Schedule
9:00 AM - 10:15 AM
Symmetric Cryptography
A DFA Attack on White-Box Implementations of AES with External Encodings
by Alessandro Amadori (Eindhoven University of Technology); Wil Michiels (NXP Semiconductors and Eindhoven University of Technology); Peter Roelse (Irdeto B.V.)
Parallelizable Authenticated Encryption with Small State Size
by Akiko Inoue and Kazuhiko Minematsu (NEC Corporation)
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
by Benjamin Hettwer and Stefan Gehrer (Robert Bosch GmbH, Corporate Sector Research); Tim Güneysu (Horst Görtz Institute for IT-Security, Ruhr University Bochum)
10:15 AM - 10:45 AM
DC 1301
Coffee Break
10:45 AM - 11:35 AM
Post-quantum constructions
BBQ: Using AES in Picnic Signatures
by Cyprien Delpech de Saint Guilhem (imec-COSIC, KU Leuven, Belgium; University of Bristol, United Kingdom); Lauren De Meyer and Emmanuela Orsini (imec-COSIC, KU Leuven, Belgium); Nigel P. Smart (imec-COSIC, KU Leuven, Belgium; University of Bristol, United Kingdom)
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
by Chitchanok Chuengsatiansup (Inria and ENS de Lyon, France); Damien Stehle (ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France)
11:35 AM - 12:30 PM
Invited lecture - The state-of-the-art in supersingular isogenies: the SIKE protocol and its cryptanalysis
Craig Costello, Microsoft Research