Внимание!!!
Важная информация для участников CTCrypt 2020!

Официальные партнеры

Партнеры

При поддержке

Оператор

Фотогалерея

Принятые работы

  1. Constructing involutions specifying their coordinate functions
    Daniel Humberto Hernández Piloto, Oliver Coy Puente
  2. Streebog compression function as PRF in secret-key settings
    Vitaly Kiryukhin
  3. Nonlinearity of bent functions over finite fields
    Vladimir Ryabov
  4. IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
    Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, and Stanislav Smyshlyaev
  5. On differential uniformity of permutations derived using a generalized construction
    Denis Fomin and Maria Kovrizhnykh
  6. Some remarks on the security of isogeny-based cryptosystems
    Sergey Grebnev
  7. Misuse-resistant MGM2 mode
    Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, and Stanislav Smyshlyaev
  8. One «short» signature scheme’s security properties
    Anton Guselev
  9. Some properties of one mode of operation of block ciphers
    Dmitriy Bogdanov and Vladislav Nozdrunov
  10. The duality mapping and unitary operators acting on the set of all generalized Boolean functions
    Aleksandr Kutsenko
  11. On some applications of the curvature of Boolean functions
    Reynier Antonio de la Cruz Jiménez
  12. The Hadamard square of concatenated linear codes
    Ivan Chizhov and Alexandra Davletshina
  13. On the generation of cryptographically strong substitution boxes
    Alejandro Freyre Echevarría
  14. On the properties of some sequences generated by Shift Registers and Latin Squares
    Ramses Rodríguez Aulet and Adrián Alfonso Peñate
  15. Two variants of Lempel-Ziv criterion and their reasoning
    Vladimir Mikhailov and Vasilii Kruglov
  16. Format-Preserving Encryption: a survey
    Kirill Tsaregorodtsev
  17. On the Impossibility of an Invariant Attack on Kuznyechik
    Denis Fomin
  18. On derivatives of Boolean bent functions
    Alexander Shaporenko
  19. The re-keying mechanism COM-CTR+D
    Daymé Almeida Echevarria, Alejandro Freyre Echevarría, and Adrian Alfonso Peñate
  20. Algebraic cryptanalysis of round-reduced lightweight ciphers Simon and Speck
    Aleksandr Kutsenko, Natalya Atutova, Darya Zyubina, Ekaterina Maro, and Stepan Filippov
  21. Small Scalar Multiplication on Weierstrass Curves using Division Polynomials
    Sergey Agievich, Stanislav Poruchnik, and Vladislav Semenov