Partners

Supported by

Operator

Photo Gallery

Materials 2023

June 7, Wednesday

Protocols

Download

Blind signature as a shield against backdoors in smart-cards

Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko and Stanislav Smyshlyaev

Download

Two-party GOST in two parts: fruitless search and fruitful synthesis

Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova and Stanislav Smyshlyaev

Download

Probing the security landscape for authenticated key establishment protocols

Evgeny Alekseev and Sergey Kyazhin

Download

On the confidentiality and integrity of ECIES scheme

Kirill Tsaregorodtsev

Symmetric – Linear transformations

Download

Circulant matrices over F_2 and their use for construction of effective linear transformations with high branch number

Stepan Davydov and Yuri Shkuratov

Download

Matrix-vector product of a new class of quasi-involutory MDS matrices

Pablo Freyre Arrozarena, Ernesto Dominguez Fiallo and Ramses Rodriguez Aulet

Download

Construction of linear involutory transformations over finite fields through the multiplication of polynomials modulus a polynomial

Ramsés Rodríguez Aulet, Pablo Freyre Arrozarena and Alejandro Freyre Echevarría

Protocols

Download

On security aspects of CRISP

Vitaly Kiryukhin

Download

On the security of one RFID authentication protocol

Anastasiia Chichaeva, Stepan Davydov, Ekaterina Griboedova and Kirill Tsaregorodtsev

Quantum and postquantum

Download

A simple quantum circuit for the attack which shows vulnerability of quantum cryptography with phase-time coding

Download

The McEliece-type Cryptosystem based on D-codes

Yuriy Kosolapov and Evgeniy Lelyuk

RUMP SESSION

Download

On the rekeying (in)separability

Kirill Tsaregorodtsev

Download

On one definition of bit security for decision problems

Sergey Kyazhin

Download

It is impossible to construct an internal re-keying that is suitable for any encryption mode

Evgeny Alekseev

Download

Вычисление кратной точки с использованием комплексных обедов эндоморфмизмов 

Alexey Nesterenko

Download

Об одной модели нарушителя, возникающей при анализе систем полнодискового шифрования

Vasily Nikolaev

Download

Quantum-enhanced symmetric cryptanalysis for S-AES

Alexey Moiseevskiy

June 8, Thursday

Symmetric – Permutations

Download

Invited talk

Adapted spectral-differential method for constructing differentially 4-uniform piecewise-linear substitutions, orthomorphisms, involutions over the field F2n

Andrey Menyachikhin

Download

Class of piecewise-monomial mappings: differentially 4-uniform permutations on F28 with graph algebraic immunity 3 exist

Dmitry Burov, Sergey Kostarev and Andrey Menyachikhin

Download

On the Bit-Slice representations of some nonlinear bijective transformations

Oliver Coy Puente and Reynier A. de la Cruz Jiménez

Download

Computational work for some TU-based permutations

Denis Fomin and Dmitriy Trifonov

Download

On one way of constructing unbalanced TU-based permutations

Denis Fomin

June 9, Friday

Mathematical aspects

Download

On properties of generalized bent functions and decomposition of Boolean bent functions

Aleksandr Kutsenko

Download

Reliability of two-level testing approach of the NIST SP800-22 test suite and two-sided estimates for quantile of binomial distribution

Aleksandr Serov

Symmetric – Analysis

Download

Fast correlation attack for GRAIN-128AEAD with fault

Sergei Katishev and Maxime Malov

Download

Distinguishing attacks on Feistel ciphers based on linear and differential attacks

Denis Fomin

Download

The PRF pCollapserARX optimal cryptographic characteristic automated search by CASCADA

Sergey Polikarpov, Vadim Prudnikov and Konstantin Rumyantsev

Download

About "k-bit security" of MACs based on hash function Streebog

Vitaly Kiryukhin

Download

Streebog as a Random Oracle

Liliya Akhmetzyanova, Alexandra Babueva and Andrey Bozhko

Download

Alternative security models for pseudorandom functions

Kirill Tsaregorodtsev