Supported byOperatorPhoto Gallery |
Program 20September 15 (Tuesday)
|
| Symmetric cryptography – Analysis | |
| 09.40 10.10 |
Extending AES Improvements: A Proposal for Alpha-MAC in View of Collision Resistance Adrián Alfonso Peñate and Pablo Freyre Arrozarena |
| 10.10 10.40 |
Fault-Assisted Side Channel Analysis of HMAC-Streebog Mabin Joseph, Gautham Sekar,and R. Balasubramanian |
| 10.40 11.00 |
Coffee break |
| 11.00 11.30 |
On group generated by ciphers based on Feistel network Vladimir Antipkin and Dmitriy Pasko |
| 11.30 12.00 |
An algorithm for bounding non-minimum weight differentials in 2 round LSX-ciphers Vitaly Kiryukhin |
| 12.00 12.30 |
Protection against adversarial attacks with randomization of recognition algorithm Svetlana Koreshkova and Grigory Marshalko |
| 12.30 13.30 |
Lunch |
| 13.30 18.30 |
Practical Cryptography (collaboratively with PKI-FORUM Russia)
|
| 18.30 19.30 |
Dinner |
| 19.30 22.00 |
Leasure Program |
| Quantum and Postquantum Сryptography and Сryptanalysis | |
| 10.00 10.40 |
Quantum Security of Feistel Ciphers (invited talk) Tetsu Iwata |
| 10.40 11.10 |
Quantum Differential and Linear Cryptanalysis Denis Denisenko |
| 11.10 11.50 |
Elementary quantum cryptography (invited talk) Igor Arbekov |
| 11.50 12.10 |
Coffee break |
| 12.10 12.40 |
Characteristics of Hadamard square of Reed-Muller subcodes of special type Victoria Vysotskaya |
| 12.40 13.10 |
IND-CCA2 secure McEliece-type modification in the standard model Yury Kosolapov and Oleg Turchenko |
| 13.10 13.40 |
Information theoretically secure key sharing protocol executing with constant noiseless public channels Valery Korzhik, Vladimir Starostin, Muaed Kabardov, Aleksandr Gerasimovich, Victor Yakovlev, and Aleksei Zhuvikin |
| 13.40 14.40 |
Lunch |
| 14.40 15.10 |
A digital signature scheme mCFS^QC-LDPC based on QC-LDPC codes Ernesto Dominguez Fiallo |
| 15.10 15.40 |
Security analysis of the W-OTS+ signature scheme: Updating security bounds Mikhail Kudinov, Evgeniy Kiktenko, and Aleksey Fedorov |
| 15.40 16.00 |
Coffee break |
| Asymmetric cryptography | |
| 16.00 16.30 |
On methods of shortening ElGamal-type signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, and Stanislav Smyshlyaev |
| 16.30 17.00 |
Double point compression for elliptic curves of j-invariant 0 Dmitrii Koshelev |
| 17.00 17.40 |
Rump session |