|
|
Программа
Wednesday 3.06
| 11.30-13.00 |
Free time |
| 13.00-14.00 |
Lunch |
| 14.00-14.30 |
Registration |
| 14.30-14.40 |
Opening remarks |
| 14.40-18.05 |
Mathematical problems of cryptography I |
| 14.40-15.10 |
Andrey Bogdanov. Towards Post-Snowden Cryptography |
| 15.10-15.40 |
Yury Kharin. Parsimonious models of high-order Markov chains for evaluation of cryptographic generators |
| 15.40-16.00 |
N.A. Kolomeec. A graph of minimal distances of bent functions |
| 16.00-16.20 |
V.G. Mihailov, A.V. Volgin. Solutions set stability of pseudo-Boolean equations system in a case of their random distortions |
| 16.20-16.40 |
Coffee break |
| 16.40-17.10 |
Sergey Agievich, Anastasia Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeriya Vitkup. Mathematical problems of the First international student's Olympiad in cryptography NSUCRYPTO |
| 17.10-17.30 |
A.Yu. Nesterenko. Some remarks on elliptic curve discrete logarithm problem |
| 17.30-17.50 |
K. Zhukov. Approximate common divisor problem and continued fractions |
| 17.50-18.05 |
A.R. Gaynullina, S.N.Tronin. On Operad-based Cryptography |
Thursday 4.06
| 10.00-11.50 |
Mathematical problems of cryptography II (Session in memory of Alexander Nechaev) |
| 10.00-10.30 |
Alexey Kuzmin. Alexander Nechaev's mathematical heritage |
| 10.30-10.50 |
S.N. Zaitsev. Reconstruction of a skew non-reducible MP LRS over Galois ring of characteristic 2d by a highest digit |
| 10.50-11.10 |
M.A. Goltvanitsa. The first digit sequence of a skew linear recurrence of a maximal period over Galois ring |
| 11.10-11.30 |
V.N. Tsypyshev. Second coordinate sequence of the MP-LRS over non-trivial Galois ring of odd characteristic |
| 11.30-11.50 |
S. Kuzmin. On binary digit-position sequences over Galois rings, admitting twofold reduction of a period |
| 11.50-12.10 |
Coffee break |
| 12.10-13.55 |
Quantum cryptography and technologies |
| 12.10-12.40 |
Farid Ablayev, Marat Ablayev. On the concept of quantum hashing |
| 12.40-13.00 |
M. Kaplan. Quantum attacks against iterated block ciphers |
| 13.00-13.20 |
I.V. Radchenko, K.S. Kravtsov, S.P. Kulik. Quantum random number generator |
| 13.20-13.40 |
A. Vasiliev, M. Ziatdinov. Minimizing collisions for quantum hashing |
| 13.40-13.55 |
M. Ziatdinov. Quantum hashing based on symmetric groups |
| 13.55-15.00 |
Lunch |
| 15.00-16.00 |
Cryptanalysis and implementation I |
| 15.00-15.15 |
N. P. Borisenko, V. L. Nguyen. On an implementation method of a large size linear transformation |
| 15.15-15.30 |
P.A. Lebedev. Unifying development and implementation of secure network protocols in C++ |
| 15.30-15.45 |
A.V. Trepacheva. A known plaintext attack on a fully homomorphic cryptosistem based on factorization |
| 15.45-16.00 |
G. Sekar. Side channel cryptanalysis of Streebog |
| 16.00-16.20 |
Coffee break |
| 16.20-18.00 |
Rump-session |
Дискуссионная панель
«День открытых дверей ТК26»
(15.00–18.00)
|
Формат дискуссионной панели: выступление спикера 15 мин. + 15 мин. обсуждение темы с аудиторией.
Вопросы к обсуждению:
-
Новый образ ТК26. Текущие проекты. Перспективы развития.
Спикер – Чапчаев А.А., Генеральный директор ОАО «ИнфоТеКС»
- О разработке требований к СКЗИ
Спикер – Маршалко Г.Б., представитель ТК 26
- Международная стандартизация: вчера, сегодня, завтра
Спикер – Уривский А.В., представитель ТК 26
Спикер – Смышляев С.В., ООО «КРИПТО-ПРО»
- Расширенный контроль доступа
Спикер – Мелузов А.С., ФГУП НИИ «Восход» |
Friday 5.06
| 10.00-11.35 |
Cryptographic mechanisms |
| 10.00-10.30 |
Markku-Yuhani Olavi Saarinen, Developments with CAESAR authenticated encryption competition |
| 10.30-10.50 |
S.V. Polikarpov, K.E. Rumyantsev, A.A. Kozhevnikov. On differential properties of a symmetric crypto algorithm based on pseudo-dynamic substitutions |
| 10.50-11.05 |
E.K. Alekseev, V.D. Nikolaev, I.B. Oshkin, V.O. Popov, A.S. Prokhorov, S.V. Smyshlyaev, L.A. Soninа. On a secure connection establishment protocol for a functional key carrier |
| 11.05-11.20 |
S.N.Tronin, K.A.Petukhova. RSA-like cryptosystem using Dedekind rings |
| 11.20-11.35 |
Ph. B. Burtyka. Additively homomorphic encryption using matrix polynomials with approximate perfect security |
| 11.35-11.55 |
Coffee break |
| 11.55-13.15 |
Cryptanalysis and implementation II |
| 11.55-12.15 |
S. Grebnev. Optimizing memory cost of multi-scalar multiplication |
| 12.15-12.35 |
D. Fomin. A timing attack on CUDA implementations of an AES-type block cipher |
| 12.35-12.55 |
R. AlTawy, O. Duman, A.M. Youssef. Fault Analysis of Kuznyechik |
| 12.55-13.15 |
D.A. Burov, B.A. Pogorelov. Attack on 6 rounds of KHAZAD |
| 13.15-14.00 |
Check-out (for participants leaving for Moscow) |
| 14.00-15.00 |
Lunch (for “Mirage” hotel guests) |
|