Cryptographic center (Novosibirsk)

Sobolev Institute of Mathematics

Mathematical Center in Akademgorodok

Laboratory of Cryptography JetBrains Research

Novosibirsk State University

Archive of the seminar "Cryptography and Cryptanalysis"

2020-2021 academic year:

  • May 04, 2021

    A.V. Kutsenko, N. D. Atutova, D. A. Zyubina
    About the trip to the All-Russian scientific and technical conference "The state and prospects of development of modern science in the direction of "Information security" (Anapa, April 21-22, 2021).

    N. D. Atutova
    About the trip to the summit of young scientists and engineers "Big challenges for society, the state and science"(Sochi, April 26-30, 2021).


  • April 13, 2021

    Speeches of students before the MNSC:< / em>
    N. D. Atutova
    Application of heuristic methods to search for Boolean functions with high algebraic immunity.
    N. D. Atutova, D. A. Zyubina, S. D. Filippov
    Development of automated analysis of ciphers for algebraic cryptographic stability.
    A. O. Bakharev
    Implementation and analysis of a hybrid attack on the NTRU cryptographic system for small parameter values using a quantum search algorithm.
    T. A. Bonich
    Properties of a function in a shift register with nonlinear feedback.
    E. V. Zavalishina
    About equivalent keys. Analysis of a public-key cryptosystem based on the complexity of solving a system of polynomial equations in integers.
    D. A. Zyubina
    S-blocks with high component algebraic immunity.
    A. A. Lakhansky, D. A. Safenreiter
    Integration of zero-knowledge proof algorithms into Ethereum smart contracts.
    M. A. Panferov
    Construction of state change functions in a nonlinear shift register with feedback.
    I. A. Sutormin
    Recurrent formulas for the difference characteristic of XOR with respect to addition modulo 2n.


  • March 30, 2021
    Kolomeets N. A.
    Abstract of the article J. Daemen, V. Rijmen, "The Wide Trail Design Strategy".

  • March 25, 2021
    I. A. Pankratova (Head of the TSU Computer Cryptography Laboratory)
    Cryptosystems with functional keys.

  • March 9, 2021
    A. Kutsenko, N. Atutova, D. Zyubina, E. Maro (SFU), S. Filippov (St. Petersburg State University)
    Algebraic cryptanalysis of the Simon and Speck ciphers.< / li>

  • March 2, 2021
    A. Doronin, K. Kalgin
    Application of SAT-solvers in the problem of searching for APN-functions using iterative constructions.

  • February 16, 2021
    A. Shaporenko
    On derivatives of Boolean bent functions.

  • February 9, 2021
    N. N. Tokareva
    Laboratory meeting: report and plans.

  • October 27, 2020
    D. Kondyrev, A. Lakhansky, D. Safenreiter
    Zero-knowledge proof algorithms in blockchain systems: principles of operation and examples of implementations.

  • October 19, 2020
    I. Sutormin
    The nonlinearity of balanced Boolean functions. Review.

  • September 29, 2020
    N. Kolomeets, A. Kutsenko, K. Kalgin, A. Oblaukhov, V. Idrisova
    About participation in the international conferences BFA (Norway, September 15-17, 2020) and SETA (St. Petersburg, September 22-25, 2020).

  • September 22, 2020
    A. Kutsenko
    About the trip to the IX Symposium "Current Trends in Cryptography" CTCrypt 2020 (Moscow region, September 15-17, 2020).

  • September 15, 2020
    A. Oblaukhov
    Metrically regular sets in a Boolean cube: constructions and properties (PhD thesis).

  • September 10, 2020
    A. Kutsenko
    Self-dual bent functions and their metric properties (PhD thesis).
 

2019-2020 academic year:

  • March 17, 2020
    A. Belousova, Yu. Maksimlyuk
    Differential cryptanalysis of a cipher based on the Lai-Messi scheme.

  • March 10, 2020
    T. Bonich, M. Panferov
    Analysis of the gamma generated by the filtering and combining generators< / li>
  •  
    March 3, 2020
    A. Shaporenko
    Relation of quaternary and Boolean bent functions.

  • December 11, 2019
    A. Kutsenko
    Quantum cryptanalysis: Shor and Grover algorithms.

  • November 29, 2019
    Ch. Li
    On Recent Constructions and Decoding of Maximum Rank Metric Codes.

  • November 27, 2019
    M. Calderini
    Differential and boomerang uniformity of Boolean functions.

  • November 20, 2019
    P. Sazonova
    Systematization of blockchain technologies.

  • November 13, 2019
    A. Perov
    An algorithm for statistical analysis of block ciphers based on machine learning technologies.

  • November 6, 2019
    A. Kutsenko
    Quantum cryptanalysis: the first approximation.

  • October 30, 2019
    A. Kutsenko
    Post-Quantum cryptography: the challenge is thrown? (about the trip to CtCrypt 2019, Kaliningrad).

  • October 23, 2019
    I. Koryakin
    About the binary format of instructions for client scripts on the WebAssembly browser side and about the Wasabi framework for its analysis.

  • October 16, 2019
    Shushuev
    About machine learning for those who are not familiar with it, as well as how and where we use it in working projects.

  • October 9, 2019
    R. Lebedev
    Automatic generation of cryptographic hash functions.

  • October 2, 2019
    D. Kondyrev
    Algorithms for hiding information about transactions in blockchain systems.

  • September 18, 2019
    N. Kolomeets, A. Kutsenko, P. Sazonova, E. Zavalishina, A. Miloserdov, N. Tokareva, A. Shaporenko
    About the trip to the SIBECRYPT-2019 conference (Tomsk).

  • September 17, 2019
    V. Idrisova
    About participation in the CRYPTO-2019 conference (USA, Santa Barbara).
 

2018-2019 academic year:

  • May 23, 2019
    A. A. Gorodilova
    Properties of associated Boolean functions of quadratic APN functions.

  • May 16, 2019
    N. A. Kolomeets
    On affine equivalence of Boolean functions.

  • April 25, 2019
    A.V. Kutsenko
    On isometric maps of Boolean functions.

  • April 18, 2019
    R. K. Lebedev
    CTF - how cryptography, steganography and program hacking have combined into student competitions.

  • April 11, 2019
    K. V. Kalgin (IVMiMG)
    Parallel computing in cryptography.

  • March 28, 2019
    A. Perov
    Using machine learning technologies to test the statistical properties of output sequences of iterative information security algorithms.

  • March 21, 2019
    I. Kuzmin
    Development of a key exchange algorithm based on the principles of homomorphic encryption.

    P. Sazonova
    A hash function that is resistant to hacking by a quantum computer.

  • March 7, 2019
    I. Kuzmin
    Development of a key exchange algorithm based on the principles of homomorphic encryption.

    N. Sarin
    Key exchange methods for weak computing devices.

  • March 6, 2019
    D. Shishlyannikov
    Symmetric encryption based on modular methods in number theory. Encryption.

    N. Zbitnev
    Symmetric encryption based on modular methods in number theory. Decryption.

    E. Zavalishina
    A public-key cryptographic system based on the complexity of solving systems of polynomial polynomials in integers.

  • November 27, 2018
    N. Tokareva
    Research topics in cryptography.

  • November 20, 2018
    A. Gorodilova
    CCZ-equivalence as a combination of EA-equivalence and Twist-equivalence.

  • October 30, 2018
    N. Kolomeec
    Properties of a bent function construction by a subspace of an arbitrary dimension.

  • October 2, 2018
    N. Tokareva, A. Gorodilova
    On visiting cryptoteams of the University of Bergen (Norway) and the institute Inria (France).

  • September 11, 2018
    N. Kolomeec, A. Kutsenko, A. Oblaukhov, I. Kokoshinsky   & nbsp;
    About the Russian conference SIBECRYPT-2018 «Siberian scientific school-seminar with international participation "computer security and cryptography"».

    V. A. Idrisova
    On the construction of almost completely nonlinear vector functions and their symmetric properties (PhD thesis).

  • September 4, 2018
    N. Tokareva
    «Introduction and special aspects of cryptography».
 

2017-2018 academic year:

  • February 12, 2018
    N. A. Kolomeets
    Heuristic algorithms for finding Boolean functions. Review.

  • December 5, 2017
    A. K. Oblaukhov
    Maximal metrically regular sets (continued).

  • November 28, 2017
    A. K. Oblaukhov
    Maximal metrically regular sets.

  • November 21, 2017
    Open Problems Day.

  • October 31, 2017
    A.V. Kutsenko
    Fundamentals of quantum key distribution. Review.

  • October 24, 2017
    L. Ya. Savelyev
    The development of cryptography in Russia. Historical essay.

  • October 10, 2017
    L. Ya. Savelyev
    Lattice theory and statistical formalization of the text.

  • October 3, 2017
    A. A. Belousova, V. I. Nobeleva
    "Biometric cryptosystems: issues and challenges"(abstract of the article by U. Uludag, Sh. Pankanti, S. Prabhakar, A. Jain, 2004).

  • September 19, 2017
    A. K. Oblaukhov
    "Blockchain and its implementation in the Bitcoin cryptocurrency. Review & raquo;< / li>
  •  
    September 12, 2017
    N. A. Kolomeets, A.V. Kutsenko, A.V. Miloserdov, A. K. Oblaukhov, N. S. Lone
    About the trip to SIBECRYPT & rsquo;2017-scientific school-seminar & laquo; Computer Security and cryptography» (Krasnoyarsk, September 4-9, 2017).
 

2016-2017 academic year:

  • April 25, 2017
    Open Problems Day.

  • April 11, 2017
    A.V. Miloserdov
    On one-to-one vector Boolean functions in a polynomial representation.

  • April 4, 2017
    N. S. Lone
    Optimal constant-amplitude codes for bent functions from the Mayoran-McFarland class.

  • October 19, 2016
    A. A. Gorodilova
    Almost completely nonlinear functions: characterization through subfunctions and differential equivalence (PhD thesis).

  • October 12, 2016
    G. I. Shushuev
    Abstract of the article "On upper bounds for algebraic degrees of APN functions" (L. Budaghyan, C. Carlet, T. Helleseth, N. Li, B. Sun, 2016).

  • October 5, 2016
    V. A. Idrisova
    Abstract of the article «A generalization of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2» (A. Canteaut, S. Duval, L. Perrin, 2016).
 

2015-2016 academic year:

  • May 18, 2016
    D. P. Pokrasenko
    Conditions for the existence of a vector Boolean function with maximum component algebraic immunity.

  • May 11, 2016
    N. S. Lone
    About the article by K. Shannon "A universal Turing machine with two internal states".

    A.V. Miloserdov
    About the article by K. Shannon "Prediction and entropy of printed English text".

  • April 6, 2016
    A.V. Kutsenko
    About the article by K. Shannon "Simplified derivation of the linear theory of smoothing and prediction by the least squares method".

  • March 23, 2016
    A. K. Oblaukhov
    About the article by K. Shannon "Communication in the presence of noise".

  • March 16, 2016
    Open Problems Day: Seminar # 100.

  • March 2, 2016
    N. A. Kolomeets
    About the article "The theory of communication in secret systems": dedicated to the 100th anniversary of the birth of K. Shannon.

  • February 24, 2016
    V. A. Vitkup
    About the article by K. Shannon "Mathematical theory of communication". Results. The consequences. Meaning.

  • November 11, 2015
    A. A. Gorodilova
    On the classes of differential equivalence of APN-Gold functions.

  • September 23, 2015
    N. A. Kolomeets, G. I. Shushuev
    About the trip to the international course on information security and cryptography COSIC (June 15-18, 2015, KU Leuven, Belgium).
 

2014-2015 academic year:

  • May 7, 2015
    A. A. Gorodilova
    Nonlinear Boolean functions: open questions and applications in cryptography.

  • April 30, 2015
    A.V. Kutsenko
    Self-dual bent functions and their properties.

  • April 23, 2015
    D. P. Pokrasenko
    On the component algebraic immunity of vector Boolean functions.

  • April 9, 2015
    A. K. Oblaukhov
    Vector AB -, APN-and bent-functions and their relation to codes (abstract report).

  • April 2, 2015
    N. A. Kolomeets
    Bent functions with the Niho indicator. Review of the works.

  • March 12, 2015
    V. N. Potapov
    q - Valued bent functions at the minimum distance.

  • March 5, 2015
    N. A. Kolomeets
    On the graph of minimal distances of bent functions.

  • February 26, 2015
    S. Y. Filyuzin
    On the algebraic immunity of some Bent functions from the Dillon class.

  • February 19, 2015
    Discussion of the seminar plans.

  • December 3, 2014
    Open Problems Day.

  • October 29, 2014
    N. A. Kolomeets
    Bent functions and rotation symmetric property.

  • October 22, 2014
    N. A. Kolomeets
    Rotation symmetric Boolean functions. A survey.

  • October 16, 2014
    I. A. Pankratova (Tomsk)
    Cryptographic education at TSU.

  • October 15, 2014
    A.V. Cheremushkin (Moscow)
    Affine equivalence and its application in the study of properties of discrete functions.

  • October 8, 2014
    A. A. Gorodilova
    Cryptographic Boolean functions: an overview of the results of recent years according to the articles of the journal "Designs, Codes and Cryptography".

  • October 1, 2014
    N. A. Kolomeets
    Bent functions: an overview of the results of recent years.

  • September 24, 2014
    V. A. Vitkup, A. A. Gorodilova, N. A. Kolomeets, G. I. Shushuev
    About the trip to the SIBECRYPT conference "2014" (school-seminar "Computer security and cryptography") on September 8-13, Yekaterinburg.

  • September 17, 2014
    Watch the movie "The Verchenko Code".
    The film is about the Soviet cryptographer Ivan Yakovlevich Verchenko (1907-1995), who made a great contribution to the development of cryptographic protection of telephone equipment in the USSR.
    Directed by A. Trofimov, 2007.
 

2013-2014 academic year:

  • May 7, 2014
    Summing up the results of the seminar.
    Meeting with students.

  • April 30, 2014
    N. A. Kolomeets
    Bent functions affine on subspaces and their metric properties (PhD thesis).

  • April 23, 2014
    A. A. Gorodilova
    Iterative construction of APN functions.

    E. P. Korsakova
    Estimates of the nonlinearity of vector Boolean functions.

  • April 16, 2014
    N. A. Kolomeets
    On the affinity of Boolean functions on subspaces.

  • April 2, 2014
    V. N. Potapov
    Abstract of the article: "Generalized proper matrices and constructing of m-resilient Boolean functions with maximum nonlinearity for expanded range of parameters"(author Y. V. Tarannikov, 2014).

  • March 26, 2014
    D. P. Pokrasenko
    On the algebraic immunity of vector Boolean functions. Review.

  • March 19, 2014
    S. Y. Filyuzin
    Abstract of the article " Upper bounds on algebraic immunity of Boolean power functions "(authors Y. Nawaz, G. Gong, K. Gupta, 2006).

  • March 12, 2014
    A. A. Gorodilova
    Correspondence between APN functions and special Boolean functions (continued).

  • March 11, 2014
    E. P. Korsakova
    Abstract of the article: "On nonlinearity and global avalanche characteristics of vector Boolean functions"(authors W. Kim, H-S. Hwang, 2004).

  • March 5, 2014
    A. A. Gorodilova
    The correspondence between APN functions and special Boolean functions.

  • February 26, 2014
    V. A. Vitkup
    Abstract of the article: "An APN permutation in dimension six"(authors: K. A. Browning, J. F. Dillon, M. T. McQuistan, and A. J. Wolfe, 2010).

  • February 19, 2014
    G. I. Shushuev
    Abstract of the article "A toolbox for cryptanalysis: linear and affine equivalence algorithms"
    (authors A. Biryukov, C. De Canniere, A. Braeken, B. Preneel, 2003).

  • December 25, 2013
    Summing up the results of the seminar.

  • December 18, 2013
    V. A. Vitkup, A. A. Gorodilova
    Actual problems of symmetric cryptography.

  • December 11, 2013
    G. I. Shushuev
    Abstract of the article: "Bitcoin: A Peer-to-Peer Electronic Cash System"(author S. Nakamoto, 2008).

  • November 27, 2013
    V. A. Vitkup
    Abstract of the article: "Towards measuring anonymity"(authors: C. Diaz, S. Seys, J. Claessens, and B. Preneel, 2003).

  • November 20, 2013
    N. N. Tokareva
    On the decomposition of a Boolean function into a sum of bent functions.

  • November 13, 2013
    Discussion of the seminar plans.
    Presentations of participants with brief reports.

  • November 6, 2013
    G. I. Shushuev
    Abstract of the dissertation " Mathematical aspects of symmetric-key cryptography "(author & ndash; E. & nbsp; W. & nbsp;Tischhauser).

  • October 30, 2013
    S. Y. Filyuzin
    Fast algebraic attacks and new cryptographic properties of Boolean functions (review based on articles by N. Courtois, P. Hawkes, G. Rose)

  • October 23, 2013
    V. A. Vitkup
    About masking implementations of S-blocks.

  • October 16, 2013
    A. A. Gorodilova
    Questions of equivalence of vector Boolean functions (continued).

  • October 9, 2013
    A. A. Gorodilova
    Questions of equivalence of vector Boolean functions.

  • October 2, 2013
    N. A. Kolomeets
    Review of the reports of the CTCrypt conference "2013" Current trends in cryptography"(Yekaterinburg).

  • September 25, 2013
    We are watching the movie "Encrypted War".
    A documentary film within the framework of the project "Secrets of the Century" about encryption during the first and Second World Wars. 
    Directed by O. Ryaskov, 2003.
 

2013-2012 academic year:

  • May 8, 2013
    Summing up the results (final seminar).

  • April 24, 2013
    G. I. Shushuev
    Methods of compression and formation. Lossless compression.

  • April 17, 2013
    N. A. Kolomeets
    Pseudo-random sequences. Review.

  • April 10, 2013
    N. N. Tokareva
    Probabilistic encryption (based on the materials of Sh. Goldwasser, S. Micali).

  • April 3, 2013
    G. I. Shushuev
    Abstract of the article:
    "Weak keys of reduced-round PRESENT for linear cryptanalysis"(author K. Ohkuma; 2009).

  • March 27, 2013
    S. Yu. Zhekpisov
    Overview of encryption methods in digital cellular communications and wireless networks.

  • March 20, 2013
    S. Y. Filyuzin
    Abstract of the article: "A concept about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity"(authors Z. Tu, Y. Deng; 2011).

  • March 13, 2013
    A. A. Frolova
    Abstract of the article: "Crooked Functions, Bent Functions, and Distance Regular Graphs"
    (authors T. D. Bending, D. G. Fon-Der-Flaass; 1998).

  • March 7, 2013
    N. A. Kolomeets
    On a property of quadratic Boolean functions of an even number of variables.

  • February 27, 2013
    Discussion of the seminar plans. Various.

  • February 20, 2013
    A. I. Pestunov
    On the strict uniform terminology of differential cryptanalysis.

  • December 19, 2012
    S. G. Bolgarin
    Soviet cryptography. Two looks.

  • December 12, 2012
    NSU-CRYPTO Conference
    Ya. D. Chernyshov «Cryptography of the Second World War».
    A. A. Shestov "Methods of mathematical linguistics in cryptography".
    A. E. Galashov « GSM Security System».
    Ya. I. Cherepanov "Quantum computer and quantum cryptography: prospects".

  • December 5, 2012
    NSU-CRYPTO Conference. Section "Cryptanalysis"
    N. A. Belov "Linear cryptanalysis and its application in practice".
    Ya. I. Cherepanov "Quantum computer and quantum cryptography: prospects".

  • November 28, 2012
    NSU-CRYPTO Conference. Section «Cryptanalysis »
    A. A. Ageeva & laquo;Cryptanalysis of the AES cipher. An overview of the results.
    N. A. Belov "Linear cryptanalysis and its application in practice".

  • November 21, 2012
    V. A. Vitkup
    Methods of separating S-blocks to protect the cipher from attacks on third-party channels.

  • November 15, 2012
    A. G. Myasnikov (New York)
    Cryptography based on groups II.

  • November 13, 2012
    V. A. Romankov (Omsk)
    Cryptography based on groups I.

  • November 7, 2012
    NSU-CRYPTO Conference.
    Section « History of K. »
    T. K. Yozhak «Cryptographic operations of the XXI century»

    Section "Cryptography and Cryptanalysis"
    A. M. Spitsina «Elliptic curves and cryptosystems based on them »
    A. A. Shestov « Methods of mathematical Linguistics in Cryptography »
    A. A. Ageeva «Cryptanalysis of the AES cipher. Overview of the results »

  • October 31, 2012
    NSU-CRYPTO Conference.
    Section «Cryptography » A. S. Kornienko «Algebraic Methods in Cryptography » (end)
    O. A. Permyakova «Methods of building top secret systems »

    Section "History of K."
    A. I. Shcherbakov “V. A. Kotelnikov and secret communications in the USSR”
    R. V. Ovechkin ‘an overview of cryptography in European countries,”
    V. V. Balak “Claude Shannon and his contributions to cryptography”
    Because Yskak “Cryptographic operations of the twenty-first century"

  • October 24, 2012
    NSU-CRYPTO Conference.
    Section "Cryptography" by A. S. Kornienko "Algebraic methods in cryptography".
    O. A. Permyakova « Methods of building top secret systems».
    S. K. Lebedev « Secret separation schemes and methods of their analysis».
    A.M. Nazhmidenova «The Rabin cryptosystem. Description. Cryptanalysis.

  • October 17, 2012
    G. I. Shushuev
    The Keccak hash function is the winner of the SHA-3 competition.< / li>
  • October 10, 2012
    A. A. Frolova
    Cryptographic criteria for Boolean functions.

  • October 3, 2012
    V. A. Vitkup
    Abstract of the article " Latin squares and their application in cryptography "(author M. E. Tuzhilin).

  • September 26, 2012
    N. A. Kolomeets, S. Yu. Filyuzin
    About the conference "Algorithmic issues of group theory and related fields"(Altai).

  • September 19, 2012
    N. N. Tokareva, A. A. Frolova
    About the trip to the Central European Cryptography Conference TATRACRYPT & rsquo;2012 (Smolenica, Slovakia).

  • September 12, 2012
    We are watching the film "Open closed communication".
    The film is about the history of the creation and use of various types of secret telephone communication in the USSR.
    Directed by D. Skvortsov, 2006.
 

2011-2012 academic year:

  • May 30, 2012
    A. I. Pestunov
    Statistical methods and tools for assessing the security of information by iterative block ciphers (PhD thesis).

  • May 16, 2012
    Summing up the results (final seminar).

  • May 2, 2012
    R. I. Voronin
    The S-AES cipher. Algebraic methods of cryptanalysis.

  • April 25, 2012
    V. V. Golubovskaya
    Summary of the article:
    « How to break MD5 and other hash functions» (authors of X.Wang, H.Yu).

  • April 18, 2012
    An evening of open discussions.

  • April 11, 2012
    G. I. Shushuev
    A general approach to linear cryptanalysis of the Feistel network.

  • April 4, 2012
    E. P. Korsakova
    Summary of the article:
    "Cryptographic properties of quadratic Boolean functions "(authors B. Preneel, R. Govaerts, J. Vandewalle).

  • March 28, 2012
    A. A. Dibert
    Ciphers that are protected from attacks based on the selected open/closed text. A theoretical approach.

  • March 21, 2012
    O. N. Lebedeva
    Summary of the article:
    "A Practical Attack on KeeLoq "(authors: S. Indesteege, N. Keller, O. Dunkelman, E. Biham, B. Preneel).

  • March 7, 2012
    V. N. Potapov
    Properties of correlation and immune functions.

  • February 29, 2012
    N. A. Kolomeets
    Algebraic immunity. Overview of the results (continued).

  • February 22, 2012
    N. A. Kolomeets
    Algebraic immunity. Overview of the results.

  • December 14, 2011
    A. A. Semenov (Irkutsk)
    "Organization of distributed computing in cryptanalysis on the example of the problem of turning the generator A5/1" 

  • December 7, 2011
    Conclusion of the NSU-CRYPTO Conference:
    A. O. Bunkova
    "A new cryptosystem with a public key"

    N. A. Kolomeets
    About A.V. Khalyavin's dissertation "On the construction and evaluation of the characteristics of correlation-immune Boolean functions and related combinatorial objects"

    We are watching the movie "ENIGMA". Poznan mathematicians & rsquo; success » A film about the history of breaking the German Enigma cipher machine by a group of Polish mathematicians (Marian Rejewski, Henryk Zygalski, Jerzy Rozycki) in the 30s of the XX century. The film was shot in Poznan, the hometown of outstanding cryptographers with the participation of their students and relatives. Directed by & ndash; J. Malinowska, 2008

  • November 30, 2011
    NSU-CRYPTO Conference. Section "Information security and cryptography" Yu. V. Kurnysh "Computer viruses"
    G. V. Gurov «MD5 hash function and methods of its cryptanalysis»
    R. I. Voronin « GOST R 34.11-94. The standard for the hash function 
    A.D. Marshak « Correlation cryptanalysis of stream ciphers»
    A.V. Prikhodko «Methods of dishonest cryptography»

  • November 23, 2011
    NSU-CRYPTO Conference. Section «Cryptanalysis » A.D. Marshak «Correlation cryptanalysis of stream ciphers »
    A. S. Domogashev « Differential cryptanalysis and its application in practice »
    A. N. Medvedev « New Trends in Cryptanalysis»
    A.V. Prikhodko «Methods of dishonest Cryptography»

  • November 16, 2011
    NSU-CRYPTO Conference. Section «Cryptanalysis” A. K. Voitov “Cryptography elliptic curve”
    D. V. Neugeboren “Slide attack”
    A. V. Mikhailov ‘the birthday Paradox and its application to cryptanalysis”
    O. N. Lebedev “Methods of cryptanalysis, side channel"

  • November 9, 2011
    NSU-CRYPTO Conference. Section « Cryptography » O. G. Parshina « Quantum computer and quantum Cryptography: prospects».
    S. I. Rostomyan «Cryptographic protocols. Review».
    I. I. Sankov « Results of number theory in cryptography».
    S. Y. Filyuzin «Internet fraud. «Phishing» and «farming» (phishing & farming)».

  • November 2, 2011
    NSU-CRYPTO Conference. Section «Cryptanalysis” E. P. Korsakov “About the history of the Institute of cryptography, communications and Informatics”
    S. G. Bulgarian “Methods of secret sharing and usage practices”
    A. A. Frolov, “A Linear cryptanalysis and its application”
    R. I. Zhukov “Cryptanalysis of the cipher GOST 28147-89. Recent Results »

  • October 26, 2011
    NSU-CRYPTO Conference. Section « Cryptography » Yu. D. Semin «Linear recurrent sequences over a finite field. Review of the results »
    V. O. Myakishev « Modern ways of ensuring information security»
    Yu. A. Muzyukin«QR codes»
    R. V. Dudkin «Electronic digital signature. Practical Application»
    K. V. Abdina « Competitions of Cryptographic standards »

  • October 19, 2011
    NSU-CRYPTO Conference. Section «Cryptography » A. Y. Tumko «Cipher DES. Its «strengths» and «weak » sides »
    V. V. Golubovskaya «The RSA cryptosystem. Practical use»
    A. S. Vrublevsky « Modern methods of steganography»
    G. I. Shushuev «Hash functions. Trends in the methods of building "
    N. S. Kogtikov "Ciphers that were a trade secret. The history of their use and analysis "
    A. A. Baykalov "Cryptography in software products: PGP, Skype, etc." 

  • October 12, 2011
    NSU-CRYPTO Conference. Section "Story, K.” A. I. Tsyganova “On the decipherment of ancient manuscripts,”
    J. S. Krul “Encryption machine "Enigma" and the history of its decryption”
    E. Y. Shin “Claude Shannon and his contributions to cryptography”
    E. S. Kabanova “About the history of the national security Agency USA”
    A. A. Sitkov « VENONA project for decrypting Soviet ciphers»
    V. A. Vitkup «Cryptographic Service of Great Britain. A brief historical overview »

  • October 5, 2011
    N. A. Kolomeets
    About the trip to the International Symposium on Information Theory ISIT & rsquo;2011 (St. Petersburg).

  • September 28, 2011
    A. A. Dibert, N. N. Tokareva
    About the trip to the Central European Cryptography Conference CECC 2011 (Debrecen, Hungary).

  • September 21, 2011
    We are watching the movie "The Verchenko Code".