default search action
Valery Smyslov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j1]Valery Smyslov:
Use of hybrid post-quantum key exchange in internet protocols. J. Comput. Virol. Hacking Tech. 20(3): 447-454 (2024)
Informal and Other Publications
- 2024
- [i13]Valery Smyslov:
Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9593: 1-13 (2024) - 2023
- [i12]Cen Jung Tjhai, Martin Tomlinson, Graham Bartlett, Scott R. Fluhrer, Daniel Van Geest, Óscar García-Morchón, Valery Smyslov:
Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9370: 1-29 (2023) - [i11]Valery Smyslov:
Using GOST Cryptographic Algorithms in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9385: 1-148 (2023) - [i10]Mohamed Boucadair, T. Reddy K., Dan Wing, Valery Smyslov:
Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS. RFC 9464: 1-16 (2023) - 2022
- [i9]Valery Smyslov:
Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols. RFC 9227: 1-22 (2022) - [i8]Valery Smyslov:
Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9242: 1-14 (2022) - [i7]Tommy Pauly, Valery Smyslov:
TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets. RFC 9329: 1-30 (2022) - 2020
- [i6]Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov:
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC 8784: 1-16 (2020) - 2016
- [i5]Daniel Migault, Valery Smyslov:
Cloning the IKE Security Association in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7791: 1-14 (2016) - [i4]Yoav Nir, Valery Smyslov:
Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC 8019: 1-32 (2016) - 2015
- [i3]Valery Smyslov, Paul Wouters:
The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7619: 1-12 (2015) - 2014
- [i2]Valery Smyslov:
Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation. RFC 7383: 1-20 (2014) - 1999
- [i1]Valery Smyslov:
Simple Cryptographic Program Interface (Crypto API). RFC 2628: 1-30 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint