Partners

Supported by

Operator

Photo Gallery

Program 2023

June 6, Tuesday

14.35

Departure to Volgograd. Aeroflot flight SU 1182 from Sheremetyevo Airport (SVO) to Gumrak Airport (VOG)

16.50

Arriving in Volgograd (Gumrak airport)

Transfer to the hotel

18.00-19.00

Check-in

19.00

Transfer from the hotel to the river station

19.20 – 22.00

Welcome Party on a river bus

22.00-22:20

Transfer to the hotel

June 7, Wednesday

08.00 – 09.00

Breakfast

09.00 – 10.00

Registration of participants

10.00 – 10.10

Opening remarks.

Protocols

10.10 – 10.40

Blind signature as a shield against backdoors in smart-cards

Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko and Stanislav Smyshlyaev

10.40 – 11.10

Two-party GOST in two parts: fruitless search and fruitful synthesis

Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova and Stanislav Smyshlyaev

11.10 – 11.40

Probing the security landscape for authenticated key establishment protocols

Evgeny Alekseev and Sergey Kyazhin

11.40 – 12.10

On the confidentiality and integrity of ECIES scheme

Kirill Tsaregorodtsev

12.10 – 12.30

Coffee break

Symmetric – Linear transformations

12.30 – 13.00

Circulant matrices over F_2 and their use for construction of effective linear transformations with high branch number

Stepan Davydov and Yuri Shkuratov

13.00 – 13.30

Matrix-vector product of a new class of quasi-involutory MDS matrices

Pablo Freyre Arrozarena, Ernesto Dominguez Fiallo and Ramses Rodriguez Aulet

13.30 – 14.00

Construction of linear involutory transformations over finite fields through the multiplication of polynomials modulus a polynomial

Ramsés Rodríguez Aulet, Pablo Freyre Arrozarena and Alejandro Freyre Echevarría

14.00 – 14.40

Lunch

Protocols

14.40 – 15.10

On security aspects of CRISP

Vitaly Kiryukhin

15.10 – 15.40

On the security of one RFID authentication protocol

Anastasiia Chichaeva, Stepan Davydov, Ekaterina Griboedova and Kirill Tsaregorodtsev

Quantum and postquantum

15.40 – 16.10

A simple quantum circuit for the attack which shows vulnerability of quantum cryptography with phase-time coding

16.10 – 16.40

The McEliece-type Cryptosystem based on D-codes

Yuriy Kosolapov and Evgeniy Lelyuk

16.40 – 17.00

RUMP SESSION

17.30 – 21.45

Sightseeing program, dinner

June 8, Thursday

08.00 – 09.00

Breakfast

Symmetric – Permutations

09.00 – 09.40

Invited talk

Adapted spectral-differential method for constructing differentially 4-uniform piecewise-linear substitutions, orthomorphisms, involutions over the field F2n

Andrey Menyachikhin

09.40 – 10.10

Class of piecewise-monomial mappings: differentially 4-uniform permutations on F28 with graph algebraic immunity 3 exist

Dmitry Burov, Sergey Kostarev and Andrey Menyachikhin

10.10 – 10.40

On the Bit-Slice representations of some nonlinear bijective transformations

Oliver Coy Puente and Reynier A. de la Cruz Jiménez

10.40 – 11.00

Computational work for some TU-based permutations

Denis Fomin and Dmitriy Trifonov

11.00 – 11.20

On one way of constructing unbalanced TU-based permutations

Denis Fomin

11.20 – 11.40

Coffee break

11.40 – 12.10

Workshop sessions (Practical Cryptography)

14.00 – 15.00

Lunch
15.00 – 16.30 Workshop sessions (Practical Cryptography)

16.30 – 17.00

Coffee break
17.00 – 18.30 Workshop sessions (Practical Cryptography)

19.00 – 20.00

Dinner in the hotel

June 9, Friday

08.00 – 09.00

Breakfast

Mathematical aspects

09.30 – 10.00

On properties of generalized bent functions and decomposition of Boolean bent functions

Aleksandr Kutsenko

10.00 – 10.30

Reliability of two-level testing approach of the NIST SP800-22 test suite and two-sided estimates for quantile of binomial distribution

Aleksandr Serov

Symmetric – Analysis

10.30 – 11.00

Fast correlation attack for GRAIN-128AEAD with fault

Sergei Katishev and Maxime Malov

11.00 – 11.30

Distinguishing attacks on Feistel ciphers based on linear and differential attacks

Denis Fomin

11.30 – 12.20

Check-out, Coffee break

12.20 – 12.50

The PRF pCollapserARX optimal cryptographic characteristic automated search by CASCADA

Sergey Polikarpov, Vadim Prudnikov and Konstantin Rumyantsev

12.50 – 13.10

About "k-bit security" of MACs based on hash function Streebog

Vitaly Kiryukhin

13.10 – 13.40

Streebog as a Random Oracle

Liliya Akhmetzyanova, Alexandra Babueva and Andrey Bozhko

13.40 – 14.10

Alternative security models for pseudorandom functions

Kirill Tsaregorodtsev

14.10 – 15.00

Lunch

15.00

Transfer to Gumrak airport (Volgograd)

17.50

Departure to Moscow. Aeroflot flight SU 1181 from Gumrak Airport (VOG) to Sheremetyevo Airport (SVO)