
Program
Monday, 28.05
10.00
10.10 
Welcome speech 
Symmetric cryptography I

10.10
10.50 
The Rise of Authenticated Encryption (invited talk)
Phillip Rogaway

10.50
11.20 
Near birthday attack on «8 bits» AEAD mode
Liliya Ahmetzyanova, Grigory Karpunin, Grigory Sedov

11.20
11.50 
Within a Friend Zone: How Far Can We Proceed with Data Encryption not Getting Out
Vasily Shishkin, Ivan Lavrikov

11.50
12.10 
Coffee break 
Symmetric cryptography II

12.10
12.40 
XScircuits in block ciphers
Sergey Agievich

12:40
13:10 
On some properties of an XSLnetwork
Alexey Kurochkin

13:10
14:30 
Lunch 
Algebraic Aspects

14:30
15:10 
Pseudorandom generators based on shift registers over finite commutative rings (invited talk)
Oleg Kozlitin

15:10
15:40 
Some properties of modular addition
Victoria Vysotskaya

15:40
16:00 
Coffee break 
16:00
16:30 
New classes of 8bit permutations based on a butterfly structure
Denis Fomin

16:30
17:00 
On a new classification of the Boolean functions
Sergey Fedorov

17:00
17:10 
Track change 
17:10
17:40 
Rumpsession 
18:30
21:00 
Welcome party 
Tuesday, 29.05
Cryptography and «Digital economy»

09:00
09:20 
Cryptography for the society. Protections problems in the eyes of ordinary users
Dmitry Malinkin

09:20
10:30 
Panel discussion I
Moderator Andrey Chapchaev

10.30
10.50 
Coffee break 
Blockchain in Russia and the world a year later

10:50
11:05 
From "Hype" to practice (invited talk)
Maxim Shevchenko

11:05
11:45 
Securely Scaling Distributed Ledger Systems (invited talk)
Philipp Jovanovic

11:45
12:00 
An authentication language for blockchain based on sigmaprotocols enhanced by boolean predicates (invited talk)
Alexander Chepurnoy

12:00
13:00 
Panel discussion II
Moderator TBC

13:00
14:00 
Lunch 
Symmetric cryptography III

14:00
14:40 
Lightweight SymmetricKey Cryptography (invited talk)
Thomas Peyrin

14:40
15:10 
Exact maximum expected differential and linear probability for 2round Kuznyechik
Vitaly Kiryukhin

15:10
15:40 
Evaluation of the maximum productivity for block encryption algorithms
Vladimir Fomichev, Alisa Koreneva, Alfinur Miftakhutdinova, Dmitry Zadorozhny

15:40
16:00 
Coffee break 
Public key cryptography

16:00
16:30 
Constructing strong elliptic curves suitable for cryptographic applications
Alexey Nesterenko

16:30
17:00 
Considering Two MAC under SIG Variants of The Basic SIGMA Protocol
Trieu Quang Phong

17:00
17:30 
A New LWEbased Verifiable Threshold Secret Sharing Scheme
Saba Karimani, Zahra Naghdabadi, Taraneh Eghlidos, Mohammad Reza Aref

18:30
21:00 
Gala dinner (GTK "Suzdal") 
Wednesday, 30.05
Symmetric cryptography IV

09:30
10:00 
Security bounds for standardized internally rekeyed block cipher modes and their practical significance
Liliya Ahmetzyanova, Evgeny Alekseev, Grigory Karpunin, Igor Oshkin, Grigory Sedov, Stanislav Smyshlyaev, Ekaterina Smyshlyaeva

10:00
10:30 
Provably secure counter mode with related keybased internal rekeying
Evgeny Alekseev, Kirill Goncharenko, Grigory Marshalko

10.30
10.50 
Coffee break 
Probabilistic aspects and Applications

10:50
11:20 
Data recovering for a neural networkbased biometric authentication scheme
Vladimir Mironkin, Dmitry Bogdanov

11:20
11:50 
Testing the NIST Statistical Test Suite on artificial pseudorandom sequences
Andrey Zubkov, Aleksandr Serov

