Список принятых докладов:
- Vitaly Kiryukhin. Related-key Attack on 5-round Kuznyechik
- Denis Denisenko, Marina Nikitenkova. Optimization of S-boxes GOST R 34.12-2015 «Magma» Quantum Circuits without Ancilla Qubits
- Boris Ryabko, Andrey Fionov. Data Embedding Based on Linear Hash Functions
- Sergey Grebnev. Limonnitsa: Making Limonnik-3 Postquantum
- Maksim Nikolaev. Modified Gaudry-Schost Algorithm for the Two-dimensional Discrete Logarithm Problem
- Sergey Katyshev, Andrey Zyazin, Anton Baryshnikov. Application of Non-associative Structures for Construction of Homomorphic Cryptosystems
- Sergey Agievich. The CTR Mode with Encrypted Nonces and Its Extension to AE
- Aleksandr Kutsenko. On Isometric Mappings of the Set of All Boolean Functions Which Preserve Self-duality and the Rayleigh Quotient
- Victoria Vysotskaya. Probabilistic Properties of Modular Addition
- Matthias Hamann, Matthias Krause, Alexander Moch. Improving OBDD Attacks Against Stream Ciphers
- Evgeny Alekseev, Lyudmila Kushchinskaya. On the Properties of Boolean Functions Related to Planar Approximation of the Filter Generator
- Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Sedov, Stanislav Smyshlyaev. On Security of TLS 1.2 Record Layer with Russian Ciphersuites
- Alexey Urivskiy. Random Number Generators Based on Permutations Can Pass the Collision Test
- Grigory Marshalko, Vladimir Rudskoy. Key Distribution. Episode 1: Quantum Menace
- Ekaterina Malygina, Semyon Novoselov. Division Polynomials for Hyperelliptic Curves Defined by Dickson Polynomials
- Ayan Mahalanobis, Anupam Singh, Pralhad Shinde, Sushil Bhunia. The MOR Cryptosystem in Orthogonal and Symplectic Groups in Odd Characteristic
- Fedor Malyshev, Andrey Trishin. Linear and Differential Cryptanalysis: Another Viewpoint
- Andrey Menyachikhin. The Change in Linear and Differential Characteristics of Substitution Multiplied by Transposition
- Denis Fomin. On the Way of Constructing 2n-bit Permutations From n-bit Ones
- Denis Fomin, Alexey Kurochkin. MGM Beyond the Birthday Bound
- Julia Trufanova, Grigory Marshalko. Fuzzy extractors security under several models of biometric data
Список может пополняться.