Supported byOperatorPhoto Gallery |
Program 20September 15 (Tuesday)
|
Symmetric cryptography – Analysis | |
09.40 10.10 |
Extending AES Improvements: A Proposal for Alpha-MAC in View of Collision Resistance Adrián Alfonso Peñate and Pablo Freyre Arrozarena |
10.10 10.40 |
Fault-Assisted Side Channel Analysis of HMAC-Streebog Mabin Joseph, Gautham Sekar,and R. Balasubramanian |
10.40 11.00 |
Coffee break |
11.00 11.30 |
On group generated by ciphers based on Feistel network Vladimir Antipkin and Dmitriy Pasko |
11.30 12.00 |
An algorithm for bounding non-minimum weight differentials in 2 round LSX-ciphers Vitaly Kiryukhin |
12.00 12.30 |
Protection against adversarial attacks with randomization of recognition algorithm Svetlana Koreshkova and Grigory Marshalko |
12.30 13.30 |
Lunch |
13.30 18.30 |
Practical Cryptography (collaboratively with PKI-FORUM Russia)
|
18.30 19.30 |
Dinner |
19.30 22.00 |
Leasure Program |
Quantum and Postquantum Сryptography and Сryptanalysis | |
10.00 10.40 |
Quantum Security of Feistel Ciphers (invited talk) Tetsu Iwata |
10.40 11.10 |
Quantum Differential and Linear Cryptanalysis Denis Denisenko |
11.10 11.50 |
Elementary quantum cryptography (invited talk) Igor Arbekov |
11.50 12.10 |
Coffee break |
12.10 12.40 |
Characteristics of Hadamard square of Reed-Muller subcodes of special type Victoria Vysotskaya |
12.40 13.10 |
IND-CCA2 secure McEliece-type modification in the standard model Yury Kosolapov and Oleg Turchenko |
13.10 13.40 |
Information theoretically secure key sharing protocol executing with constant noiseless public channels Valery Korzhik, Vladimir Starostin, Muaed Kabardov, Aleksandr Gerasimovich, Victor Yakovlev, and Aleksei Zhuvikin |
13.40 14.40 |
Lunch |
14.40 15.10 |
A digital signature scheme mCFS^QC-LDPC based on QC-LDPC codes Ernesto Dominguez Fiallo |
15.10 15.40 |
Security analysis of the W-OTS+ signature scheme: Updating security bounds Mikhail Kudinov, Evgeniy Kiktenko, and Aleksey Fedorov |
15.40 16.00 |
Coffee break |
Asymmetric cryptography | |
16.00 16.30 |
On methods of shortening ElGamal-type signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, and Stanislav Smyshlyaev |
16.30 17.00 |
Double point compression for elliptic curves of j-invariant 0 Dmitrii Koshelev |
17.00 17.40 |
Rump session |