Technical committee for standardization 
«Cryptography and security mechanisms» (TC 26)


This site is outdated and does not update since 01/01/2018

update website

3nd Workshop on Current Trends in Cryptology 

June 5-6, 2014, Moscow, Russia

_mg_8346.jpgАндрей Чачпаев (ОАО «ИнфоТеКС»)Пабло Фрейре Аррозарена (Куба)

Workshop CTCrypt`2014 is affiliated with 9th International Computer Science Symposium in Russia CSR 2014

 The workshop is organized by the Russian Technical Committee for Standardization TC 26 «Cryptography and Security Mechanisms», the Academy of Cryptography of the Russian Federation, and Steklov Mathematical Institute of RAS with the support of the InfoTeCS JSC.

Scope and Topics 

Research papers on all technical aspects of cryptology are welcome. The scope of the workshop includes, but is not limited to the: 
  • design and analysis of cryptographic algorithms; analysis of internationally standardized cryptographic algorithms;
  • efficient implementation of cryptanalytic techniques;
  • security evaluation of Russian cryptographic algorithms;
  • efficient implementation of Russian cryptographic algorithms.

Program Chairs 
  • Vladimir Sachkov (Academy of Cryptography, Moscow, Russia),
  • Aleksei Kuz’min (TC 26, Moscow, Russia).

Program Committee 
  • Mikhail Glukhov (Academy of Cryptography, Moscow, Russia)
  • Igor Kachalin (TC 26, Moscow, Russia)
  • Anatoly Lunin (TC 26, Moscow, Russia)
  • Dmitry Matyukhin (TC 26, Moscow, Russia)
  • Aleksandr Nechaev (Lomonosov Moscow State University, Moscow, Russia)
  • Andrei Pichkur (Educational and Methodical Association of Higher Educational Institutions of Russia on Education in Information Security, Moscow, Russia)
  • Eduard Primenko (Lomonosov Moscow State University, Moscow, Russia)
  • Aleksandr Shoitov (Moscow State Institute of Radio-Engineering, Electronics and Automation (Technical University), Moscow, Russia)
  • Andrei Zubkov (Steklov Mathematical Institute of RAS, Moscow, Russia)

Important dates 
 Deadline for the paper submission: March 3, 2014 
 Notification: April 14, 2014 

 Official languages: English and Russian 
 Paper language: English 
 Electronic presentation language: English 

Submission and Publication 

 Original papers on all technical aspects of cryptology are solicited for submission to CTCrypt 2014. Program committee plans to have regular sessions and posters presentations. It is also supposed that several invited talks from leading Russian experts in cryptography will be offered. 

 Program Committee invites submissions in the form of papers (up to 10 pages according to LaTeX options given below) in English. Proofs and other material which are omitted due to the space constraints should be put into a separate appendix dedicated for the referees. Submissions (in LaTeХ and PDF formats) should be sent as attachments by e-mail with subject line “CTCrypt 2014” to Anatoly Lunin ( The receipt confirmation will be sent within 3 days.

 Short abstracts of accepted papers will be published at CTCrypt 2014 web page before the workshop. Pre-proceedings of the workshop will be published on CD and distributed to the participants at the registration desk. Program committee plans to publish the final versions of selected papers in the post-proceedings of the workshop. The presentation of the paper at the workshop is a necessary prerequisite for the publication in the post-proceedings. 

 Please register through the registration page of

_mg_8567.jpg    The second day of the workshop, the "Practical Cryptography Day", will be dedicated to the practice of using cryptographic tools for ensuring information security in various areas: government, economy and business, private and social life, etc. The discussion is supposed to be attended by scientists, cryptographers, employees of state-owned companies, security product vendors and customers, and information security service providers. The discussion is intended to outline a strategic consolidated approach to information security in modern society. 

The questions to discuss: 
Practical aspects of cryptography usage in modern information protection tools
Legislation and regulation
Product certification
Secure application development
Security functions in software
Security inspection and monitoring, and application code analysis 
Vulnerabilities scanning techniques 
Does `certified’ mean `safe’?
Trusted environment - Myth or Reality?
Cryptography for government-controlled Internet

Sample LaTeX file for submission

\textwidth=160mm \headheight=0mm
\topmargin=0mm \textheight=215mm
\author{Author(s) name(s)}

Short abstract (up to 10 lines without without references to the Bibliography list)

Keywords: keywords
\section{Section name}
\subsection{Subsection name}
Barret R. et al. Templates for the solution of linear systems: building blocks for iterative methods. --- Philadelphia: SIAM, 1994. --- 107 p.
Diffie W., Hellman M. E. New directions in cryptography // IEEE Trans. Inform. Theory. --- 1976. --- V. 22. No 6. --- P. 644—654.
Eberly W., Kaltofen E. On randomized Lanczos algorithms // Proc. Internat. Symp. Symbolic Algebraic Comput., ISSAC'97. --- N.Y., 1997. --- P. 176--183.
Kleinjung T. Discrete logarithms in GF(p) --- 160 digits. ---, 05.02.2007.
Lambert R. Computational aspects of discrete logarithms, Ph.D. Thesis // University of Waterloo, Ontario: 1996. --- 113 p.