-
Asymptotic local inversion of some random finite-state machine with a growing number of internal states
Vladimir Vinokurov
-
Sequential unforgeability of ElGamal blind signatures
Alexandra Babueva, Ilya Makhonin, Stanislav Smyshlyaev and Mariia Utekhina
-
Full Cryptanalysis of the pqsigRM Signature Scheme
Andrei Rubenkov
-
Two-level multilinear hash – efficient precomputations in exchange for one bit of security
Vitaly Kiryukhin
-
On metric complements of some subclasses of bent functions
Nikolay Kolomeec and Natalia Tokareva
-
On the security of belt-hash and belt-compress
Sergey Agievich
-
On cryptographic properties and efficient implementation of MDS-matrices with nontrivial automorphism groups
Dmitry Burov, and Sergey Kostarev
-
Functions over finite fields constructed using polynomials over Galois rings and the trace function
Oleg Kamlovskii
-
Probabilistic Analysis of Linear Approximation Correlation for Unbalanced Feistel Networks with Modular Reduction
Alexander Kargin and Denis Fomin
-
Inseparability of Internal Rekeying and Encryption Mode Analysis
Aleksandr Bakharev, Kirill Tsaregorodtsev
-
On the practical secrecy of keys formed by the emission scheme of the recovery process
Dmitriy Bogdanov
-
A new family of block ciphers "Ramen-K"
Andrei Dmukh, Dmitry Pasko and Danil Peshkov
-
On the Invariant Subspaces of Finite Field Hadamard Matrices
Stepan Davydov and Sergey Kostarev
-
Joint security of VKO mechanism and GOST signature scheme in elliptic curve generic group model
Aleksandr Bakharev, Aleksey Drynkin, Kirill Tsaregorodtsev
-
The PRAPOR-K Russian Family of Lightweight Block Ciphers
Andrei Dmukh and Dmitry Trifonov
-
On the limits of integral attacks on block cryptographic algorithms
Anastasiia Chichaeva and Vasily Shishkin
-
On the UKS threat and the impact of the ability to obtain and force future ephemeral keys of honest parties on its feasibility
Evgeny Alekseev, Alena Mukhortova, Stanislav Smyshlyaev, Sergey Kyazhin
-
Preimages for belt-compress and belt-hash
Vitaly Kiryukhin
-
On the boomerang uniformity of piecewise-monomial substitutions over the field F2n
Yuriy Kalinin, Aleksandr Kutsenko, Andrey Menyachikhin
-
Invariant Subspace Attack on the GOST 28147-89 Block Cipher
Stepan Davydov
-
On some approaches to statistical testing of cryptographic generators of random and pseudorandom sequences (Invited Talk)
Yuriy Kharin, Vladimir Palukha
-
Lower bound for the Shannon entropy for one probability-theoretic model of a cryptographic key source
Vladimir Mironkin
-
A Shannon-inspired definition of blindness
Liliya Akhmetzyanova, Stanislav Smyshlyaev and Mariia Utekhina
-
On the search for cyclic permutations using heuristic methods and digraph representation
Alejandro Freyre Echevarrı́a, Ramses Rodrı́guez Aulet and Adrián Alfonso Peñate
-
Features of the cipher Belt
Fedor Malyshev
-
Cryptanalysis of the McEliece cryptosystem based on elliptic codes: a review of known methods and a new structural attack with hints
Artyom Kuninets, Ekaterina Malygina and Evgeniy Melnichuk
-
Properties of codes defined by quadratic relations and applications to linear code decoding
Ivan Chizhov
-
Security analysis of post-quantum hash-based signatures on the composition of random mappings
Alexey Zelenetsky and Oleg Turchenko
-
On parity decision trees basic parameters and harmonic properties of Boolean functions connection
Elena Kutyreva and Oleg Logachev
-
Hybrid and Fully Bitsliced: Two Approaches to Implementing MGM
Anatoly Solovyev
-
Exact formulas for expectations of number of pairs of coinciding s-chains in urn schemes with and without replacements for two types of balls
Vasiliy Kruglov