Wednesday, August 10:
The welcome reception/registration will be held in Atrium, 245 Church Street, third floor from 18:00 to 20:00.
Thursday, August 11: All talks will take place in ENG105 .
Timing | Event | ||
8:00 - 8:55 | Registration | ||
8:55 - 9:05 | Opening Remarks and Announcements | ||
Cryptanalysis of Hash Functions. Chair: Vincent Rijmen |
|||
9:05 - 9:30 | Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL, Yu Sasaki (NTT Corporation) | ||
9:30 - 9:55 | Improved Analysis of ECHO-256, Jérémy Jean (ENS Paris, France), María Naya-Plasencia (FHNW Windisch, Switzerland), and Martin Schläffer (IAIK TU Graz, Austria) | ||
9:55 - 10:20 | Provable Chosen-Target-Forced-Midfix Preimage Resistance , Elena Andreeva (KU Leuven) and Bart Mennink (KU Leuven) | ||
10:20 - 10:45 | Coffee Break | ||
Security in Clouds. Chair: Michael Wiener |
|||
10:45 - 11:10 | On CCA-Secure Somewhat Homomorphic Encryption, J. Loftus (University of Bristol), A. May (Ruhr-Universität at Bochum), N.P. Smart (University of Bristol) and F. Vercauteren (Katholieke Universiteit Leuven) | ||
11:10 - 11:35 | Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources, Daniel Slamanig (Carinthia University of Applied Sciences) | ||
Invited Talk. Chair: Ali Miri |
|||
11:35 - 12:30 | Cryptographic Techniques for Securing the Cloud, Kristin Lauter (Microsoft Research) | ||
12:30 - 14:00 | Lunch, Location: Pitman Hall Cafe | ||
Bits and Randomness. Chair: Ruizhong Wei |
|||
14:00 - 14:25 | Cryptographic Analysis of All 4 X 4 - Bit S-Boxes, Markku-Juhani O. Saarinen (Revere Security) | ||
14:25 - 14:50 | The Cryptographic Power of Random Selection, Matthias Krause (University of Mannheim) and Matthias Hamann (University of Mannheim) | ||
14:50 - 15:15 | Proof of Empirical RC4 Biases and New Key Correlations, Sourav Sen Gupta (Indian Statistical Institute), Subhamoy Maitra (Indian Statistical Institute), Goutam Paul (Jadavpur University), and Santanu Sarkar (Indian Statistical Institute) | ||
15:15 - 15:40 | Coffee Break | ||
Cryptanalysis of Ciphers I. Chair: Orr Dunkelman |
|||
15:40 - 16:05 | Cryptanalysis of Reduced Versions of the Camellia Block Cipher, Jiqiang Lu (École Normale Supérieure), Yongzhuang Wei (Guilin University of Electronic Technology), Jongsung Kim (Kyungnam University), and Pierre-Alain Fouque (École Normale Supérieure) | ||
16:05 - 16:30 | Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci (TUBITAK BILGEM UEKAE, Istanbul Technical University) | ||
16:30 - 16:55 | Practical Attack on the Full MMB Block Cipher, Keting Jia (Shandong University), Jiazhe Chen (Shandong University), Meiqin Wang (Shandong University) and Xiaoyun Wang (Tsinghua University) | ||
16:55 - 17:20 | Conditional Differential Cryptanalysis of Trivium and KATAN, Simon Knellwolf (FHNW, Switzerland) , Willi Meier (FHNW, Switzerland) and María Naya-Plasencia (FHNW, Switzerland) | ||
18:30 - 21:30 | Banquet: Atlantis Pavilions, The Trillium Ballroom |
Friday, August 12: All talks will take place in ENG105 .
Timing | Event | ||
8:30 - 8:55 | Registration | ||
8:55 - 9:05 | Announcements | ||
Cryptanalysis of Ciphers II. Chair: Noboru Kunihiro |
|||
9:05 - 9:30 | Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64, Martin Ågren (Lund University) | ||
9:30 - 9:55 | Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3, Thomas Fuhr (ANSSI), Henri Gilbert (ANSSI), Jean-René Reinhard (ANSSI), Marion Videau (ANSSI) | ||
9:55 - 10:20 | New Insights on Impossible Differential Cryptanalysis, Charles Bouillaguet (École Normale Supérieure), Orr Dunkelman (University of Haifa), Pierre-Alain Fouque (Weizmann Institute) and Gaetan Leurent (University of Luxembourg) | ||
10:20 - 10:45 | Coffee Break | ||
Cryptanalysis of Public-Key Cryptography. Chair: René Struik |
|||
10:45 - 11:10 | A Unified Framework for Small Secret Exponent Attack on RSA, Noboru Kunihiro (University of Tokyo), Naoyuki Shinohara (NICT), and Tetsuya Izu (Fujitsu Labs) | ||
Cipher Implementation. Chair: René Struik |
|||
11:10 - 11:35 | Very Compact Hardware Implementations of the Block Cipher CLEFIA, Toru Akishita (Sony Corporation) and Harunaga Hiwatari (Sony Corporation) | ||
Stafford Tavares Lecture. Chair: Serge Vaudenay |
|||
11:35 - 12:30 | Another Look at Tightness, Alfred Menezes (University of Waterloo) | ||
12:30 - 14:00 | Lunch, Location Pitman Hall Cafe | ||
New Designs. Chair: Doug Stinson |
|||
14:00 - 14:25 | Duplexing the sponge: single-pass authenticated encryption and other applications, Guido Bertoni (STMicroelectronics), Joan Daemen (STMicroelectronics), Michaël Peeters (STMicroelectronics), Gilles Van Assche (NXP Semiconductors) | ||
14:25 - 14:50 | Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles, Yusuke Naito (Mitsubishi Electric Corporation) | ||
14:50 - 15:15 | ASC-1: An Authenticated Encryption Stream Cipher, Goce Jakimoski (Stevens Institute of Technology) and Samant Khajuria (Aalborg University) | ||
15:15 - 15:40 | Coffee Break | ||
Mathematical Aspects of Applied Cryptography. Chair: Nicolas Thériault |
|||
15:40 - 16:05 | On various families of twisted Jacobi quartics, Jérôme Plût (Université Versailles-Saint-Quentin) | ||
16:05 - 16:30 | Improved Three-Way Split Formulas for Binary Polynomial Multiplication, Christophe Negre (University of Waterloo), Murat Cenk (University of Waterloo), Anwar Hasan (University of Waterloo) | ||
16:30 - 16:55 | Sublinear scalar multiplication on hyperelliptic Koblitz curves, Hugo Labranda (ENS Lyon) and Michael Jacobson, Jr. (University of Calgary) | ||
16:55 - 17:20 | Faster Hashing to G_2 , Laura Fuentes-Castañeda (CINVESTAV-IPN), Edward Knapp (University of Waterloo), and Francisco Rodríguez-Henríquez (CINVESTAV-IPN) | ||
17:20 - 17:30 | Closing Remarks |