|
Accepted papers
- AEAD-mode MXP --- beyond the birthday bound without loss of efficiency
Vitaly Kiryukhin
- Transitive piecewise polynomial transformations over primary residue rings and some statistical properties of the generated sequences
Tatiana Lipina and Anton Vasin
- Bitsliced implementations of the «Streebog» and «Kuznechik» algorithms
Anatoly Solovyev and Denis Fomin
- Corrections of two-level testing approach to random number generators ensuring its reliability on the example of Frequency test from NIST SP800-22 test suite
Aleksandr Serov
- Automorphism groups of MDS-matrices
Dmitry Burov and Sergey Kostarev
- Fiat-Shamir Code
Denis Fomin and Anton Guselev
- Quantum circuits GOST 34.10-2018, GOST 34.11-2018 and GOST 34.12-2018 with minimum qubits
Denis Denisenko and Marina Nikitenkova
- On the practical secrecy of keys formed from instantaneous values of a stationary Gaussian process
Dmitriy Bogdanov
- On the security of DUKPT key derivation function
Ilya Makhonin, Liliya Akhmetzyanova and Stanislav Smyshlyaev
- An effective structural attack on the post-quantum signature scheme pqsigRM
Andrei Rubenkov and Ivan Chizhov
- On the cardinality of some classes generated by Maiorana-McFarland bent functions
Nikolay Kolomeec and Denis Bykov
- Linear characteristics of functions over Galois rings
Oleg Kamlovskii
- Adapted spectral-diffusional method for constructing special type matrices with high values of branch number
Andrey Menyachikhin
- On Constructing Quasi-Cyclic Subfield Subcodes of Dual Elliptic Codes with Known Parameter
Artyom Kuninets
- On the connection between the permutation equivalence of linear codes problem and the isomorphism of quadratic forms problem
Ivan Chizhov
- Classification of indecomposable (v, (3,5))- and (v, (3,7))-configurations
Andrey Trishin
- Provable security: main concepts, significance and open problems (invited talk)
Evgeny Alekseev and Liliya Akhmetzyanova
- Approaches, Models, and Challenges in the Analysis of Cryptographic Algorithms and Protocols in the Context of the Quantum Threat (invited talk)
Vitaly Kiryukhin, Anton Naumenko, Andrey Shcherbachenko
- Known and commutative-group 5-configurations
Fedor Malyshev
- A Probabilistic Model for GPU-Accelerated Cryptographic Algorithm Execution
Denis Fomin and Andrey Chuhno
- Asymptotic Distribution of the Correlation Coefficients of Linear Approximation
Aleksandr Kargin and Denis Fomin
- Weight estimates of monotonic bijunctive functions in connection with the method of bijunctive implications for solving systems of Boolean equations
Aleksey Tarasov and Nikita Trubitsin
- Generation of recursive MDS matrices with irreducible characteristic polynomial from known ones: a practical approach
Pablo Freyre Arrozarena, Ramses Rodr`iguez Aulet, Alejandro Freyre Echevarr`ia, and Oristela Cuellar Justiz
- An Analysis of Component Functions: Replicating Kuznyechik's S-Box Properties Through Heuristic Method
Alejandro Freyre Echevarr`ia, Reynier A. de la Cruz Jim`enez, Ren`e Fern`andez-Leal, Ramses Rodr`iguez Aulet, and Oliver Coy Puente
- On the security of one anonymous authentication protocol
Alexander Bakharev and Kirill Tsaregorodtsev
- Towards a Proof-of-Possession Mechanism for Binary Goppa Code-Based KEM
Liliya Akhmetzyanova, Evgeny Alekseev, Aleksandra Babueva, and Andrey Bozhko
- Decompositions of negabent functions and related properties
Aleksandr Kutsenko
- Теоретико-вероятностная модель локальной обратимости двоичного регистра сдвига с булевой функцией усложнения
Владимир Винокуров и Александр Тюкин
- Оценка преобладания линейного статистического аналога большой размерности
Василий Шишкин
|