RUS  ENG
Full version
PEOPLE

Akhmetzyanova Liliya R

Publications in Math-Net.Ru

  1. Two-party GOST signature scheme

    Mat. Vopr. Kriptogr., 15:2 (2024),  7–28
  2. Streebog as a random oracle

    Prikl. Diskr. Mat., 2024, no. 64,  27–42
  3. Blind signature as a shield against backdoors in smart cards

    Prikl. Diskr. Mat., 2024, no. 63,  49–64
  4. On the security of authenticated encryption mode with associated data MGM with respect to confidentiality threat

    Mat. Vopr. Kriptogr., 14:3 (2023),  49–73
  5. On the (im)possibility of secure ElGamal blind signatures

    Mat. Vopr. Kriptogr., 14:2 (2023),  25–42
  6. $\mathsf{sMGM}$: parameterizable AEAD mode

    Mat. Vopr. Kriptogr., 14:2 (2023),  7–24
  7. On blindness of several ElGamal-type blind signatures

    Prikl. Diskr. Mat., 2023, no. 62,  13–20
  8. IQRA: Incremental Quadratic Re-keying friendly Authentication scheme

    Mat. Vopr. Kriptogr., 13:3 (2022),  5–35
  9. Secure implementation of digital signature using semi-trusted computational core

    Mat. Vopr. Kriptogr., 12:4 (2021),  5–23
  10. Improving the security of ElGamal-type signatures

    Mat. Vopr. Kriptogr., 12:3 (2021),  5–30
  11. On methods of shortening ElGamal-type signatures

    Mat. Vopr. Kriptogr., 12:2 (2021),  75–91
  12. On privacy in decentralized systems with tokens

    Prikl. Diskr. Mat. Suppl., 2021, no. 14,  119–125
  13. Data storage security and full disk encryption

    Prikl. Diskr. Mat., 2020, no. 49,  78–97
  14. Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode

    Mat. Vopr. Kriptogr., 10:2 (2019),  47–60
  15. Practical significance of security bounds for standardized internally re-keyed block cipher modes

    Mat. Vopr. Kriptogr., 10:2 (2019),  31–46
  16. On cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systems

    Mat. Vopr. Kriptogr., 9:2 (2018),  23–46
  17. On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing

    Mat. Vopr. Kriptogr., 8:2 (2017),  39–50
  18. A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction

    Mat. Vopr. Kriptogr., 7:4 (2016),  7–28


© Steklov Math. Inst. of RAS, 2024