Official PartnersPartnersSupported byOperatorPhoto Gallery |
Materials'25June 3rd (Tuesday)
|
Quantum cryptanalysis and Postquantum cryptography |
|
Invited Talk Approaches, Models, and Challenges in the Analysis of Cryptographic Algorithms and Protocols in the Context of the Quantum Threat (invited talk) |
|
Download |
Quantum circuits GOST 34.10-2018, GOST 34.11-2018 and GOST 34.12-2018 with minimum qubits |
Download |
Fiat-Shamir Code |
Download |
An effective structural attack on the post-quantum signature scheme pqsigRM |
Provable security |
|
Download |
Invited Talk Provable security: main concepts, significance and open problems (invited talk) |
Download |
On the security of DUKPT key derivation function |
Download |
AEAD-mode MXP — beyond the birthday bound without loss of efficiency |
Download |
On the security of one anonymous authentication protocol |
Algebraic aspects |
|
Download |
Known and commutative-group 5-configurations |
Download |
Linear characteristics of functions over Galois rings |
Symmetric cryptography – Analysis |
|
Download |
Estimations of nonlinearity of linear approximation with big dimension |
Download |
Asymptotic Distribution of the Correlation Coefficients of Linear Approximation |
Practical Cryptography |
|
Symmetric cryptography |
|
Generation of recursive MDS matrices with irreducible characteristic polynomial from known ones: a practical approach |
|
Download |
An Analysis of Component Functions: Replicating Kuznyechik's S-Box Properties Through Heuristic Method |
Rump Session |
|
Download |
Threshold signatures and their applications in finance |
Download |
Implementation of RNG in mobile mass Crypto Software |
Download |
Ring Oscillator-Based Random Number Generation: Reality and Model |
Download |
Generalizations of Diffie-Hellmann protocol |
Download |
DUKPT: Demonstration Uncovering Key Proofs in Theory |
Algebraic aspects |
|
Download |
Adapted spectral-diffusional method for constructing special type matrices with high values of branch number |
Download |
Automorphism groups of MDS-matrices |
Implementation of cryptographic algorithms and protocols |
|
Download |
A Probabilistic Model for GPU-Accelerated Cryptographic Algorithm Execution |
Download |
Bitsliced implementations of the «Streebog» and «Kuznechik» algorithms |
Postquantum cryptography |
|
Towards a Proof-of-Possession Mechanism for Binary Goppa Code-Based KEM |
|
Download |
On the connection between the permutation equivalence of linear codes problem and the isomorphism of quadratic forms problem |
Download |
On Constructing Quasi-Cyclic Subfield Subcodes of Dual Elliptic Codes with Known Parameter |