications of the cryptographic algorithms defined by the Russian national standards GOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet community for their implementation in the cryptographic protocols based on the accompanying algorithms.

    These specifications define the pseudorandom functions, the key agreement algorithm based on the Diffie-Hellman algorithm and a hash function, the parameters of elliptic curves, the key…

    The purpose of this document is to make the specifications of the cryptographic algorithms defined by the Russian national standards GOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet community for their implementation in the cryptographic protocols based on the accompanying algorithms.

    These specifications define the pseudorandom functions, the key agreement algorithm based on the Diffie-Hellman algorithm and a hash function, the parameters of elliptic curves, the key derivation functions, and the key export functions.

    Другие авторы
    См. публикацию
  • On the performance of one perspective LSX-based block cipher

    Mat. Vopr. Kriptogr.

    We consider certain performance issues related to one block cipher scheme that is based on LSX transformations. A number of software implementation tweaks that manage to improve total speed characteristics are presented, helping to understand general performance properties of the proposed scheme.

    Другие авторы
    См. публикацию
  • Construction of RNG using random automata and one-way functions

    Mat. Vopr. Kriptogr.

  • On the invariance of perfect balancedness property under the choice of tapping sequence

    Mat. Vopr. Kriptogr.

    The property of perfect balancedness of k-valued functions is of primary importance for cryptographic properties of stream ciphers constructed with such functions. The problem of description of the set of perfectly balanced k-valued functions for which the property of perfect balancedness is preserved for any choice of tapping sequence is considered. For the case of 2-valued (Boolean) functions this problem was raised in 1996 by Golić and later addressed and fully solved in 2009 by the author.…

    The property of perfect balancedness of k-valued functions is of primary importance for cryptographic properties of stream ciphers constructed with such functions. The problem of description of the set of perfectly balanced k-valued functions for which the property of perfect balancedness is preserved for any choice of tapping sequence is considered. For the case of 2-valued (Boolean) functions this problem was raised in 1996 by Golić and later addressed and fully solved in 2009 by the author. Recently we obtained some results for the case of k-valued functions. A classification of the known results on this subject (both obtained earlier and new) is provided, open problems and questions are formulated.

    См. публикацию
  • Perfectly balanced k-valued functions and the Golić condition

    Discrete Mathematics and Applications

    Problems of k-valued logic generalisations of the Golic conjecture are considered. In the case of prime k, a number of results on correctness of the k-valued analogue of the Golic conjecture are obtained in many subcases. We also present a full proof of incorrectness of the k-valued analogue of the Golic conjecture in the case of composite k.

    См. публикацию
  • On ρ-balanced Boolean functions

    Discrete Mathematics and Applications

    Другие авторы
    • Oleg Logachev
    • Valery Yashchenko
    См. публикацию
  • Countermeasures against attacks on TLS protocol (in Russian)

    Highly available systems

    Другие авторы
    • Sergey Leontiev
    • Vladimir Popov
    См. публикацию
  • Boolean Functions in Coding Theory and Cryptology (2nd, 3rd editions, in Russian)

    URSS

    This book offers a systematic presentation of cryptographic and code-theoretic aspects of the theory of Boolean functions. Both classical and recent results are thoroughly presented. Prerequisites for the book include basic knowledge of linear algebra, group theory, theory of finite fields, combinatorics, and probability. The book can be used by research mathematicians and graduate students interested in discrete mathematics, coding theory, and cryptography.

    Другие авторы
    • Oleg Logachev
    • Alexey Salnikov
    • Valery Yashchenko
    См. публикацию
  • Providing Secure Key Access in Systems with Low Security Level (in Russian)

    Highly available systems

    Другие авторы
    • Ruslan Gilyazov
  • Boolean functions without prediction

    Discrete Mathematics and Applications

  • On Certain Issues of Logical Cryptanalysis of Hash Functions

    Mabit-2010 Proceedings, MCCME

    Другие авторы
    • Ruslan Gilyazov
    • Oleg Logachev
  • Barriers of perfectly balanced Boolean functions

    Discrete Mathematics and Applications

  • Logical Cryptanalysis of LILI-128 Stream Cipher (in Russian)

    Mabit-2009 Proceedings, MCCME

    Другие авторы
    • Oleg Logachev
  • New methods of investigation of perfectly balanced Boolean functions

    Discrete Mathematics and Applications

    Другие авторы
    • Oleg Logachev
    • Valery Yashchenko
    См. публикацию
  • Symbolic Dynamics, Codes and Perfectly Balanced Functions

    Proceedings of the NATO ARW on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

    Другие авторы
    • Oleg Logachev
    • Alexey Salnikov
    • Valery Yashchenko

Звания и награды

  • Presidental Grant for Ph.D. Students

    -

  • Presidental Grant for Ph.D. Students

    -

  • Honours Degree

    Lomonosov Moscow State University (MSU)

  • Presidental Grant for Students

    -

  • MSU Grant for Scientists (<35 years old)

    -

Языки

  • English

    Профессиональное владение

  • Russian

    Родной язык или второй родной язык

  • German

    Элементарное владение

Полученные рекомендации

См. полный профиль участника Stanislav

  • Найти общих знакомых
  • Попросить представить
  • Связаться с участником Stanislav напрямую
Присоединиться для просмотра полного профиля

Другие похожие профили

Получите новые навыки с помощью этих курсов