Supported byOperatorPhoto Gallery |
MaterialsJune 4 (Tuesday)
|
| Symmetric cryptography I | |
| Download | Related-key Attack on 5-round Kuznyechik Vitaly Kiryukhin |
| Download | The Change in Linear and Differential Characteristics of Substitution Multiplied by Transposition Andrey Menyachikhin |
| Download | Linear and Differential Cryptanalysis: Another Viewpoint Fedor Malyshev and Andrey Trishin (20 min talk and 10 min discussion) |
| Symmetric cryptography II | |
| Download | The CTR Mode with Encrypted Nonces and Its Extension to AE Sergey Agievich |
| Download | MGM Beyond the Birthday Bound Denis Fomin and Alexey Kurochkin |
| Download | Improving OBDD Attacks Against Stream Ciphers Matthias Hamann and Matthias Krause, and Alexander Moch |
| Applications | |
| Download | Introducing TLS 1.3 (Invited talk) Kenneth Paterson via Skype |
| Download | On Security of TLS 1.2 Record Layer with Russian Ciphersuites Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Sedov, and Stanislav Smyshlyaev |
| Download | Fuzzy extractors security under several models of biometric data Julia Trufanova and Grigory Marshalko |
| Download | Data Embedding Based on Linear Hash Functions Boris Ryabko and Andrey Fionov |
| Panel discussion II | |
| Download | Future of Russian standardization Alexey Smirnov |
|
Rump-session
|
| Public key cryptography | |
| Download | Application of Non-associative Structures for Construction of Homomorphic Cryptosystems Sergey Katyshev and Andrey Zyazin, and Anton Baryshnikov |
| Download | Modified Gaudry-Schost Algorithm for the Two-dimensional Discrete Logarithm Problem Maksim Nikolaev |
| Download | Division Polynomials for Hyperelliptic Curves Defined by Dickson Polynomials Ekaterina Malygina and Semyon Novoselov |