Evgeny K. Alekseev

Orcid: 0000-0002-1279-0359

According to our database1, Evgeny K. Alekseev authored at least 25 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The threat of forcing the identical roles for authenticated key establishment protocols.
J. Comput. Virol. Hacking Tech., June, 2024

Two-party GOST in two parts: fruitless search and fruitful synthesis.
IACR Cryptol. ePrint Arch., 2024

2023
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3.
RFC, February, 2023

AKE Zoo: 100 two-party protocols (to be continued).
IACR Cryptol. ePrint Arch., 2023

2022
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.2.
RFC, March, 2022

On blindness of several ElGamal-type blind signatures.
IACR Cryptol. ePrint Arch., 2022

Algorithms for switching between block-wise and arithmetic masking.
IACR Cryptol. ePrint Arch., 2022

Misuse-resistant MGM2 mode.
IACR Cryptol. ePrint Arch., 2022

sMGM: parameterizable AEAD-mode.
IACR Cryptol. ePrint Arch., 2022

On the (im)possibility of ElGamal blind signatures.
IACR Cryptol. ePrint Arch., 2022

2021
On methods of shortening ElGamal-type signatures.
IACR Cryptol. ePrint Arch., 2021

On Cryptographic Properties of the NB-Fi Protocol.
Autom. Control. Comput. Sci., 2021

2020
Provably secure counter mode with related-key-based internal re-keying.
J. Comput. Virol. Hacking Tech., 2020

On post-handshake authentication and external PSKs in TLS 1.3.
J. Comput. Virol. Hacking Tech., 2020

On Internal Re-keying.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

2019
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables.
IACR Cryptol. ePrint Arch., 2019

Continuing to reflect on TLS 1.3 with external PSK.
IACR Cryptol. ePrint Arch., 2019

Security of Multilinear Galois Mode (MGM).
IACR Cryptol. ePrint Arch., 2019

2018
Security bound for CTR-ACPKM internally re-keyed encryption mode.
IACR Cryptol. ePrint Arch., 2018

2017
The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol.
RFC, March, 2017

Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying.
IACR Cryptol. ePrint Arch., 2017

2016
Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012.
RFC, March, 2016

On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing.
IACR Cryptol. ePrint Arch., 2016

2015
On the Security of One Password Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2015

2011
Some Words About Cryptographic Key Recognition In Data Streams.
IACR Cryptol. ePrint Arch., 2011


  Loading...