| 
 
    
  
    
      
   
    
   
     | 
    
    
    
	 
		
			   
				 					Архив / Список докладов CTCrypt 2014 
	- Evgeny Alekseev, Vladimir Popov, Anton Prokhorov, Stanislav Smyshlyaev, Lolita Sonina. On the performance of a perspective LSX-based block cipher
 
	- Anton Alekseychuk, Sergey Gryshakov. On the Computational Security of Randomized Stream Ciphers Proposed by Mihaljević and Imai
 
	- Natal'ya Anashkina, Andrey Shurupov. Comparison of Simulated Annealing and Balas Algorithms for Solving Pseudo-Boolean Linear Inequalities Systems
 
	- Nikolay Borisenko, Hoang Duc Tho. Algorithms for minimization of the number of logic elements in a circuit implementing S-box Boolean Functions
 
	- Mikhail Borodin, Andrey Rybkin. High-Speed Implementation of GOST R 34.10-2012 Digital Signature
 
	- Mikhail Borodin, Andrey Rybkin, Alexey Urivskiy. High-Speed Software Implementation of the Prospective 128-bit Block Cipher and Streebog Hash-Function
 
	- Denis Fomin. Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA
 
	- P. Freyre, N. Diaz, R. Diaz, C. Perez. Random generation of MDS matrices
 
	- Mikhail Goltvanitsa. Digit sequences of skew linear recurrences of maximal period over Galois rings
 
	- Dmitry Eremin-Solenikov. OpenPGP and Russian cryptography
 
	- Sergey Grebnev. Security properties of certain authenticated key exchange protocols
 
	- Sergey Matveev. GOST 28147-89 masking against side channel attacks
 
	- Andrey Menyachikhin. Gray codes with the step k
 
	- Alexander Minakov. Compound Poisson approximation for the distribution of the number of monotone tuples in random sequence
 
	- Maxim Nikolaev. On the complexity of two-dimensional discrete logarithm problem in a finite cyclic group with efficient endomorphism
 
	- Dmitry Pilshchikov. On the limiting mean values in probabilistic models of time-memory-data tradeoff methods
 
	- Alexander Rybakov. Evaluation of a number of integers in an interval having no more than 3 large prime factors
 
	- Markku-Juhani O. Saarinen. Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
 
	- Danil Soshin. Synthesis of balanced threshold functions by a geometric method
 
       
 
				 
		     
	     
	 
 
 
 
 
 
     
     |