Wednesday Registration, Reception and meals will be held in Jennings Hall. Talks will be held in Crabtree Auditorium.
For the Wednesday Reception, one drink ticket (in name tag holder) is provided. There will be a cash bar for additional drinks.

Wednesday August 13, 2008

18:30-20:00 Registration and Light Social Reception at Jennings Hall (see map Building 28)

Thursday August 14, 2008

07:30-08:30 Breakfast at Jennings Hall (free for all participants)
08:00-08:45 Registration at Crabtree Auditorium
(see map Building 19)
08:45-09:00 Welcome Remarks

Elliptic and Hyperelliptic Curve Arithmetic

09:00-09:25 Faster Halvings in Genus 2
Peter Birkner and Nicolas Thériault
09:25-09:50 Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
Xinxin Fan and Guang Gong and David Jao
09:50-10:15 On Software Parallel Implementation of Cryptographic Pairings
Philipp Grabher and Johann Groszschaedl and Dan Page
10:15-10:35 Coffee Break

Block Ciphers I

10:35-11:00 Improved Cryptanalysis of Reduced-Round SMS4
Jonathan Etrog and Matt Robshaw
11:00-11:25 Building Secure Block Ciphers on Generic Attacks Assumptions
Jacques Patarin and Yannick Seurin
11:25-11:40 Coffee Break

Invited Talk

11:40-12:30 Joseph Silverman: Lifting and the Elliptic Curve DLP
12:30-14:00 Lunch Break (Jennings Hall)

Hash Functions I

14:00-14:25 Preimage Attacks on One-Block MD4 and Full-Round MD5
Kazumaro Aoki and Yu Sasaki
14:25-14:50 Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson and Willi Meier and Florian Mendel
14:50-15:15 Cryptanalysis of Tweaked Versions of SMASH and Reparation
Pierre-Alain Fouque and Jacques Stern and Sébastien Zimmer
15:15-15:35 Coffee Break

Mathematical Aspects of Applied Cryptography I

15:35-16:00 Counting Functions for the k-error Linear Complexity of 2n-Periodic Binary Sequences
Ramakanth Kavuluru and Andrew Klapper
16:00-16:25 On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
Matthieu Rivain
16:25-16:40 Coffee Break

Stream Cipher Cryptanalysis

16:40-17:05 Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
Côme Berbain and Henri Gilbert and Antoine Joux
17:05-17:30 A Cache Timing Analysis of HC-256
Erik Zenner
17:30-17:55 An Improved Fast Correlation Attack on Stream Ciphers
Bin Zhang and Dengguo Feng

18:30-22:00 Banquet at the Fisherman's Paradise (meet at 18:30 in front of Campbell Hall Residence)

Friday August 15, 2008

07:30-08:30 Breakfast at Jennings Hall

Hash Functions II

08:35-09:00 A Three-Property-Preserving Hash Function
Elena Andreeva and Bart Preneel
09:00-09:25 Analysis of the Collision Resistance of RadioGatún using Algebraic Techniques
Charles Bouillaguet and Pierre-Alain Fouque
09:25-09:50 A Scheme to base a Hash Function on a Block Cipher
Shoichi Hirose and Hidenori Kuwakado
09:50-10:15 Collisions and other Non-Random Properties for Step-Reduced SHA-256
Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger
10:15-10:35 Coffee Break

Cryptography with Algebraic Curves

10:35-11:00 Public Verifiability from Pairings in Secret Sharing Schemes
Somayeh Heidarvand and Jorge L. Villar
11:00-11:25 The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
Kristin E. Lauter and Katherine E. Stange
11:25-11:40 Coffee Break

Invited Talk: The Stafford Tavares Lecture

11:40-12:30 Jacques Patarin: The "Coefficients H" Technique
12:30-14:00 Lunch Break (Jennings Hall)

Mathematical Aspects of Applied Cryptography II

14:00-14:25 Distinguishing Multiplication and Squaring Operations
Frédéric Amiel and Benoît Feix and Michael Tunstall and Claire Whelan and William P. Marnane
14:25-14:50 Trinomial bases and Chinese remaindering for modular polynomial multiplication
Eric Schost and Arash Hariri
14:50-15:15 Bounds on Fixed Input/Output Length Post-Processing Functions for Biased Physical Random Number Generators
Kyohei Suzuki and Tetsu Iwata
15:15-15:35 Coffee Break

Curve-Based Primitives in Hardware

15:35-16:00 HECC Goes Embedded: An Area-efficient Implementation of HECC
Junfeng Fan and Lejla Batina and Ingrid Verbauwhede
16:00-16:25 ECC is Ready for RFID - A Proof in Silicon
Daniel Hein and Johannes Wolkerstorfer and Norbert Felber
16:25-16:40 Coffee Break

Block Ciphers II

16:40-17:05 Cryptanalysis of a Generic Class of White-Box Implementations
Wil Michiels and Paul Gorissen and Henk D.L. Hollmann
17:05-17:30 New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
Meiqin Wang and Xiaoyun Wang and Changhui Hu
17:30-17:55 Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
Wenling Wu and Lei Zhang and Wentao Zhang
17:55-18:00 Final Remarks