|
Information on the Symposium CTCrypt’2018
|
5–6 |
|
$\mathsf{XS}$-circuits in block ciphers S. V. Agievich
|
7–30 |
|
Practical significance of security bounds for standardized internally re-keyed block cipher modes L. R. Ahmetzyanova, E. K. Alekseev, G. K. Sedov, E. S. Smyshlyaeva, S. V. Smyshlyaev
|
31–46 |
|
Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode L. R. Ahmetzyanova, G. A. Karpunin, G. K. Sedov
|
47–60 |
|
Data recovery for a neural network-based biometric authentication scheme D. S. Bogdanov, V. O. Mironkin
|
61–74 |
|
Some properties of modular addition V. V. Vysotskaya
|
75–88 |
|
Testing the NIST Statistical Test Suite on artificial pseudorandom sequences A. M. Zubkov, A. A. Serov
|
89–96 |
|
An LWE-based verifiable threshold secret sharing scheme S. Karimani, Z. Naghdabadi, T. Eghlidos, M. R. Aref
|
97–106 |
|
Exact maximum expected differential and linear probability for $2$-round Kuznyechik V. A. Kiryukhin
|
107–116 |
|
On some properties of an XSL-network A. V. Kurochkin
|
117–124 |
|
How much data may be safely processed on one key in different modes? I. V. Lavrikov, V. A. Shishkin
|
125–134 |
|
Construction of strong elliptic curves suitable for cryptographic applications A. Yu. Nesterenko
|
135–144 |
|
Considering two MAC under SIG variants of the basic SIGMA protocol Trieu Quang Phong
|
145–158 |
|
On a new classification of Boolean functions S. N. Fedorov
|
159–168 |
|
New classes of $8$-bit permutations based on a butterfly structure D. B. Fomin
|
169–180 |
|
Evaluation of the maximum performance of block encryption algorithms V. M. Fomichev, A. M. Koreneva, A. R. Miftakhutdinova, D. I. Zadorozhny
|
181–191 |