|
Materials
Monday, 28.05
Download |
Welcome speech |
Symmetric cryptography I
|
Download |
The Rise of Authenticated Encryption (invited talk)
Phillip Rogaway
|
Download |
Near birthday attack on «8 bits» AEAD mode
Liliya Ahmetzyanova, Grigory Karpunin, Grigory Sedov
|
Download |
Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out
Vasily Shishkin, Ivan Lavrikov
|
Symmetric cryptography II
|
Download |
XS-circuits in block ciphers
Sergey Agievich
|
Download |
On some properties of an XSL-network
Alexey Kurochkin
|
Algebraic Aspects
|
Download |
Pseudorandom generators based on shift registers over finite commutative rings (invited talk)
Oleg Kozlitin
|
Download |
Some properties of modular addition
Victoria Vysotskaya
|
Download |
New classes of 8-bit permutations based on a butterfly structure
Denis Fomin
|
Download |
On a new classification of the Boolean functions
Sergey Fedorov
|
|
Rump-session |
Download |
(Most) Post-Quantum Bugs are just Plain Old Bugs
Markku-Juhani O. Saarinen
|
Download |
About project of national standard "Protocol of IoT for the interchanging data in narrowband spectrum (NB-Fi)"
Vladislav Nozdrunov
|
Download |
Research of statistical properties of the developped pseudorandom sequence generator
Kunbolat Algazy
|
Download |
Some properties of Boolean functions related to plane approximations
Evgeny Alekseev
|
Download |
Trusted Cryptographic Tools Locking
Vadim Tsypyschev
|
Tuesday, 29.05
Cryptography and «Digital economy»
|
Download |
Cryptography for the society. Protections problems in the eyes of ordinary users
Dmitry Malinkin
|
Blockchain in Russia and the world a year later
|
Download |
From "Hype" to practice (invited talk)
Maxim Shevchenko
|
Download |
Securely Scaling Distributed Ledger Systems (invited talk)
Philipp Jovanovic
|
Download |
An authentication language for blockchain based on sigma-protocols enhanced by boolean predicates (invited talk)
Alexander Chepurnoy
|
Symmetric cryptography III
|
Download |
Lightweight Symmetric-Key Cryptography (invited talk)
Thomas Peyrin
|
Download |
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
|
Download |
Evaluation of the maximum productivity for block encryption algorithms
Vladimir Fomichev, Alisa Koreneva, Alfinur Miftakhutdinova, Dmitry Zadorozhny
|
Public key cryptography
|
Download |
Constructing strong elliptic curves suitable for cryptographic applications
Alexey Nesterenko
|
Download |
Considering Two MAC under SIG Variants of The Basic SIGMA Protocol
Trieu Quang Phong
|
Download |
A New LWE-based Verifiable Threshold Secret Sharing Scheme
Saba Karimani, Zahra Naghdabadi, Taraneh Eghlidos, Mohammad Reza Aref
|
Wednesday, 30.05
Symmetric cryptography IV
|
Download |
Security bounds for standardized internally re-keyed block cipher modes and their practical significance
Liliya Ahmetzyanova, Evgeny Alekseev, Grigory Karpunin, Igor Oshkin, Grigory Sedov, Stanislav Smyshlyaev, Ekaterina Smyshlyaeva
|
Download |
Provably secure counter mode with related key-based internal re-keying
Evgeny Alekseev, Kirill Goncharenko, Grigory Marshalko
|
Probabilistic aspects and Applications
|
Download |
Data recovering for a neural network-based biometric authentication scheme
Vladimir Mironkin, Dmitry Bogdanov
|
Download |
Testing the NIST Statistical Test Suite on artificial pseudorandom sequences
Andrey Zubkov, Aleksandr Serov
|
|