Важная информация для участников CTCrypt 2020!


При поддержке



Архив / Список докладов CTCrypt 2014

  1. Evgeny Alekseev, Vladimir Popov, Anton Prokhorov, Stanislav Smyshlyaev, Lolita Sonina. On the performance of a perspective LSX-based block cipher
  2. Anton Alekseychuk, Sergey Gryshakov. On the Computational Security of Randomized Stream Ciphers Proposed by Mihaljević and Imai
  3. Natal'ya Anashkina, Andrey Shurupov. Comparison of Simulated Annealing and Balas Algorithms for Solving Pseudo-Boolean Linear Inequalities Systems
  4. Nikolay Borisenko, Hoang Duc Tho. Algorithms for minimization of the number of logic elements in a circuit implementing S-box Boolean Functions
  5. Mikhail Borodin, Andrey Rybkin. High-Speed Implementation of GOST R 34.10-2012 Digital Signature
  6. Mikhail Borodin, Andrey Rybkin, Alexey Urivskiy. High-Speed Software Implementation of the Prospective 128-bit Block Cipher and Streebog Hash-Function
  7. Denis Fomin. Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA
  8. P. Freyre, N. Diaz, R. Diaz, C. Perez. Random generation of MDS matrices
  9. Mikhail Goltvanitsa. Digit sequences of skew linear recurrences of maximal period over Galois rings
  10. Dmitry Eremin-Solenikov. OpenPGP and Russian cryptography
  11. Sergey Grebnev. Security properties of certain authenticated key exchange protocols
  12. Sergey Matveev. GOST 28147-89 masking against side channel attacks
  13. Andrey Menyachikhin. Gray codes with the step k
  14. Alexander Minakov. Compound Poisson approximation for the distribution of the number of monotone tuples in random sequence
  15. Maxim Nikolaev. On the complexity of two-dimensional discrete logarithm problem in a finite cyclic group with efficient endomorphism
  16. Dmitry Pilshchikov. On the limiting mean values in probabilistic models of time-memory-data tradeoff methods
  17. Alexander Rybakov. Evaluation of a number of integers in an interval having no more than 3 large prime factors
  18. Markku-Juhani O. Saarinen. Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
  19. Danil Soshin. Synthesis of balanced threshold functions by a geometric method