Supported byOperatorPhoto Gallery |
ProgramJune 3 (Monday)
|
09.30 09.40 |
Welcome speech |
Special session in commemoration of M. M. Glukhov | |
09.40 10.10 |
Main directions of research and pedagogical activities of M.M. Glukhov's scientific school Andrey Pichkur and Alexey Tarasov |
10.10 10.40 |
On Isometric Mappings of the Set of All Boolean Functions into Itself Which Preserve Self-duality and the Rayleigh Quotient Aleksandr Kutsenko |
10.40 11.10 |
On the Properties of Boolean Functions Related to Planar Approximation of the Filter Generator Evgeny Alekseev and Lyudmila Kushchinskaya |
11.10 11.40 |
The MOR Cryptosystem in Orthogonal and Symplectic Groups in Odd Characteristic Ayan Mahalanobis and Anupam Singh and Pralhad Shinde, and Sushil Bhunia |
11.40 12.00 |
Coffee break |
Algebraic and Probabilistic Aspects | |
12.00 12.20 |
Random Number Generators Based on Permutations Can Pass the Collision Test Alexey Urivskiy |
12.20 12.50 |
Probabilistic Properties of Modular Addition Victoria Vysotskaya |
12.50 13.10 |
On the Way of Constructing 2n-bit Permutations From n-bit Ones Denis Fomin |
13.10 13.30 |
Matrix-graph approach for studying nonlinearity of transformations on vector space Vladimir Fomichev |
13.30 14.30 |
Lunch |
Quantum and Postquantum | |
14.30 15.10 |
How to prove a secret isogeny (invited talk) Luca de Feo |
15.10 15.40 |
Limonnitsa: Making Limonnik-3 Postquantum Sergey Grebnev |
15.40 16.10 |
Key Distribution. Episode 1: Quantum Menace Grigory Marshalko and Vladimir Rudskoy |
16.10 16.40 |
Optimization of S-boxes GOST R 34.12-2015 "Magma" quantum circuits without ancilla qubits Denis Denisenko and Marina Nikitenkova |
16.40 17.00 |
Coffee break |
Panel discussion I | |
17.00 18.00 |
Museum of Cryptography: intentions, plans, discussions Vasiliy Shishkin and Lidiya Lobanova |
18.00 21.00 |
Welcome party |
Symmetric cryptography I | |
10.00 10.30 |
Related-key Attack on 5-round Kuznyechik Vitaly Kiryukhin |
10.30 10.50 |
The Change in Linear and Differential Characteristics of Substitution Multiplied by Transposition Andrey Menyachikhin |
10.50 11.20 |
Linear and Differential Cryptanalysis: Another Viewpoint Fedor Malyshev and Andrey Trishin (20 min talk and 10 min discussion) |
11.20 11.40 |
Coffee break |
Symmetric cryptography II | |
11.40 12.10 |
The CTR Mode with Encrypted Nonces and Its Extension to AE Sergey Agievich |
12.10 12.30 |
MGM Beyond the Birthday Bound Denis Fomin and Alexey Kurochkin |
12.30 13.00 |
Improving OBDD Attacks Against Stream Ciphers Matthias Hamann and Matthias Krause, and Alexander Moch |
13.00 14.00 |
Lunch |
Applications | |
14.00 14.40 |
Introducing TLS 1.3 (Invited talk) Kenneth Paterson via Skype |
14.40 15.10 |
On Security of TLS 1.2 Record Layer with Russian Ciphersuites Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Sedov, and Stanislav Smyshlyaev |
15.10 15.30 |
Fuzzy extractors security under several models of biometric data Julia Trufanova and Grigory Marshalko |
15.30 16.00 |
Data Embedding Based on Linear Hash Functions Boris Ryabko and Andrey Fionov |
16:00 16:20 |
Coffee break |
Panel discussion II | |
16.20 16.50 |
Future of Russian standardization Alexey Smirnov |
16.50 16.55 |
Track change |
16.55 17.45 |
Rump-session |
18:30 | Transfer to the Russ Hotel |
19:00 21:30 |
Gala Dinner |
21:30 | Transfer to the VOLNA Hotel |
Popular science lectures on cryptography (for Russian-speaking participants) | |
13:05 14:00 |
Lunch |
Sightseeing program |
Public key cryptography | |
10.00 10.30 |
Application of Non-associative Structures for Construction of Homomorphic Cryptosystems Sergey Katyshev and Andrey Zyazin, and Anton Baryshnikov |
10.30 11.00 |
Modified Gaudry-Schost Algorithm for the Two-dimensional Discrete Logarithm Problem Maksim Nikolaev |
11.00 11.30 |
Division Polynomials for Hyperelliptic Curves Defined by Dickson Polynomials Ekaterina Malygina and Semyon Novoselov |
Checkout (until 12:00), transfers to the airport Recommended flights Kaliningrad - Moscow 15:25-18:20 (S7) 16:00-19:00 (Aeroflot) 17:45-20:45 (Ural Airlines) |