SAC 2011 Program


Wednesday, August 10:

The welcome reception/registration will be held in Atrium, 245 Church Street, third floor from 18:00 to 20:00.


Thursday, August 11: All talks will take place in ENG105 .

Timing           Event
8:00 - 8:55 Registration
8:55 - 9:05 Opening Remarks and Announcements
Cryptanalysis of Hash Functions. Chair: Vincent Rijmen
9:05 - 9:30 Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL, Yu Sasaki (NTT Corporation)
9:30 - 9:55 Improved Analysis of ECHO-256, Jérémy Jean (ENS Paris, France), María Naya-Plasencia (FHNW Windisch, Switzerland), and Martin Schläffer (IAIK TU Graz, Austria)
9:55 - 10:20 Provable Chosen-Target-Forced-Midfix Preimage Resistance , Elena Andreeva (KU Leuven) and Bart Mennink (KU Leuven)
10:20 - 10:45 Coffee Break
Security in Clouds. Chair: Michael Wiener
10:45 - 11:10 On CCA-Secure Somewhat Homomorphic Encryption, J. Loftus (University of Bristol), A. May (Ruhr-Universität at Bochum), N.P. Smart (University of Bristol) and F. Vercauteren (Katholieke Universiteit Leuven)
11:10 - 11:35 Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources, Daniel Slamanig (Carinthia University of Applied Sciences)
Invited Talk. Chair: Ali Miri
11:35 - 12:30 Cryptographic Techniques for Securing the Cloud, Kristin Lauter (Microsoft Research)
12:30 - 14:00 Lunch, Location: Pitman Hall Cafe
Bits and Randomness. Chair: Ruizhong Wei
14:00 - 14:25 Cryptographic Analysis of All 4 X 4 - Bit S-Boxes, Markku-Juhani O. Saarinen (Revere Security)
14:25 - 14:50 The Cryptographic Power of Random Selection, Matthias Krause (University of Mannheim) and Matthias Hamann (University of Mannheim)
14:50 - 15:15 Proof of Empirical RC4 Biases and New Key Correlations, Sourav Sen Gupta (Indian Statistical Institute), Subhamoy Maitra (Indian Statistical Institute), Goutam Paul (Jadavpur University), and Santanu Sarkar (Indian Statistical Institute)
15:15 - 15:40 Coffee Break
Cryptanalysis of Ciphers I. Chair: Orr Dunkelman
15:40 - 16:05 Cryptanalysis of Reduced Versions of the Camellia Block Cipher, Jiqiang Lu (École Normale Supérieure), Yongzhuang Wei (Guilin University of Electronic Technology), Jongsung Kim (Kyungnam University), and Pierre-Alain Fouque (École Normale Supérieure)
16:05 - 16:30 Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci (TUBITAK BILGEM UEKAE, Istanbul Technical University)
16:30 - 16:55 Practical Attack on the Full MMB Block Cipher, Keting Jia (Shandong University), Jiazhe Chen (Shandong University), Meiqin Wang (Shandong University) and Xiaoyun Wang (Tsinghua University)
16:55 - 17:20 Conditional Differential Cryptanalysis of Trivium and KATAN, Simon Knellwolf (FHNW, Switzerland) , Willi Meier (FHNW, Switzerland) and María Naya-Plasencia (FHNW, Switzerland)
18:30 - 21:30 Banquet: Atlantis Pavilions, The Trillium Ballroom

Friday, August 12: All talks will take place in ENG105 .

Timing           Event
8:30 - 8:55 Registration
8:55 - 9:05 Announcements
Cryptanalysis of Ciphers II. Chair: Noboru Kunihiro
9:05 - 9:30 Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64, Martin Ågren (Lund University)
9:30 - 9:55 Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3, Thomas Fuhr (ANSSI), Henri Gilbert (ANSSI), Jean-René Reinhard (ANSSI), Marion Videau (ANSSI)
9:55 - 10:20 New Insights on Impossible Differential Cryptanalysis, Charles Bouillaguet (École Normale Supérieure), Orr Dunkelman (University of Haifa), Pierre-Alain Fouque (Weizmann Institute) and Gaetan Leurent (University of Luxembourg)
10:20 - 10:45 Coffee Break
Cryptanalysis of Public-Key Cryptography. Chair: René Struik
10:45 - 11:10 A Unified Framework for Small Secret Exponent Attack on RSA, Noboru Kunihiro (University of Tokyo), Naoyuki Shinohara (NICT), and Tetsuya Izu (Fujitsu Labs)
Cipher Implementation. Chair: René Struik
11:10 - 11:35 Very Compact Hardware Implementations of the Block Cipher CLEFIA, Toru Akishita (Sony Corporation) and Harunaga Hiwatari (Sony Corporation)
Stafford Tavares Lecture. Chair: Serge Vaudenay
11:35 - 12:30 Another Look at Tightness, Alfred Menezes (University of Waterloo)
12:30 - 14:00 Lunch, Location Pitman Hall Cafe
New Designs. Chair: Doug Stinson
14:00 - 14:25 Duplexing the sponge: single-pass authenticated encryption and other applications, Guido Bertoni (STMicroelectronics), Joan Daemen (STMicroelectronics), Michaël Peeters (STMicroelectronics), Gilles Van Assche (NXP Semiconductors)
14:25 - 14:50 Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles, Yusuke Naito (Mitsubishi Electric Corporation)
14:50 - 15:15 ASC-1: An Authenticated Encryption Stream Cipher, Goce Jakimoski (Stevens Institute of Technology) and Samant Khajuria (Aalborg University)
15:15 - 15:40 Coffee Break
Mathematical Aspects of Applied Cryptography. Chair: Nicolas Thériault
15:40 - 16:05 On various families of twisted Jacobi quartics, Jérôme Plût (Université Versailles-Saint-Quentin)
16:05 - 16:30 Improved Three-Way Split Formulas for Binary Polynomial Multiplication, Christophe Negre (University of Waterloo), Murat Cenk (University of Waterloo), Anwar Hasan (University of Waterloo)
16:30 - 16:55 Sublinear scalar multiplication on hyperelliptic Koblitz curves, Hugo Labranda (ENS Lyon) and Michael Jacobson, Jr. (University of Calgary)
16:55 - 17:20 Faster Hashing to G_2 , Laura Fuentes-Castañeda (CINVESTAV-IPN), Edward Knapp (University of Waterloo), and Francisco Rodríguez-Henríquez (CINVESTAV-IPN)
17:20 - 17:30 Closing Remarks