|
Программа
Wednesday 3.06
11.30-13.00 |
Free time |
13.00-14.00 |
Lunch |
14.00-14.30 |
Registration |
14.30-14.40 |
Opening remarks |
14.40-18.05 |
Mathematical problems of cryptography I |
14.40-15.10 |
Andrey Bogdanov. Towards Post-Snowden Cryptography |
15.10-15.40 |
Yury Kharin. Parsimonious models of high-order Markov chains for evaluation of cryptographic generators |
15.40-16.00 |
N.A. Kolomeec. A graph of minimal distances of bent functions |
16.00-16.20 |
V.G. Mihailov, A.V. Volgin. Solutions set stability of pseudo-Boolean equations system in a case of their random distortions |
16.20-16.40 |
Coffee break |
16.40-17.10 |
Sergey Agievich, Anastasia Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeriya Vitkup. Mathematical problems of the First international student's Olympiad in cryptography NSUCRYPTO |
17.10-17.30 |
A.Yu. Nesterenko. Some remarks on elliptic curve discrete logarithm problem |
17.30-17.50 |
K. Zhukov. Approximate common divisor problem and continued fractions |
17.50-18.05 |
A.R. Gaynullina, S.N.Tronin. On Operad-based Cryptography |
Thursday 4.06
10.00-11.50 |
Mathematical problems of cryptography II (Session in memory of Alexander Nechaev) |
10.00-10.30 |
Alexey Kuzmin. Alexander Nechaev's mathematical heritage |
10.30-10.50 |
S.N. Zaitsev. Reconstruction of a skew non-reducible MP LRS over Galois ring of characteristic 2d by a highest digit |
10.50-11.10 |
M.A. Goltvanitsa. The first digit sequence of a skew linear recurrence of a maximal period over Galois ring |
11.10-11.30 |
V.N. Tsypyshev. Second coordinate sequence of the MP-LRS over non-trivial Galois ring of odd characteristic |
11.30-11.50 |
S. Kuzmin. On binary digit-position sequences over Galois rings, admitting twofold reduction of a period |
11.50-12.10 |
Coffee break |
12.10-13.55 |
Quantum cryptography and technologies |
12.10-12.40 |
Farid Ablayev, Marat Ablayev. On the concept of quantum hashing |
12.40-13.00 |
M. Kaplan. Quantum attacks against iterated block ciphers |
13.00-13.20 |
I.V. Radchenko, K.S. Kravtsov, S.P. Kulik. Quantum random number generator |
13.20-13.40 |
A. Vasiliev, M. Ziatdinov. Minimizing collisions for quantum hashing |
13.40-13.55 |
M. Ziatdinov. Quantum hashing based on symmetric groups |
13.55-15.00 |
Lunch |
15.00-16.00 |
Cryptanalysis and implementation I |
15.00-15.15 |
N. P. Borisenko, V. L. Nguyen. On an implementation method of a large size linear transformation |
15.15-15.30 |
P.A. Lebedev. Unifying development and implementation of secure network protocols in C++ |
15.30-15.45 |
A.V. Trepacheva. A known plaintext attack on a fully homomorphic cryptosistem based on factorization |
15.45-16.00 |
G. Sekar. Side channel cryptanalysis of Streebog |
16.00-16.20 |
Coffee break |
16.20-18.00 |
Rump-session |
Дискуссионная панель
«День открытых дверей ТК26»
(15.00–18.00)
Формат дискуссионной панели: выступление спикера 15 мин. + 15 мин. обсуждение темы с аудиторией.
Вопросы к обсуждению:
-
Новый образ ТК26. Текущие проекты. Перспективы развития.
Спикер – Чапчаев А.А., Генеральный директор ОАО «ИнфоТеКС»
- О разработке требований к СКЗИ
Спикер – Маршалко Г.Б., представитель ТК 26
- Международная стандартизация: вчера, сегодня, завтра
Спикер – Уривский А.В., представитель ТК 26
Спикер – Смышляев С.В., ООО «КРИПТО-ПРО»
- Расширенный контроль доступа
Спикер – Мелузов А.С., ФГУП НИИ «Восход» |
Friday 5.06
10.00-11.35 |
Cryptographic mechanisms |
10.00-10.30 |
Markku-Yuhani Olavi Saarinen, Developments with CAESAR authenticated encryption competition |
10.30-10.50 |
S.V. Polikarpov, K.E. Rumyantsev, A.A. Kozhevnikov. On differential properties of a symmetric crypto algorithm based on pseudo-dynamic substitutions |
10.50-11.05 |
E.K. Alekseev, V.D. Nikolaev, I.B. Oshkin, V.O. Popov, A.S. Prokhorov, S.V. Smyshlyaev, L.A. Soninа. On a secure connection establishment protocol for a functional key carrier |
11.05-11.20 |
S.N.Tronin, K.A.Petukhova. RSA-like cryptosystem using Dedekind rings |
11.20-11.35 |
Ph. B. Burtyka. Additively homomorphic encryption using matrix polynomials with approximate perfect security |
11.35-11.55 |
Coffee break |
11.55-13.15 |
Cryptanalysis and implementation II |
11.55-12.15 |
S. Grebnev. Optimizing memory cost of multi-scalar multiplication |
12.15-12.35 |
D. Fomin. A timing attack on CUDA implementations of an AES-type block cipher |
12.35-12.55 |
R. AlTawy, O. Duman, A.M. Youssef. Fault Analysis of Kuznyechik |
12.55-13.15 |
D.A. Burov, B.A. Pogorelov. Attack on 6 rounds of KHAZAD |
13.15-14.00 |
Check-out (for participants leaving for Moscow) |
14.00-15.00 |
Lunch (for “Mirage” hotel guests) |
|