Partners

Supported by

Operator

Photo Gallery

Materials

June 4 (Tuesday)

  Special session in commemoration of M. M. Glukhov
Download Main directions of research and pedagogical activities of M.M. Glukhov's scientific school
Andrey Pichkur and Alexey Tarasov
Download On Isometric Mappings of the Set of All Boolean Functions into Itself Which Preserve Self-duality and the Rayleigh Quotient
Aleksandr Kutsenko
Download On the Properties of Boolean Functions Related to Planar Approximation of the Filter Generator
Evgeny Alekseev and Lyudmila Kushchinskaya
Download The MOR Cryptosystem in Orthogonal and Symplectic Groups in Odd Characteristic
Ayan Mahalanobis and Anupam Singh and Pralhad Shinde, and Sushil Bhunia
  Algebraic and Probabilistic Aspects
Download Random Number Generators Based on Permutations Can Pass the Collision Test
Alexey Urivskiy
Download Probabilistic Properties of Modular Addition
Victoria Vysotskaya
Download On the Way of Constructing 2n-bit Permutations From n-bit Ones
Denis Fomin
Download Matrix-graph approach for studying nonlinearity of transformations on vector space
Vladimir Fomichev
  Quantum and Postquantum
Download How to prove a secret isogeny (invited talk)
Luca de Feo
Download Limonnitsa: Making Limonnik-3 Postquantum
Sergey Grebnev
Download Key Distribution. Episode 1: Quantum Menace
Grigory Marshalko and Vladimir Rudskoy
Download Optimization of S-boxes GOST R 34.12-2015 "Magma" quantum circuits without ancilla qubits
Denis Denisenko and Marina Nikitenkova
  Panel discussion I
Download Museum of Cryptography: intentions, plans, discussions
Vasiliy Shishkin and Lidiya Lobanova



June 5 (Wednesday)

  Symmetric cryptography I
Download Related-key Attack on 5-round Kuznyechik
Vitaly Kiryukhin
Download The Change in Linear and Differential Characteristics of Substitution Multiplied by Transposition
Andrey Menyachikhin
Download Linear and Differential Cryptanalysis: Another Viewpoint
Fedor Malyshev and Andrey Trishin (20 min talk and 10 min discussion)
  Symmetric cryptography II
Download The CTR Mode with Encrypted Nonces and Its Extension to AE
Sergey Agievich
Download MGM Beyond the Birthday Bound
Denis Fomin and Alexey Kurochkin
Download Improving OBDD Attacks Against Stream Ciphers
Matthias Hamann and Matthias Krause, and Alexander Moch
  Applications
Download Introducing TLS 1.3 (Invited talk)
Kenneth Paterson via Skype
Download On Security of TLS 1.2 Record Layer with Russian Ciphersuites
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Sedov, and Stanislav Smyshlyaev
Download Fuzzy extractors security under several models of biometric data
Julia Trufanova and Grigory Marshalko
Download Data Embedding Based on Linear Hash Functions
Boris Ryabko and Andrey Fionov
  Panel discussion II
Download Future of Russian standardization
Alexey Smirnov
 

Rump-session

  • An alforithm for finding the Branch Numbers of Invertible Boolean Matrices (Download)
  • Prtotocol for detection of hidden discredit of signature secret key (Download)
  • IACR Summer school on post-quantum cryptography (Download)
  • Исследование условий применимости атаки Винера на криптосистему RSA (Download)

June 7 (Friday)

  Public key cryptography
Download Application of Non-associative Structures for Construction of Homomorphic Cryptosystems
Sergey Katyshev and Andrey Zyazin, and Anton Baryshnikov
Download Modified Gaudry-Schost Algorithm for the Two-dimensional Discrete Logarithm Problem
Maksim Nikolaev
Download Division Polynomials for Hyperelliptic Curves Defined by Dickson Polynomials
Ekaterina Malygina and Semyon Novoselov