Partners

Supported by

Operator

Photo Gallery

Program

1 June

Conference venue: Presidium of Russian Academy of Sciences
(Leninskiy avenue, 32 A)

 

10.00
10.30
Registration
11.00
13.00
Plenary Meeting
13.00
15.00
Buffet



2 June

  Symmetric cryptography – Modes of operations I
09.30
10.00
Some Properties of One Mode of Operation of Block Ciphers
Dmitriy Bogdanov and Vladislav Nozdrunov
10.00
10.30
Misuse-resistant MGM2 Mode
Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, and Stanislav Smyshlyaev
10.30
11.00
IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Lidiia Nikiforova, and Stanislav Smyshlyaev
11.00
11.20
Coffee break
11.20
12.00
French-Russian Scientific Cooperation in Cryptography and Information Security 
Vladimir Fomichev and Alisa Koreneva
Invited talk
  Algebraic and Probabilistic aspects I  
12.00
12.30
Two Variants of Lempel-Ziv Criterion and Their Reasoning
Vasilii Kruglov and Vladimir Mikhailov
12.30
13.00
On Derivatives of Boolean Bent Functions
Alexander Shaporenko
13.00
14.00
Lunch
  Symmetric cryptography – Permutations and Substitutions
14.00
14.30
On Differential Uniformity of Permutations Derived Using a Generalized Construction
Maria Kovrizhnykh and Denis Fomin
14.30
15.00
On the Generation of Cryptographically Strong Substitution Boxes
Alejandro Freyre Echevarría (online)
15.00
15.30
Constructing Involutions Specifying Their Coordinate Functions
Daniel Humberto, Hernández Piloto, and Oliver Coy Puente (online)
  Track change
  Algebraic and Probabilistic aspects II
15.30
16.00
On Some Applications of the Curvature of Boolean Functions
Reynier Antonio de la Cruz Jiménez (online)
16.00
16.30
On the Properties of Some Sequences Generated by Shift Registers and Latin Squares
Ramses Rodríguez Aulet and Adrián Alfonso Peñate (online)
16.30
17.00
Nonlinearity of Bent Functions Over Finite Fields
Vladimir Ryabov (online)
17.00
17.20
Coffee break
  Symmetric cryptography – Modes of operations II
17.20
17.50
The Re-keying Mechanism COM-CTR+D
Daymé Almeida Echevarria, Alejandro Freyre Echevarría, and Adrian Alfonso Peñate (online)
17.50
18.20
Format-Preserving Encryption: a Survey
Kirill Tsaregorodtsev
  Applications
18.20
19.00
You Only Speak Once: Private Computing on Public Blockchains
Hugo Krawczyk
Invited talk (online)



3 June

  Symmetric cryptography – Analysis
09.30
10.00
On the Impossibility of an Invariant Attack on Kuznyechik
Denis Fomin
10.00
10.30
Algebraic Cryptanalysis of Round-reduced Lightweight Ciphers Simon and Speck
Aleksandr Kutsenko, Natalya Atutova, Darya Zyubina, Ekaterina Maro, and Stepan Filippov
  Algebraic and Probabilistic aspects III
10.30
11.00
Streebog Compression Function as PRF in Secret-key Settings
Vitaly Kiryukhin
11.00
11.30
The Duality Mapping and Unitary Operators Acting on the Set of All Generalized Boolean Functions
Aleksandr Kutsenko
11.30
11.50
Coffee break
11.50
12.20
Special reports from Academy of Cryptography of the Russian Federation
12.20
13.00
Rump session
13.00
14.00
lunch
14.00
18.00
Round table
«Cryptography for citizens and government»



4 June

  PQ
09.30
10.00
Some Remarks on the Security of Isogeny-based Cryptosystems
Sergey Grebnev
10.00
10.30
The Hadamard Square of Concatenated Linear Codes
Ivan Chizhov and Alexandra Davletshina
10.30
11.10
Towards post-quantum cryptographic standards, focus on code-based cryptography
Jean-Christophe Deneuville
Invited talk (online)
11.10
11.30
Coffee break
  Public key cryptography
11.30
12.00
Small Scalar Multiplication on Weierstrass Curves Using Division Polynomials
Sergey Agievich, Stanislav Poruchnik, and Vladislav Semenov
12.00
12.30
One “Short” Signature Scheme’s Security Properties
Anton Guselev