Внимание!!!
Важная информация для участников CTCrypt 2020!

Партнеры

При поддержке

Оператор

Фотогалерея

Принятые работы

  1. Альтернативные модели безопасности для псевдослучайной функции (Кирилл Царегородцев)
     
  2. Использование матриц-циркулянтов над F_2 в построении эффективных линейных преобразований с высокими показателями рассеивания (Степан Давыдов, Юрий Шкуратов)
     
  3. Криптосистема типа Мак-Элиса на D-кодах Юрий Косолапов (Юрий Косолапов, Евгений Лелюк)
     
  4. Сложность вычисления некоторых постановок, имеющих TU-представление (Денис Фомин, Дмитрий Трифонов)
     
  5. О способе построения подстановок, имеющих TU-представление (Денис Фомин)
     
  6. On the security of one RFID authentication protocol (Anastasiia Chichaeva, Stepan Davydov, Ekaterina Griboedova, Kirill Tsaregorodtsev)
     
  7. A simple quantum circuit for the attack which shows vulnerability of quantum cryptography with phase-time coding (Dmitry Kronberg)
     
  8. On security aspects of CRISP (Vitaly Kiryukhin)
     
  9. About "k-bit security" of MACs based on hash function Streebog (Vitaly Kiryukhin)
     
  10. Matrix-vector product of a new class of quasi-involutory MDS matrices (Pablo Freyre Arrozarena, Ernesto Dominguez Fiallo, Ramses Rodriguez Aulet)
     
  11. Construction of linear involutory transformations over finite fields through the multiplication of polynomials modulus a polynomial (Ramsés Rodríguez Aulet, Pablo Freyre Arrozarena, Alejandro Freyre Echevarría)
     
  12. On the Bit-Slice representations of some nonlinear bijective transformations (Oliver Coy Puente, Reynier A. de la Cruz Jiménez)
     
  13. The PRF pCollapserARX optimal cryptographic characteristic automated search by CASCADA (Sergey Polikarpov, Vadim Prudnikov, Konstantin Rumyantsev)
     
  14. Fast correlation attack for GRAIN-128AEAD with fault (Sergei Katishev, Maxime Malov)
     
  15. Streebog as a Random Oracle Liliya Akhmetzyanova (Alexandra Babueva, Andrey Bozhko)
     
  16. Blind signature as a shield against backdoors in smart-cards (Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev)
     
  17. Two-party GOST in two parts: fruitless search and fruitful synthesis (Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, , Stanislav Smyshlyaev)
     
  18. Probing the security landscape for authenticated key establishment protocols (Evgeny Alekseev, Sergey Kyazhin)
     
  19. On properties of generalized bent functions and decomposition of Boolean bent functions (Aleksandr Kutsenko)
     
  20. Distinguish attacks on Feistel ciphers based on linear and differential attacks (Denis Fomin)
     
  21. Class of piecewise-monomial mappings: differentially 4-uniform permutations on $mathbb{F}_{2^8}$ with graph algebraic immunity 3 exist (Dmitry Burov, Sergey Kostarev, Andrey Menyachikhin)
     
  22. On the confidentiality and integrity of ECIES scheme (Kirill Tsaregorodtsev)
     
  23. Reliability of two-level testing approach of the NIST SP800-22 test suite and two-sided estimates for quantile of binomial distribution (Aleksandr Serov)