Partners

Supported by

Operator

Photo Gallery

Program

Monday, 28.05

10.00
10.10
Welcome speech

Symmetric cryptography I

10.10
10.50

The Rise of Authenticated Encryption (invited talk)

Phillip Rogaway

10.50
11.20

Near birthday attack on «8 bits» AEAD mode    

Liliya Ahmetzyanova, Grigory Karpunin, Grigory Sedov

11.20
11.50

Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out

Vasily Shishkin, Ivan Lavrikov

11.50
12.10
Coffee break

Symmetric cryptography II

12.10
12.40

XS-circuits in block ciphers

Sergey Agievich

12:40
13:10

On some properties of an XSL-network

Alexey Kurochkin

13:10
14:30
Lunch

Algebraic Aspects

14:30
15:10

Pseudorandom generators based on shift registers over finite commutative rings (invited talk)

Oleg Kozlitin

15:10
15:40

Some properties of modular addition

Victoria Vysotskaya

15:40
16:00
Coffee break
16:00
16:30

New classes of 8-bit permutations based on a butterfly structure

Denis Fomin

16:30
17:00

On a new classification of the Boolean functions

Sergey Fedorov

17:00
17:10
Track change
17:10
17:40
Rump-session
18:30
21:00
Welcome party

 

Tuesday, 29.05

         Cryptography and «Digital economy»

09:00
09:20

Cryptography for the society. Protections problems in the eyes of ordinary users

Dmitry Malinkin

09:20
10:30

Panel discussion I

Moderator Andrey Chapchaev

10.30
10.50
Coffee break

Blockchain in Russia and the world a year later

10:50
11:05

From "Hype" to practice (invited talk)

Maxim Shevchenko

11:05
11:45

Securely Scaling Distributed Ledger Systems (invited talk)

Philipp Jovanovic

11:45
12:00

An authentication language for blockchain based on sigma-protocols enhanced by boolean predicates (invited talk)

Alexander Chepurnoy

12:00
13:00

Panel discussion II

Moderator TBC

13:00
14:00
Lunch

Symmetric cryptography III

14:00
14:40

Lightweight Symmetric-Key Cryptography (invited talk)

Thomas Peyrin

14:40
15:10

Exact maximum expected differential and linear probability for 2-round Kuznyechik

Vitaly Kiryukhin

15:10
15:40

Evaluation of the maximum productivity for block encryption algorithms

Vladimir Fomichev, Alisa Koreneva, Alfinur Miftakhutdinova, Dmitry Zadorozhny

15:40
16:00
Coffee break

Public key cryptography

16:00
16:30

Constructing strong elliptic curves suitable for cryptographic applications

Alexey Nesterenko

16:30
17:00

Considering Two MAC under SIG Variants of The Basic SIGMA Protocol

Trieu Quang Phong

17:00
17:30

A New LWE-based Verifiable Threshold Secret Sharing Scheme

Saba Karimani, Zahra Naghdabadi, Taraneh Eghlidos, Mohammad Reza Aref

18:30
21:00
Gala dinner (GTK "Suzdal")

 

Wednesday, 30.05

         Symmetric cryptography IV

09:30
10:00

Security bounds for standardized internally re-keyed block cipher modes and their practical significance

Liliya Ahmetzyanova, Evgeny Alekseev, Grigory Karpunin, Igor Oshkin, Grigory Sedov, Stanislav Smyshlyaev, Ekaterina Smyshlyaeva

10:00
10:30

Provably secure counter mode with related key-based internal re-keying

Evgeny Alekseev, Kirill Goncharenko, Grigory Marshalko

10.30
10.50
Coffee break

Probabilistic aspects and Applications

10:50
11:20

Data recovering for a neural network-based biometric authentication scheme

Vladimir Mironkin, Dmitry Bogdanov

11:20
11:50

Testing the NIST Statistical Test Suite on artificial pseudorandom sequences

Andrey Zubkov, Aleksandr Serov