|
Program
Monday, 28.05
10.00
10.10 |
Welcome speech |
Symmetric cryptography I
|
10.10
10.50 |
The Rise of Authenticated Encryption (invited talk)
Phillip Rogaway
|
10.50
11.20 |
Near birthday attack on «8 bits» AEAD mode
Liliya Ahmetzyanova, Grigory Karpunin, Grigory Sedov
|
11.20
11.50 |
Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out
Vasily Shishkin, Ivan Lavrikov
|
11.50
12.10 |
Coffee break |
Symmetric cryptography II
|
12.10
12.40 |
XS-circuits in block ciphers
Sergey Agievich
|
12:40
13:10 |
On some properties of an XSL-network
Alexey Kurochkin
|
13:10
14:30 |
Lunch |
Algebraic Aspects
|
14:30
15:10 |
Pseudorandom generators based on shift registers over finite commutative rings (invited talk)
Oleg Kozlitin
|
15:10
15:40 |
Some properties of modular addition
Victoria Vysotskaya
|
15:40
16:00 |
Coffee break |
16:00
16:30 |
New classes of 8-bit permutations based on a butterfly structure
Denis Fomin
|
16:30
17:00 |
On a new classification of the Boolean functions
Sergey Fedorov
|
17:00
17:10 |
Track change |
17:10
17:40 |
Rump-session |
18:30
21:00 |
Welcome party |
Tuesday, 29.05
Cryptography and «Digital economy»
|
09:00
09:20 |
Cryptography for the society. Protections problems in the eyes of ordinary users
Dmitry Malinkin
|
09:20
10:30 |
Panel discussion I
Moderator Andrey Chapchaev
|
10.30
10.50 |
Coffee break |
Blockchain in Russia and the world a year later
|
10:50
11:05 |
From "Hype" to practice (invited talk)
Maxim Shevchenko
|
11:05
11:45 |
Securely Scaling Distributed Ledger Systems (invited talk)
Philipp Jovanovic
|
11:45
12:00 |
An authentication language for blockchain based on sigma-protocols enhanced by boolean predicates (invited talk)
Alexander Chepurnoy
|
12:00
13:00 |
Panel discussion II
Moderator TBC
|
13:00
14:00 |
Lunch |
Symmetric cryptography III
|
14:00
14:40 |
Lightweight Symmetric-Key Cryptography (invited talk)
Thomas Peyrin
|
14:40
15:10 |
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
|
15:10
15:40 |
Evaluation of the maximum productivity for block encryption algorithms
Vladimir Fomichev, Alisa Koreneva, Alfinur Miftakhutdinova, Dmitry Zadorozhny
|
15:40
16:00 |
Coffee break |
Public key cryptography
|
16:00
16:30 |
Constructing strong elliptic curves suitable for cryptographic applications
Alexey Nesterenko
|
16:30
17:00 |
Considering Two MAC under SIG Variants of The Basic SIGMA Protocol
Trieu Quang Phong
|
17:00
17:30 |
A New LWE-based Verifiable Threshold Secret Sharing Scheme
Saba Karimani, Zahra Naghdabadi, Taraneh Eghlidos, Mohammad Reza Aref
|
18:30
21:00 |
Gala dinner (GTK "Suzdal") |
Wednesday, 30.05
Symmetric cryptography IV
|
09:30
10:00 |
Security bounds for standardized internally re-keyed block cipher modes and their practical significance
Liliya Ahmetzyanova, Evgeny Alekseev, Grigory Karpunin, Igor Oshkin, Grigory Sedov, Stanislav Smyshlyaev, Ekaterina Smyshlyaeva
|
10:00
10:30 |
Provably secure counter mode with related key-based internal re-keying
Evgeny Alekseev, Kirill Goncharenko, Grigory Marshalko
|
10.30
10.50 |
Coffee break |
Probabilistic aspects and Applications
|
10:50
11:20 |
Data recovering for a neural network-based biometric authentication scheme
Vladimir Mironkin, Dmitry Bogdanov
|
11:20
11:50 |
Testing the NIST Statistical Test Suite on artificial pseudorandom sequences
Andrey Zubkov, Aleksandr Serov
|
|