Official Partners

Partners

Supported by

Operator

Photo Gallery

Accepted papers

  1. AEAD-mode MXP --- beyond the birthday bound without loss of efficiency
    Vitaly Kiryukhin
  2. Transitive piecewise polynomial transformations over primary residue rings and some statistical properties of the generated sequences
    Tatiana Lipina and Anton Vasin 
  3. Bitsliced implementations of the «Streebog» and «Kuznechik» algorithms
    Anatoly Solovyev and Denis Fomin
  4. Corrections of two-level testing approach to random number generators ensuring its reliability on the example of Frequency test from NIST SP800-22 test suite
    Aleksandr Serov
  5. Automorphism groups of MDS-matrices
    Dmitry Burov and Sergey Kostarev 
  6. Fiat-Shamir Code
    Denis Fomin and Anton Guselev
  7. Quantum circuits GOST 34.10-2018, GOST 34.11-2018 and GOST 34.12-2018 with minimum qubits
    Denis Denisenko and Marina Nikitenkova
  8. On the practical secrecy of keys formed from instantaneous values of a stationary Gaussian process
    Dmitriy Bogdanov
  9. On the security of DUKPT key derivation function
    Ilya Makhonin, Liliya Akhmetzyanova and Stanislav Smyshlyaev 
  10. An effective structural attack on the post-quantum signature scheme pqsigRM
    Andrei Rubenkov and Ivan Chizhov
  11. On the cardinality of some classes generated by Maiorana-McFarland bent functions
    Nikolay Kolomeec and Denis Bykov
  12. Linear characteristics of functions over Galois rings
    Oleg Kamlovskii
  13. Adapted spectral-diffusional method for constructing special type matrices with high values ​​of branch number
    Andrey Menyachikhin
  14. On Constructing Quasi-Cyclic Subfield Subcodes of Dual Elliptic Codes with Known Parameter
    Artyom Kuninets
  15. On the connection between the permutation equivalence of linear codes problem and the isomorphism of quadratic forms problem
    Ivan Chizhov 
  16. Classification of indecomposable (v, (3,5))- and (v, (3,7))-configurations
    Andrey Trishin
  17. Provable security: main concepts, significance and open problems (invited talk) 
    Evgeny Alekseev and Liliya Akhmetzyanova
  18. Approaches, Models, and Challenges in the Analysis of Cryptographic Algorithms and Protocols in the Context of the Quantum Threat (invited talk) 
    Vitaly Kiryukhin, Anton Naumenko, Andrey Shcherbachenko
  19. Known and commutative-group 5-configurations 
    Fedor Malyshev
  20. A Probabilistic Model for GPU-Accelerated Cryptographic Algorithm Execution
    Denis Fomin and Andrey Chuhno 
  21. Asymptotic Distribution of the Correlation Coefficients of Linear Approximation 
    Aleksandr Kargin and Denis Fomin
  22. Weight estimates of monotonic bijunctive functions in connection with the method of bijunctive implications for solving systems of Boolean equations
    Aleksey Tarasov and Nikita Trubitsin
  23. Generation of recursive MDS matrices with irreducible characteristic polynomial from known ones: a practical approach
    Pablo Freyre Arrozarena, Ramses Rodr`iguez Aulet, Alejandro Freyre Echevarr`ia, and Oristela Cuellar Justiz
  24. An Analysis of Component Functions: Replicating Kuznyechik's S-Box Properties Through Heuristic Method
    Alejandro Freyre Echevarr`ia, Reynier A. de la Cruz Jim`enez, Ren`e Fern`andez-Leal, Ramses Rodr`iguez Aulet, and Oliver Coy Puente
  25. On the security of one anonymous authentication protocol
    Alexander Bakharev and Kirill Tsaregorodtsev 
  26. Towards a Proof-of-Possession Mechanism for Binary Goppa Code-Based KEM
    Liliya Akhmetzyanova, Evgeny Alekseev, Aleksandra Babueva, and Andrey Bozhko
  27. Decompositions of negabent functions and related properties
    Aleksandr Kutsenko
  28. Теоретико-вероятностная модель локальной обратимости двоичного регистра сдвига с булевой функцией усложнения
    Владимир Винокуров и Александр Тюкин
  29. Оценка преобладания линейного статистического аналога большой размерности
    Василий Шишкин