|
Принятые работы
Организаторы
|
Генеральные партнеры
|
- Альтернативные модели безопасности для псевдослучайной функции (Кирилл Царегородцев)
- Использование матриц-циркулянтов над F_2 в построении эффективных линейных преобразований с высокими показателями рассеивания (Степан Давыдов, Юрий Шкуратов)
- Криптосистема типа Мак-Элиса на D-кодах Юрий Косолапов (Юрий Косолапов, Евгений Лелюк)
- Сложность вычисления некоторых постановок, имеющих TU-представление (Денис Фомин, Дмитрий Трифонов)
- О способе построения подстановок, имеющих TU-представление (Денис Фомин)
- On the security of one RFID authentication protocol (Anastasiia Chichaeva, Stepan Davydov, Ekaterina Griboedova, Kirill Tsaregorodtsev)
- A simple quantum circuit for the attack which shows vulnerability of quantum cryptography with phase-time coding (Dmitry Kronberg)
- On security aspects of CRISP (Vitaly Kiryukhin)
- About "k-bit security" of MACs based on hash function Streebog (Vitaly Kiryukhin)
- Matrix-vector product of a new class of quasi-involutory MDS matrices (Pablo Freyre Arrozarena, Ernesto Dominguez Fiallo, Ramses Rodriguez Aulet)
- Construction of linear involutory transformations over finite fields through the multiplication of polynomials modulus a polynomial (Ramsés Rodríguez Aulet, Pablo Freyre Arrozarena, Alejandro Freyre Echevarría)
- On the Bit-Slice representations of some nonlinear bijective transformations (Oliver Coy Puente, Reynier A. de la Cruz Jiménez)
- The PRF pCollapserARX optimal cryptographic characteristic automated search by CASCADA (Sergey Polikarpov, Vadim Prudnikov, Konstantin Rumyantsev)
- Fast correlation attack for GRAIN-128AEAD with fault (Sergei Katishev, Maxime Malov)
- Streebog as a Random Oracle Liliya Akhmetzyanova (Alexandra Babueva, Andrey Bozhko)
- Blind signature as a shield against backdoors in smart-cards (Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev)
- Two-party GOST in two parts: fruitless search and fruitful synthesis (Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, , Stanislav Smyshlyaev)
- Probing the security landscape for authenticated key establishment protocols (Evgeny Alekseev, Sergey Kyazhin)
- On properties of generalized bent functions and decomposition of Boolean bent functions (Aleksandr Kutsenko)
- Distinguish attacks on Feistel ciphers based on linear and differential attacks (Denis Fomin)
- Class of piecewise-monomial mappings: differentially 4-uniform permutations on $mathbb{F}_{2^8}$ with graph algebraic immunity 3 exist (Dmitry Burov, Sergey Kostarev, Andrey Menyachikhin)
- On the confidentiality and integrity of ECIES scheme (Kirill Tsaregorodtsev)
- Reliability of two-level testing approach of the NIST SP800-22 test suite and two-sided estimates for quantile of binomial distribution (Aleksandr Serov)
|