June 7, Wednesday
|
Protocols
|
Download |
Blind signature as a shield against backdoors in smart-cards
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko and Stanislav Smyshlyaev
|
Download |
Two-party GOST in two parts: fruitless search and fruitful synthesis
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova and Stanislav Smyshlyaev
|
Download |
Probing the security landscape for authenticated key establishment protocols
Evgeny Alekseev and Sergey Kyazhin
|
Download |
On the confidentiality and integrity of ECIES scheme
Kirill Tsaregorodtsev
|
Symmetric – Linear transformations
|
Download |
Circulant matrices over F_2 and their use for construction of effective linear transformations with high branch number
Stepan Davydov and Yuri Shkuratov
|
Download |
Matrix-vector product of a new class of quasi-involutory MDS matrices
Pablo Freyre Arrozarena, Ernesto Dominguez Fiallo and Ramses Rodriguez Aulet
|
Download |
Construction of linear involutory transformations over finite fields through the multiplication of polynomials modulus a polynomial
Ramsés Rodríguez Aulet, Pablo Freyre Arrozarena and Alejandro Freyre Echevarría
|
Protocols
|
Download |
On security aspects of CRISP
Vitaly Kiryukhin
|
Download |
On the security of one RFID authentication protocol
Anastasiia Chichaeva, Stepan Davydov, Ekaterina Griboedova and Kirill Tsaregorodtsev
|
Quantum and postquantum
|
Download |
A simple quantum circuit for the attack which shows vulnerability of quantum cryptography with phase-time coding
|
Download |
The McEliece-type Cryptosystem based on D-codes
Yuriy Kosolapov and Evgeniy Lelyuk
|
RUMP SESSION
|
Download |
On the rekeying (in)separability
Kirill Tsaregorodtsev
|
Download |
On one definition of bit security for decision problems
Sergey Kyazhin
|
Download |
It is impossible to construct an internal re-keying that is suitable for any encryption mode
Evgeny Alekseev
|
Download |
Вычисление кратной точки с использованием комплексных обедов эндоморфмизмов
Alexey Nesterenko
|
Download |
Об одной модели нарушителя, возникающей при анализе систем полнодискового шифрования
Vasily Nikolaev
|
Download |
Quantum-enhanced symmetric cryptanalysis for S-AES
Alexey Moiseevskiy
|
June 8, Thursday
|
Symmetric – Permutations
|
Download |
Invited talk
Adapted spectral-differential method for constructing differentially 4-uniform piecewise-linear substitutions, orthomorphisms, involutions over the field F2n
Andrey Menyachikhin
|
Download |
Class of piecewise-monomial mappings: differentially 4-uniform permutations on F28 with graph algebraic immunity 3 exist
Dmitry Burov, Sergey Kostarev and Andrey Menyachikhin
|
Download |
On the Bit-Slice representations of some nonlinear bijective transformations
Oliver Coy Puente and Reynier A. de la Cruz Jiménez
|
Download |
Computational work for some TU-based permutations
Denis Fomin and Dmitriy Trifonov
|
Download |
On one way of constructing unbalanced TU-based permutations
Denis Fomin
|
June 9, Friday
|
Mathematical aspects
|
Download |
On properties of generalized bent functions and decomposition of Boolean bent functions
Aleksandr Kutsenko
|
Download |
Reliability of two-level testing approach of the NIST SP800-22 test suite and two-sided estimates for quantile of binomial distribution
Aleksandr Serov
|
Symmetric – Analysis
|
Download |
Fast correlation attack for GRAIN-128AEAD with fault
Sergei Katishev and Maxime Malov
|
Download |
Distinguishing attacks on Feistel ciphers based on linear and differential attacks
Denis Fomin
|
Download |
The PRF pCollapserARX optimal cryptographic characteristic automated search by CASCADA
Sergey Polikarpov, Vadim Prudnikov and Konstantin Rumyantsev
|
Download |
About "k-bit security" of MACs based on hash function Streebog
Vitaly Kiryukhin
|
Download |
Streebog as a Random Oracle
Liliya Akhmetzyanova, Alexandra Babueva and Andrey Bozhko
|
Download |
Alternative security models for pseudorandom functions
Kirill Tsaregorodtsev
|