Supported byOperatorPhoto Gallery |
Program1 JuneConference venue: Presidium of Russian Academy of Sciences
|
10.00 10.30 |
Registration |
11.00 13.00 |
Plenary Meeting |
13.00 15.00 |
Buffet |
Symmetric cryptography – Modes of operations I | |
09.30 10.00 |
Some Properties of One Mode of Operation of Block Ciphers Dmitriy Bogdanov and Vladislav Nozdrunov |
10.00 10.30 |
Misuse-resistant MGM2 Mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, and Stanislav Smyshlyaev |
10.30 11.00 |
IQRA: Incremental Quadratic Re-keying friendly Authentication scheme Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Lidiia Nikiforova, and Stanislav Smyshlyaev |
11.00 11.20 |
Coffee break |
11.20 12.00 |
French-Russian Scientific Cooperation in Cryptography and Information Security Vladimir Fomichev and Alisa Koreneva Invited talk |
Algebraic and Probabilistic aspects I | |
12.00 12.30 |
Two Variants of Lempel-Ziv Criterion and Their Reasoning Vasilii Kruglov and Vladimir Mikhailov |
12.30 13.00 |
On Derivatives of Boolean Bent Functions Alexander Shaporenko |
13.00 14.00 |
Lunch |
Symmetric cryptography – Permutations and Substitutions | |
14.00 14.30 |
On Differential Uniformity of Permutations Derived Using a Generalized Construction Maria Kovrizhnykh and Denis Fomin |
14.30 15.00 |
On the Generation of Cryptographically Strong Substitution Boxes Alejandro Freyre Echevarría (online) |
15.00 15.30 |
Constructing Involutions Specifying Their Coordinate Functions Daniel Humberto, Hernández Piloto, and Oliver Coy Puente (online) |
Track change | |
Algebraic and Probabilistic aspects II | |
15.30 16.00 |
On Some Applications of the Curvature of Boolean Functions Reynier Antonio de la Cruz Jiménez (online) |
16.00 16.30 |
On the Properties of Some Sequences Generated by Shift Registers and Latin Squares Ramses Rodríguez Aulet and Adrián Alfonso Peñate (online) |
16.30 17.00 |
Nonlinearity of Bent Functions Over Finite Fields Vladimir Ryabov (online) |
17.00 17.20 |
Coffee break |
Symmetric cryptography – Modes of operations II | |
17.20 17.50 |
The Re-keying Mechanism COM-CTR+D Daymé Almeida Echevarria, Alejandro Freyre Echevarría, and Adrian Alfonso Peñate (online) |
17.50 18.20 |
Format-Preserving Encryption: a Survey Kirill Tsaregorodtsev |
Applications | |
18.20 19.00 |
You Only Speak Once: Private Computing on Public Blockchains Hugo Krawczyk Invited talk (online) |
Symmetric cryptography – Analysis | |
09.30 10.00 |
On the Impossibility of an Invariant Attack on Kuznyechik Denis Fomin |
10.00 10.30 |
Algebraic Cryptanalysis of Round-reduced Lightweight Ciphers Simon and Speck Aleksandr Kutsenko, Natalya Atutova, Darya Zyubina, Ekaterina Maro, and Stepan Filippov |
Algebraic and Probabilistic aspects III | |
10.30 11.00 |
Streebog Compression Function as PRF in Secret-key Settings Vitaly Kiryukhin |
11.00 11.30 |
The Duality Mapping and Unitary Operators Acting on the Set of All Generalized Boolean Functions Aleksandr Kutsenko |
11.30 11.50 |
Coffee break |
11.50 12.20 |
Special reports from Academy of Cryptography of the Russian Federation |
12.20 13.00 |
Rump session |
13.00 14.00 |
lunch |
14.00 18.00 |
Round table «Cryptography for citizens and government» |
PQ | |
09.30 10.00 |
Some Remarks on the Security of Isogeny-based Cryptosystems Sergey Grebnev |
10.00 10.30 |
The Hadamard Square of Concatenated Linear Codes Ivan Chizhov and Alexandra Davletshina |
10.30 11.10 |
Towards post-quantum cryptographic standards, focus on code-based cryptography Jean-Christophe Deneuville Invited talk (online) |
11.10 11.30 |
Coffee break |
Public key cryptography | |
11.30 12.00 |
Small Scalar Multiplication on Weierstrass Curves Using Division Polynomials Sergey Agievich, Stanislav Poruchnik, and Vladislav Semenov |
12.00 12.30 |
One “Short” Signature Scheme’s Security Properties Anton Guselev |