|  | 
    
	 
		
			   
				 					Архив / Список докладов CTCrypt 2014
	Evgeny Alekseev, Vladimir Popov, Anton Prokhorov, Stanislav Smyshlyaev, Lolita Sonina. On the performance of a perspective LSX-based block cipherAnton Alekseychuk, Sergey Gryshakov. On the Computational Security of Randomized Stream Ciphers Proposed by Mihaljević and ImaiNatal'ya Anashkina, Andrey Shurupov. Comparison of Simulated Annealing and Balas Algorithms for Solving Pseudo-Boolean Linear Inequalities SystemsNikolay Borisenko, Hoang Duc Tho. Algorithms for minimization of the number of logic elements in a circuit implementing S-box Boolean FunctionsMikhail Borodin, Andrey Rybkin. High-Speed Implementation of GOST R 34.10-2012 Digital SignatureMikhail Borodin, Andrey Rybkin, Alexey Urivskiy. High-Speed Software Implementation of the Prospective 128-bit Block Cipher and Streebog Hash-FunctionDenis Fomin. Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDAP. Freyre, N. Diaz, R. Diaz, C. Perez. Random generation of MDS matricesMikhail Goltvanitsa. Digit sequences of skew linear recurrences of maximal period over Galois ringsDmitry Eremin-Solenikov. OpenPGP and Russian cryptographySergey Grebnev. Security properties of certain authenticated key exchange protocolsSergey Matveev. GOST 28147-89 masking against side channel attacksAndrey Menyachikhin. Gray codes with the step kAlexander Minakov. Compound Poisson approximation for the distribution of the number of monotone tuples in random sequenceMaxim Nikolaev. On the complexity of two-dimensional discrete logarithm problem in a finite cyclic group with efficient endomorphismDmitry Pilshchikov. On the limiting mean values in probabilistic models of time-memory-data tradeoff methodsAlexander Rybakov. Evaluation of a number of integers in an interval having no more than 3 large prime factorsMarkku-Juhani O. Saarinen. Authenticated Encryption from GOST R 34.11-2012 LPS PermutationDanil Soshin. Synthesis of balanced threshold functions by a geometric method |