Supported byOperatorPhoto Gallery |
MaterialsJune 4 (Tuesday)
|
Symmetric cryptography I | |
Download | Related-key Attack on 5-round Kuznyechik Vitaly Kiryukhin |
Download | The Change in Linear and Differential Characteristics of Substitution Multiplied by Transposition Andrey Menyachikhin |
Download | Linear and Differential Cryptanalysis: Another Viewpoint Fedor Malyshev and Andrey Trishin (20 min talk and 10 min discussion) |
Symmetric cryptography II | |
Download | The CTR Mode with Encrypted Nonces and Its Extension to AE Sergey Agievich |
Download | MGM Beyond the Birthday Bound Denis Fomin and Alexey Kurochkin |
Download | Improving OBDD Attacks Against Stream Ciphers Matthias Hamann and Matthias Krause, and Alexander Moch |
Applications | |
Download | Introducing TLS 1.3 (Invited talk) Kenneth Paterson via Skype |
Download | On Security of TLS 1.2 Record Layer with Russian Ciphersuites Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Sedov, and Stanislav Smyshlyaev |
Download | Fuzzy extractors security under several models of biometric data Julia Trufanova and Grigory Marshalko |
Download | Data Embedding Based on Linear Hash Functions Boris Ryabko and Andrey Fionov |
Panel discussion II | |
Download | Future of Russian standardization Alexey Smirnov |
Rump-session
|
Public key cryptography | |
Download | Application of Non-associative Structures for Construction of Homomorphic Cryptosystems Sergey Katyshev and Andrey Zyazin, and Anton Baryshnikov |
Download | Modified Gaudry-Schost Algorithm for the Two-dimensional Discrete Logarithm Problem Maksim Nikolaev |
Download | Division Polynomials for Hyperelliptic Curves Defined by Dickson Polynomials Ekaterina Malygina and Semyon Novoselov |