Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DA_2020_27_4_a1, author = {A. A. Gorodilova and N. N. Tokareva and S. V. Agievich and C. Carlet and E. V. Gorkunov and V. A. Idrisova and N. A. Kolomeec and A. V. Kutsenko and R. K. Lebedev and S. Nikova and A. K. Oblaukhov and I. A. Pankratova and M. A. Pudovkina and V. Rijmen and A. N. Udovenko}, title = {On the {Sixth} {International} {Olympiad} {in~Cryptography} {NSUCRYPTO}}, journal = {Diskretnyj analiz i issledovanie operacij}, pages = {21--57}, publisher = {mathdoc}, volume = {27}, number = {4}, year = {2020}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DA_2020_27_4_a1/} }
TY - JOUR AU - A. A. Gorodilova AU - N. N. Tokareva AU - S. V. Agievich AU - C. Carlet AU - E. V. Gorkunov AU - V. A. Idrisova AU - N. A. Kolomeec AU - A. V. Kutsenko AU - R. K. Lebedev AU - S. Nikova AU - A. K. Oblaukhov AU - I. A. Pankratova AU - M. A. Pudovkina AU - V. Rijmen AU - A. N. Udovenko TI - On the Sixth International Olympiad in~Cryptography NSUCRYPTO JO - Diskretnyj analiz i issledovanie operacij PY - 2020 SP - 21 EP - 57 VL - 27 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/DA_2020_27_4_a1/ LA - ru ID - DA_2020_27_4_a1 ER -
%0 Journal Article %A A. A. Gorodilova %A N. N. Tokareva %A S. V. Agievich %A C. Carlet %A E. V. Gorkunov %A V. A. Idrisova %A N. A. Kolomeec %A A. V. Kutsenko %A R. K. Lebedev %A S. Nikova %A A. K. Oblaukhov %A I. A. Pankratova %A M. A. Pudovkina %A V. Rijmen %A A. N. Udovenko %T On the Sixth International Olympiad in~Cryptography NSUCRYPTO %J Diskretnyj analiz i issledovanie operacij %D 2020 %P 21-57 %V 27 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/DA_2020_27_4_a1/ %G ru %F DA_2020_27_4_a1
A. A. Gorodilova; N. N. Tokareva; S. V. Agievich; C. Carlet; E. V. Gorkunov; V. A. Idrisova; N. A. Kolomeec; A. V. Kutsenko; R. K. Lebedev; S. Nikova; A. K. Oblaukhov; I. A. Pankratova; M. A. Pudovkina; V. Rijmen; A. N. Udovenko. On the Sixth International Olympiad in~Cryptography NSUCRYPTO. Diskretnyj analiz i issledovanie operacij, Tome 27 (2020) no. 4, pp. 21-57. http://geodesic.mathdoc.fr/item/DA_2020_27_4_a1/
[1] The official website of NSUCRYPTO, , Novosibirsk State Univ., Novosibirsk, 2020 (accessed Sept. 24, 2020) nsucrypto.nsu.ru
[2] Unsolved problems of NSUCRYPTO, (accessed Sept. 24, 2020) nsucrypto.nsu.ru/unsolved-problems
[3] K. L. Geut, K. A. Kirienko, P. O. Sadkov, R. I. Taskin, S. S. Titov, “On explicit constructions for solving the problem “A secret sharing””, Prikl. Diskretn. Mat., Prilozh., 2017, no. 10, 68–70 (Russian)
[4] S. V. Agievich, A. A. Gorodilova, V. A. Idrisova, N. A. Kolomeec, G. I. Shushuev, N. N. Tokareva, “Mathematical problems of the Second International Students' Olympiad in Cryptography”, Cryptologia, 41:6 (2017), 534–565 | DOI
[5] S. V. Agievich, A. A. Gorodilova, N. A. Kolomeec, S. Nikova, B. Preneel, V. Rijmen, G. I. Shushuev, N. N. Tokareva, V. A. Vitkup, “Problems, solutions and experience of the First International Students' Olympiad in Cryptography”, Prikl. Diskretn. Mat., 2015, no. 3, 41–62 | Zbl
[6] A. A. Gorodilova, S. V. Agievich, C. Carlet, E. V. Gorkunov, V. A. Idrisova, N. A. Kolomeec, A. V. Kutsenko, S. Nikova, A. K. Oblaukhov, S. Picek, B. Preneel, V. Rijmen, N. N. Tokareva, “Problems and solutions from the Fourth International Students' Olympiad in Cryptography (NSUCRYPTO)”, Cryptologia, 43:2 (2019), 138–174 | DOI
[7] A. A. Gorodilova, S. V. Agievich, C. Carlet, X. Hou, V. A. Idrisova, N. A. Kolomeec, A. V. Kutsenko, L. Mariot, A. K. Oblaukhov, S. Picek, B. Preneel, R. Rosie, N. N. Tokareva, “The Fifth International Students- Olympiad in Cryptography NSUCRYPTO: Problems and their solutions”, Cryptologia, 44:3 (2020), 223–256 | DOI
[8] N. N. Tokareva, A. A. Gorodilova, S. V. Agievich, V. A. Idrisova, N. A. Kolomeec, A. V. Kutsenko, A. K. Oblaukhov, G. I. Shushuev, “Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography”, Prikl. Diskretn. Mat., 2018, no. 40, 34–58 | MR | Zbl
[9] B. Schneier, Applied cryptography: Protocols, algorithms and source code in C, Wiley, Hoboken, NJ, 1996 | MR | Zbl
[10] R. E. Lewand, Cryptological mathematics, MAA Press, Washington, DC, 2000 | MR | Zbl
[11] Letter frequency, , Wikimedia Foundation, San Francisco, 2020 (accessed Sept. 24, 2020) en.wikipedia.org/wiki/Letter_frequency
[12] Find words using pattern matching, , The Bitmill, Calgary, 2018 (accessed Sept. 24, 2020) www.litscape.com/word_tools/pattern_match.php
[13] M. Brinkmann, G. Leander, “On the classification of APN functions up to dimension five”, Des. Codes Cryptogr., 49:1-3 (2008), 273–288 | DOI | MR | Zbl
[14] C. De Cannière, Analysis and design of symmetric encryption algorithms, PhD thesis, Katholieke Univ. Leuven, Heverlee, 2007
[15] Test server for the problem TwinPeaks3, (accessed Sept. 24, 2020) nsucrypto.nsu.ru/archive/2019/round/2/task/4
[16] An implementation for the function Curl27 in Java, (accessed Sept. 24, 2020) nsucrypto.nsu.ru/media/Olympiads/2019/Round_2/Tasks/curl27.java
[17] R. A. De la Cruz Jiménez, “Generation of 8-bit S-boxes having almost optimal cryptographic properties using smaller 4-bit S-boxes and finite field multiplication”, Progress in Cryptology, LATINCRYPT 2017, Rev. Sel. Pap. 5th Int. Conf. Cryptol. Inform. Secur. Latin America (Havana, Cuba, Sept. 20–22, 2017), Lect. Notes Comput. Sci., 11368, Springer, Cham, 2019, 191–206 | DOI | MR | Zbl
[18] D. B. Fomin, “New classes of 8-bit permutations based on a butterfly structure”, Mat. Vopr. Kriptogr., 10:2 (2019), 169–180 | MR
[19] C. Carlet, “Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets”, Finite Fields Appl., 53 (2018), 226–253 | DOI | MR | Zbl
[20] C. Carlet, “On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures”, Des. Codes Cryptogr., 87:2-3 (2019), 203–224 | DOI | MR | Zbl
[21] Total results of NSUCRYPTO-2019, (accessed Sept. 24, 2020) nsucrypto.nsu.ru/archive/2019/total_results/#data