|
Информационное сообщение о симпозиуме CTCrypt’2016
|
5 |
|
Bash-f: another LRX sponge function S. V. Agievich, V. V. Marchuk, A. S. Maslau, V. I. Semenov
|
7 |
|
Lower bounds for the practical secrecy of a key I. M. Arbekov
|
29 |
|
On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing L. R. Ahmetzyanova, E. K. Alekseev, I. B. Oshkin, S. V. Smyshlyaev, L. A. Sonina
|
39 |
|
The influence of linear mapping reducibility on the choice of round constants D. A. Burov, B. A. Pogorelov
|
51 |
|
Non-commutative Hamilton–Cayley theorem and roots of characteristic polynomials of skew maximal period linear recurrences over Galois rings M. A. Goltvanitsa
|
65 |
|
New methods of error correction in quantum cryptography using low-density parity-check codes D. A. Kronberg
|
77 |
|
Synthesis of asymptotically size-optimal Boolean circuits protected from functionality inference S. A. Lozhkin, M. S. Shupletsov, B. R. Danilov
|
87 |
|
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters A. V. Menyachikhin
|
97 |
|
A new authenticated encryption mode for arbitrary block
cipher based on universal hash function A. Yu. Nesterenko
|
117 |
|
Analysis of Russian key-agreement protocols using automated verification tools A. M. Semenov
|
131 |