Partners

Supported by

Operator

Photo Gallery

Materials

Monday, 28.05

Download Welcome speech

Symmetric cryptography I

Download

The Rise of Authenticated Encryption (invited talk)

Phillip Rogaway

Download

Near birthday attack on «8 bits» AEAD mode    

Liliya Ahmetzyanova, Grigory Karpunin, Grigory Sedov

Download

Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out

Vasily Shishkin, Ivan Lavrikov

Symmetric cryptography II

Download

XS-circuits in block ciphers

Sergey Agievich

Download

On some properties of an XSL-network

Alexey Kurochkin

Algebraic Aspects

Download

Pseudorandom generators based on shift registers over finite commutative rings (invited talk)

Oleg Kozlitin

Download

Some properties of modular addition

Victoria Vysotskaya

Download

New classes of 8-bit permutations based on a butterfly structure

Denis Fomin

Download

On a new classification of the Boolean functions

Sergey Fedorov

  Rump-session
Download

(Most) Post-Quantum Bugs are just Plain Old Bugs

Markku-Juhani O. Saarinen

Download

About project of national standard "Protocol of IoT for the interchanging data in narrowband spectrum (NB-Fi)"

Vladislav Nozdrunov

Download

Research of statistical properties of the developped pseudorandom sequence generator

Kunbolat Algazy

Download

Some properties of Boolean functions related to plane approximations

Evgeny Alekseev

Download

Trusted Cryptographic Tools Locking

Vadim Tsypyschev

 

Tuesday, 29.05

         Cryptography and «Digital economy»

Download

Cryptography for the society. Protections problems in the eyes of ordinary users

Dmitry Malinkin

Blockchain in Russia and the world a year later

Download

From "Hype" to practice (invited talk)

Maxim Shevchenko

Download

Securely Scaling Distributed Ledger Systems (invited talk)

Philipp Jovanovic

Download

An authentication language for blockchain based on sigma-protocols enhanced by boolean predicates (invited talk)

Alexander Chepurnoy

Symmetric cryptography III

Download

Lightweight Symmetric-Key Cryptography (invited talk)

Thomas Peyrin

Download

Exact maximum expected differential and linear probability for 2-round Kuznyechik

Vitaly Kiryukhin

Download

Evaluation of the maximum productivity for block encryption algorithms

Vladimir Fomichev, Alisa Koreneva, Alfinur Miftakhutdinova, Dmitry Zadorozhny

Public key cryptography

Download

Constructing strong elliptic curves suitable for cryptographic applications

Alexey Nesterenko

Download

Considering Two MAC under SIG Variants of The Basic SIGMA Protocol

Trieu Quang Phong

Download

A New LWE-based Verifiable Threshold Secret Sharing Scheme

Saba Karimani, Zahra Naghdabadi, Taraneh Eghlidos, Mohammad Reza Aref

 

Wednesday, 30.05

         Symmetric cryptography IV

Download

Security bounds for standardized internally re-keyed block cipher modes and their practical significance

Liliya Ahmetzyanova, Evgeny Alekseev, Grigory Karpunin, Igor Oshkin, Grigory Sedov, Stanislav Smyshlyaev, Ekaterina Smyshlyaeva

Download

Provably secure counter mode with related key-based internal re-keying

Evgeny Alekseev, Kirill Goncharenko, Grigory Marshalko

Probabilistic aspects and Applications

Download

Data recovering for a neural network-based biometric authentication scheme

Vladimir Mironkin, Dmitry Bogdanov

Download

Testing the NIST Statistical Test Suite on artificial pseudorandom sequences

Andrey Zubkov, Aleksandr Serov