|
Materials 2022
June 7, Tuesday
Download |
Welcome speech |
Download |
Invited talk
Cryptographic center (Novosibirsk): creation, research, perspectives
Natalia Tokareva |
Download |
Invited talk
The International Olympiad in Cryptography “Non-Stop University CRYPTO”
Anastasiya Gorodilova, Natalia Tokareva |
|
Symmetric cryptography – Analysis |
Download |
Related-key attacks on the compression function of Streebog
Vitaly Kiryukhin |
Download |
On differential characteristics modulo 2n of the composition of bitwise exclusive-or and a bit rotation
Nikolay Kolomeec, Ivan Sutormin, Denis Bykov, Matvey Panferov, and Tatiana Bonich |
|
Probabilistic aspects |
Download |
Entropically secure cipher for messages generated by Markov chains with unknown statistics
Boris Ryabko |
Download |
Two Lempel-Ziv goodness-of-fit criterions for nonequiprobable random binary sequences
Vasiliy Kruglov |
Download |
Experimental study of NIST Statistical Test Suite ability to detect long repetitions in binary sequences
Andrei Zubkov and Aleksandr Serov |
Rump Session
On the constructing of XS-circuits with submaximal branch numbers
Vladislav Fedchenko and Egor Leonov
Zoo of two-side classic AKE protocols
Evgeny Alekseev, Alexandra Babueva, and Olga Zazykina
On Evolution of Qamal decryption algorithm using SWHE libraries
Ludmila Babenko, Filipp Burtyka, and Alina Trepacheva
|
|
Algebraic aspects |
Download |
On the question of nonlinearity of vectorial functions over finite fields
Vladimir Ryabov |
Download |
On subfunctions of self-dual bent functions
Aleksandr Kutsenko |
Download |
Proper families of functions and their applications
Alexei Galatenko, Valentin Nosov, Anton Pankratiev, and Kirill Tsaregorodtsev |
|
Symmetric cryptography — Design |
Download |
sMGM: parameterizable AEAD-mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, and Stanislav Smyshlyaev |
Download |
Keyed Streebog is a secure PRF and MAC
Vitaly Kiryukhin |
Download |
Effective algorithm to compute guaranteed number of activations in XS-circuits and it’s application to the cipher design
Denis Parfenov, Aleksandr Bakharev, Aleksandr Kutsenko, Aleksandr Belov, and Natalia Atutova |
June 8, Wednesday
Download |
Invited talk
On the preliminary national standard “Information technology. Cryptographic data security. Terms and definitions”
Alexandr Gorin, Alexandr Cheryomushkin, Andrei Zubkov |
|
Public key cryptography |
Download |
On the (im)possibility of ElGamal blind signatures
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, and Stanislav Smyshlyaev |
|