18:30-20:00 | Registration and Light Social Reception at Jennings Hall (see map Building 28) |
---|
07:30-08:30 | Breakfast at Jennings Hall (free for all participants) |
---|---|
08:00-08:45 | Registration at Crabtree Auditorium (see map Building 19) |
08:45-09:00 | Welcome Remarks |
09:00-09:25 | Faster Halvings in Genus 2 Peter Birkner and Nicolas Thériault |
09:25-09:50 | Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates Xinxin Fan and Guang Gong and David Jao |
09:50-10:15 | On Software Parallel Implementation of Cryptographic Pairings Philipp Grabher and Johann Groszschaedl and Dan Page |
10:15-10:35 | Coffee Break |
---|
10:35-11:00 | Improved Cryptanalysis of Reduced-Round SMS4 Jonathan Etrog and Matt Robshaw |
11:00-11:25 | Building Secure Block Ciphers on Generic Attacks Assumptions Jacques Patarin and Yannick Seurin |
11:25-11:40 | Coffee Break |
---|
11:40-12:30 | Joseph Silverman: Lifting and the Elliptic Curve DLP |
---|---|
12:30-14:00 | Lunch Break (Jennings Hall) |
14:00-14:25 | Preimage Attacks on One-Block MD4 and Full-Round MD5 Kazumaro Aoki and Yu Sasaki |
14:25-14:50 | Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Jean-Philippe Aumasson and Willi Meier and Florian Mendel |
14:50-15:15 | Cryptanalysis of Tweaked Versions of SMASH and Reparation Pierre-Alain Fouque and Jacques Stern and Sébastien Zimmer |
15:15-15:35 | Coffee Break |
---|
15:35-16:00 | Counting Functions for the k-error Linear Complexity of 2n-Periodic Binary Sequences Ramakanth Kavuluru and Andrew Klapper |
16:00-16:25 | On the Exact Success Rate of Side Channel Analysis in the Gaussian Model Matthieu Rivain |
16:25-16:40 | Coffee Break |
---|
16:40-17:05 | Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers Côme Berbain and Henri Gilbert and Antoine Joux |
17:05-17:30 | A Cache Timing Analysis of HC-256 Erik Zenner |
17:30-17:55 | An Improved Fast Correlation Attack on Stream Ciphers Bin Zhang and Dengguo Feng |
18:30-22:00 | Banquet at the Fisherman's Paradise (meet at 18:30 in front of Campbell Hall Residence) |
---|
07:30-08:30 | Breakfast at Jennings Hall |
---|
08:35-09:00 | A Three-Property-Preserving Hash Function Elena Andreeva and Bart Preneel |
09:00-09:25 | Analysis of the Collision Resistance of RadioGatún using Algebraic Techniques Charles Bouillaguet and Pierre-Alain Fouque |
09:25-09:50 | A Scheme to base a Hash Function on a Block Cipher Shoichi Hirose and Hidenori Kuwakado |
09:50-10:15 | Collisions and other Non-Random Properties for Step-Reduced SHA-256 Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger |
10:15-10:35 | Coffee Break |
---|
10:35-11:00 | Public Verifiability from Pairings in Secret Sharing Schemes Somayeh Heidarvand and Jorge L. Villar |
11:00-11:25 | The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin E. Lauter and Katherine E. Stange |
11:25-11:40 | Coffee Break |
---|
11:40-12:30 | Jacques Patarin: The "Coefficients H" Technique |
---|---|
12:30-14:00 | Lunch Break (Jennings Hall) |
14:00-14:25 | Distinguishing Multiplication and Squaring Operations Frédéric Amiel and Benoît Feix and Michael Tunstall and Claire Whelan and William P. Marnane |
14:25-14:50 | Trinomial bases and Chinese remaindering for modular polynomial multiplication Eric Schost and Arash Hariri |
14:50-15:15 | Bounds on Fixed Input/Output Length Post-Processing Functions for Biased Physical Random Number Generators Kyohei Suzuki and Tetsu Iwata |
15:15-15:35 | Coffee Break |
---|
15:35-16:00 | HECC Goes Embedded: An Area-efficient Implementation of HECC Junfeng Fan and Lejla Batina and Ingrid Verbauwhede |
16:00-16:25 | ECC is Ready for RFID - A Proof in Silicon Daniel Hein and Johannes Wolkerstorfer and Norbert Felber |
16:25-16:40 | Coffee Break |
---|
16:40-17:05 | Cryptanalysis of a Generic Class of White-Box Implementations Wil Michiels and Paul Gorissen and Henk D.L. Hollmann |
17:05-17:30 | New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 Meiqin Wang and Xiaoyun Wang and Changhui Hu |
17:30-17:55 | Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia Wenling Wu and Lei Zhang and Wentao Zhang |
17:55-18:00 | Final Remarks |
---|