Официальные партнерыПартнерыПри поддержкеОператорФотогалерея |
ProgramJune 3rd
|
Workshop |
|
14.00-14.10 |
Welcome Talk by Steering Committee |
Algebraic aspects |
|
14.10-14.30 |
Weight estimates of monotonic bijunctive functions in connection with the method of bijunctive implications for solving systems of Boolean equations |
14.30-15.00 |
Decompositions of negabent functions and related properties |
15.00-15.30 |
On the cardinality of some classes generated by Maiorana-McFarland bent functions |
Coffee break, |
|
Workshop |
|
Algebraic and Probabilistic aspects |
|
16.00-16.20 |
Transitive piecewise polynomial transformations over primary residue rings and some statistical properties of the generated sequences |
16.20-16.40 |
A probability-theoretic model of the local invertibility of the Boolean shift register with a Boolean function |
16.40-17.10 |
On the practical secrecy of keys formed from instantaneous values of a stationary Gaussian process |
17.10-17.40 |
Corrections of two-level testing approach to random number generators ensuring its reliability on the example of Frequency test from NIST SP800-22 test suite |
Workshop |
|
Quantum cryptanalysis and Postquantum cryptography |
|
09.00-09.50 |
Invited Talk Approaches, Models, and Challenges in the Analysis of Cryptographic Algorithms and Protocols in the Context of the Quantum Threat (invited talk) |
09.50-10.20 |
Quantum circuits GOST 34.10-2018, GOST 34.11-2018 and GOST 34.12-2018 with minimum qubits |
10.20-10.50 |
Fiat-Shamir Code |
10.50-11.10 |
An effective structural attack on the post-quantum signature scheme pqsigRM |
Coffee break |
|
Workshop |
|
Provable security |
|
11.40-12.30 |
Invited Talk Provable security: main concepts, significance and open problems (invited talk) |
12.30-13.00 |
On the security of DUKPT key derivation function |
13.00-13.30 |
AEAD-mode MXP — beyond the birthday bound without loss of efficiency |
13.30-14.00 |
On the security of one anonymous authentication protocol |
Lunch |
|
Workshop |
|
Algebraic aspects |
|
15.00-15.30 |
Known and commutative-group 5-configurations |
15.30-16.00 |
Linear characteristics of functions over Galois rings Oleg Kamlovskii |
Symmetric cryptography – Analysis |
|
16.00-16.20 |
Estimations of nonlinearity of linear approximation with big dimension |
16.20-16.40 |
Asymptotic Distribution of the Correlation Coefficients of Linear Approximation |
Practical Cryptography |
|
Discussion 10:00-12:00 In Russian |
|
Coffee break |
|
Roundtable Discussion 12:30-14:30 In Russian |
|
Lunch |
|
Roundtable Discussion 15:30-17:00 In Russian |
|
Break |
|
Workshop |
|
Symmetric cryptography |
|
17.15-17.35 |
Generation of recursive MDS matrices with irreducible characteristic polynomial from known ones: a practical approach |
17.35-18.05 |
An Analysis of Component Functions: Replicating Kuznyechik's S-Box Properties Through Heuristic Method |
18.05-18.45 |
Rump Session |
Workshop |
|
Algebraic aspects |
|
10.00-10.30 |
Adapted spectral-diffusional method for constructing special type matrices with high values of branch number |
10.30-11.00 |
Automorphism groups of MDS-matrices |
implementation of cryptographic algorithms and protocols |
|
11.00-11.20 |
A Probabilistic Model for GPU-Accelerated Cryptographic Algorithm Execution |
11.20-11.40 |
Bitsliced implementations of the «Streebog» and «Kuznechik» algorithms |
Coffee break |
|
Workshop |
|
Postquantum cryptography |
|
12.10-12.40 |
Towards a Proof-of-Possession Mechanism for Binary Goppa Code-Based KEM |
12.40-13.10 |
On the connection between the permutation equivalence of linear codes problem and the isomorphism of quadratic forms problem |
13.10-13.30 |
On Constructing Quasi-Cyclic Subfield Subcodes of Dual Elliptic Codes with Known Parameter |
13.30-13.40 |
Conclusion Talk by Steering Committee |