Official Partners

Partners

Supported by

Operator

Photo Gallery

Program

June 2nd
(Tuesday)

Workshop
10:00 – 12:00

10:00-10:10

Opening of the Symposium
Welcome Talk

Asymmetric cryptography and Provable security

10:10-11:00

Invited Talk

An overview of methods for solving the discrete logarithm problem in a group of points of elliptic curve (On the occasion of 25th Anniversary of GOST R.34.10-2001 Standard)
Alexey Nesterenko

11:00-11:30

Joint security of VKO mechanism and GOST signature scheme in elliptic curve generic group model
Aleksandr Bakharev, Aleksey Drynkin, and Kirill Tsaregorodtsev

11:30-12:00

Sequential unforgeability of ElGamal blind signatures
Alexandra Babueva, Ilya Makhonin, Stanislav Smyshlyaev, and Mariia Utekhina

Coffee break
12:00 – 12:20

Workshop
12:20 – 13:50 (parallel sessions)

Asymmetric cryptography and Provable security

12:20-12:50

A Shannon-inspired definition of blindness
Liliya Akhmetzyanova, Stanislav Smyshlyaev, and Mariia Utekhina

12:50-13:20

On the UKS threat and the impact of the ability to obtain and force future ephemeral keys of honest parties on its feasibility
Evgeny Alekseev, Alena Mukhortova, Stanislav Smyshlyaev, and Sergey Kyazhin

13:20-13:50

Two-level multilinear hash – efficient precomputations in exchange for one bit of security (online)
Vitaly Kiryukhin

Symmetric cryptography

12:20-12:50

On cryptographic properties and efficient implementation of MDS matrices with nontrivial automorphism groups
Dmitry Burov and Sergey Kostarev

12:50-13:20

On the Invariant Subspaces of Finite Field Hadamard Matrices
Stepan Davydov and Sergey Kostarev

13:20-13:50

On the boomerang uniformity of piecewise-monomial substitutions over the field F2n
Yuriy Kalinin, Aleksandr Kutsenko, and Andrey Menyachikhin

Lunch
14:00 – 15:00

Workshop
15:00 – 17:25

Probabilistic aspects. Andrey M. Zubkov Memorial Session

15:00-15:05

Opening Remarks by the Steering Committee

15:05-15:55

Invited Talk

On some approaches to statistical testing of cryptographic generators of random and pseudorandom sequences
Yuriy Kharin and Vladimir Palukha

15:55-16:25

Asymptotic local inversion of some random finite-state machine with a growing number of internal states
Vladimir Vinokurov

16:25-16:55

Lower bound for the Shannon entropy for one probability-theoretic model of a cryptographic key source
Vladimir Mironkin

16:55-17:25

On the practical secrecy of keys formed by the emission scheme of the recovery process
Dmitriy Bogdanov

 

June 4th
(Thursday)

Workshop
09:00 – 10:30 (parallel sessions)

Symmetric cryptography – Analysis

09:00-09:30

On the security of belt-hash and belt-compress
Sergey Agievich

09:30-10:00

Preimages for belt-compress and belt-hash (online)
Vitaly Kiryukhin

10:00-10:30

Features of the cipher Belt
Fedor Malyshev

Algebraic aspects

09:00-09:30

Functions over finite fields constructed using polynomials over Galois rings and the trace function
Oleg Kamlovskii

09:30-10:00

On metric complements of some subclasses of bent functions
Nikolay Kolomeec and Natalia Tokareva

10:00-10:30

On parity decision trees basic parameters and harmonic properties of Boolean functions connection
Elena Kutyreva and Oleg Logachev

Coffee break
10:30 – 10:50

Workshop
10:50 – 12:50 (parallel sessions)

Symmetric cryptography – Analysis

10:50-11:20

Invariant Subspace Attack on the GOST 28147-89 Block Cipher
Stepan Davydov

11:20-11:50

On the limits of integral attacks on block cryptographic algorithms
Anastasiia Chichaeva and Vasily Shishkin

11:50-12:20

Probabilistic Analysis of Linear Approximation Correlation for Unbalanced Feistel Networks with Modular Reduction
Alexander Kargin and Denis Fomin

12:20-12:50

Inseparability of Internal Rekeying and Encryption Mode Analysis
Aleksandr Bakharev and Kirill Tsaregorodtsev

Postquantum cryptography

10:50-11:20

Full Cryptanalysis of the pqsigRM Signature Scheme
Andrey Rubenkov

11:20-11:50

Cryptanalysis of the McEliece cryptosystem based on elliptic codes: a review of known methods and a new structural attack with hints
Artyom Kuninets, Ekaterina Malygina, and Evgeniy Melnichuk

11:50-12:20

Properties of codes defined by quadratic relations and applications to linear code decoding
Ivan Chizhov

12:20-12:50

Security analysis of post-quantum hash-based signatures on the composition of random mappings
Alexey Zelenetsky and Oleg Turchenko

Lunch
13:00 – 14:00

Practical Cryptography Day
14:00 – 18:00

Symmetric cryptography

18:00-18:30

On the search for cyclic permutations using heuristic methods and digraph representation (online)
Alejandro Freyre Echevarría, Ramses Rodríguez Aulet and Adrián Alfonso Peñate

18:30-19:00

Rump Session

 

June 5th
(Friday)

Workshop
10:00 – 11:30

Symmetric cryptography

10:00-10:30

The PRAPOR-K Russian Family Lightweight Block Ciphers
Andrey Dmukh and Dmitry Trifonov

10:30-11:00

A new family of block ciphers Ramen-K
Andrey Dmukh, Dmitry Pasko, and Danil Peshkov

11:00-11:30

Hybrid and Fully Bitsliced: Two Approaches to Implementing MGM
Anatoly Solovyev and Denis Fomin