Official PartnersPartnersSupported byOperatorPhoto Gallery |
ProgramJune 2nd
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Workshop |
|
|
10:00-10:10 |
Opening of the Symposium |
|
Asymmetric cryptography and Provable security |
|
|
10:10-11:00 |
Invited Talk An overview of methods for solving the discrete logarithm problem in a group of points of elliptic curve (On the occasion of 25th Anniversary of GOST R.34.10-2001 Standard) |
|
11:00-11:30 |
Joint security of VKO mechanism and GOST signature scheme in elliptic curve generic group model |
|
11:30-12:00 |
Sequential unforgeability of ElGamal blind signatures |
|
Coffee break |
|
|
Workshop |
|
|
Asymmetric cryptography and Provable security |
|
|
12:20-12:50 |
A Shannon-inspired definition of blindness |
|
12:50-13:20 |
On the UKS threat and the impact of the ability to obtain and force future ephemeral keys of honest parties on its feasibility |
|
13:20-13:50 |
Two-level multilinear hash – efficient precomputations in exchange for one bit of security (online) |
|
Symmetric cryptography |
|
|
12:20-12:50 |
On cryptographic properties and efficient implementation of MDS matrices with nontrivial automorphism groups |
|
12:50-13:20 |
On the Invariant Subspaces of Finite Field Hadamard Matrices |
|
13:20-13:50 |
On the boomerang uniformity of piecewise-monomial substitutions over the field F2n |
|
Lunch |
|
|
Workshop |
|
|
Probabilistic aspects. Andrey M. Zubkov Memorial Session |
|
|
15:00-15:05 |
Opening Remarks by the Steering Committee |
|
15:05-15:55 |
Invited Talk On some approaches to statistical testing of cryptographic generators of random and pseudorandom sequences |
|
15:55-16:25 |
Asymptotic local inversion of some random finite-state machine with a growing number of internal states |
|
16:25-16:55 |
Lower bound for the Shannon entropy for one probability-theoretic model of a cryptographic key source |
|
16:55-17:25 |
On the practical secrecy of keys formed by the emission scheme of the recovery process |
|
Workshop |
||
|
Symmetric cryptography – Analysis |
||
|
09:00-09:30 |
On the security of belt-hash and belt-compress |
|
|
09:30-10:00 |
Preimages for belt-compress and belt-hash (online) |
|
|
10:00-10:30 |
Features of the cipher Belt |
|
|
Algebraic aspects |
||
|
09:00-09:30 |
Functions over finite fields constructed using polynomials over Galois rings and the trace function |
|
|
09:30-10:00 |
On metric complements of some subclasses of bent functions |
|
|
10:00-10:30 |
On parity decision trees basic parameters and harmonic properties of Boolean functions connection |
|
|
Coffee break |
||
|
Workshop |
||
|
Symmetric cryptography – Analysis |
||
|
10:50-11:20 |
Invariant Subspace Attack on the GOST 28147-89 Block Cipher |
|
|
11:20-11:50 |
On the limits of integral attacks on block cryptographic algorithms |
|
|
11:50-12:20 |
Probabilistic Analysis of Linear Approximation Correlation for Unbalanced Feistel Networks with Modular Reduction |
|
|
12:20-12:50 |
Inseparability of Internal Rekeying and Encryption Mode Analysis |
|
|
Postquantum cryptography |
||
|
10:50-11:20 |
Full Cryptanalysis of the pqsigRM Signature Scheme |
|
|
11:20-11:50 |
Cryptanalysis of the McEliece cryptosystem based on elliptic codes: a review of known methods and a new structural attack with hints |
|
|
11:50-12:20 |
Properties of codes defined by quadratic relations and applications to linear code decoding |
|
|
12:20-12:50 |
Security analysis of post-quantum hash-based signatures on the composition of random mappings |
|
|
Lunch |
||
|
Practical Cryptography Day |
||
|
Symmetric cryptography |
||
|
18:00-18:30 |
On the search for cyclic permutations using heuristic methods and digraph representation (online) |
|
|
18:30-19:00 |
Rump Session |
|
|
Workshop |
|
|
Symmetric cryptography |
|
|
10:00-10:30 |
The PRAPOR-K Russian Family Lightweight Block Ciphers |
|
10:30-11:00 |
A new family of block ciphers Ramen-K |
|
11:00-11:30 |
Hybrid and Fully Bitsliced: Two Approaches to Implementing MGM |