|
2017, Volume 8, Issue 2
|
|
|
|
|
Information on Symposium CTCrypt'2016
|
5 |
|
Bash-f: another LRX sponge function S. V. Agievich, V. V. Marchuk, A. S. Maslau, V. I. Semenov
|
7–28 |
|
Lower bounds for the practical secrecy of a key I. M. Arbekov
|
29–38 |
|
On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing L. R. Ahmetzyanova, E. K. Alekseev, I. B. Oshkin, S. V. Smyshlyaev, L. A. Sonina
|
39–50 |
|
The influence of linear mapping reducibility on the choice of round constants D. A. Burov, B. A. Pogorelov
|
51–64 |
|
Non-commutative Hamilton–Cayley theorem and roots of characteristic polynomials of skew maximal period linear recurrences over Galois rings M. A. Goltvanitsa
|
65–76 |
|
New methods of error correction in quantum cryptography using low-density parity-check codes D. A. Kronberg
|
77–86 |
|
Synthesis of asymptotically size-optimal Boolean circuits protected from functionality inference S. A. Lozhkin, M. S. Shupletsov, B. R. Danilov
|
87–96 |
|
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters A. V. Menyachikhin
|
97–116 |
|
A new authenticated encryption mode for arbitrary block
cipher based on universal hash function A. Yu. Nesterenko
|
117–130 |
|
Analysis of Russian key-agreement protocols using automated verification tools A. M. Semenov
|
131–142 |
|
|