Mount Allison University

Selected Areas in Cryptography 2015

The 22nd Conference on Selected Areas in Cryptography (SAC 2015) will be held at Mount Allison University in Sackville, New Brunswick, Canada, on August 12-14, 2015.

NEW! — In 2015, for the first time, SAC will be immediately preceded by the SAC Summer School (S3), which will run from August 10-12.

SAC Summer School (S3)

S3 icon

In 2015, for the first time, SAC will be preceded by the SAC Summer School (S3). The purpose of S3 is to provide participants with an opportunity to gain in-depth knowledge of specific areas of cryptography related to the current SAC topics by bringing together world-class researchers who will give extended talks in their areas of specialty. S3 is designed to create a focused learning environment that is also relaxed and collaborative. The SAC Summer School is open to all attendees, and may be of particular interest to students, postdocs, and other early researchers.

S3 will take place at Mount Allison University from August 10-12, immediately before SAC.

In 2015, S3 will focus on one of SAC's permanent topics + this year's special topic:

  • Design and analysis of symmetric key primitives and cryptosystems.
  • Privacy and anonymity enhancing technologies and their analysis.

S3 Registration

S3 is free of charge for students and other attendees from academia. There is nominal charge for attendees from industry.

To register for S3, please visit the Registration page.

S3 Schedule

NOTE:  All S3 sessions will take place in DUNN 106 (Building 18 on the campus map).

The S3 registration desk will be located outside DUNN 106 from 8:30 - 9:30am on Monday, August 10. After this, please see Kellie Mattatall in DUNN 230 (main office area on second floor of DUNN Building).

Date / Time Topic Presenter Slides
9:00am - 10:30am Differential Cryptanalysis, Part 1 Christian Rechberger [Not available]
Coffee Break
11:00am - 12:30pm Differential Cryptanalysis, Part 2 Christian Rechberger -
2:00pm - 3:30pm Privacy/Anonymity, Part 1 Paul Syverson S3-onion-part1.pdf
Coffee Break
4:00pm - 5:30pm Privacy/Anonymity, Part 2 Paul Syverson S3-onion-part2.pdf
9:00am - 10:30am Linear Cryptanalysis, Part 1 Kaisa Nyberg S3-linear-all.pdf
Coffee Break
11:00am - 12:30pm Linear Cryptanalysis, Part 2 Kaisa Nyberg -
2:00pm - 3:30pm Anonymous Credentials, Part 1 Jan Camenisch S3-anonymous-all.pdf
Coffee Break
4:00pm - 5:30pm Anonymous Credentials, Part 2 Jan Camenisch -
9:00am - 10:30am Hash Functions, Part 1 Christian Rechberger [Not available]
Coffee Break
11:00am - 12:30pm Hash Functions, Part 2 Christian Rechberger -
. . .  SAC 2015 begins at 2:00pm in Crabtree M14  . . .

S3 Presenter Bios

Jan Camenisch

Jan Camenisch
Jan Camenisch is a Principal Research Staff Member at IBM Research, and leads the Privacy & Cryptography research team. Jan got his PhD in cryptography in 1998 from ETH Zurich. He is a member of the IBM Academy of Technology and an IEEE Fellow. He is a leading scientist in the area of privacy and cryptography, has published over 100 scientific papers, and has received a number of awards for his work, including the 2010 ACM SIGSAC Outstanding Innovation Award and the 2013 IEEE Computer Society Technical Achievement Award. Jan was the technical leader of the FP7 European research consortia PRIME and PrimeLife, and he and his team have participated and continue to do so in many other projects including ABC4Trust, AU2EU, and Witdom. Jan currently holds an advanced ERC grant for personal cryptography.
[For more information, visit Jan Camenisch's web page.]

Kaisa Nyberg

Kaisa Nyberg
Professor Kaisa Nyberg has Ph.D degree in Mathematics from the University of Helsinki. Her career in Cryptography spans over 25 years. In 1998 she joined Nokia and was responsible for cryptographic techniques in cellular security and related applications. She is a co-author of the book UMTS Security and was a member of the designer team for Bluetooth Secure Simple Pairing. Since 2005, she has been a full professor at Aalto University, Finland, and leads the Cryptography Group in the Department of Computer Science. Kaisa Nyberg is an author of about 80 scientific papers and book chapters on digital signatures, design and analysis of symmetric key cryptography and security protocols. Her current interests are in the statistical models of block cipher cryptanalysis. She was appointed an IACR Fellow in 2015.
[For more information, visit Kaisa Nyberg's web page.]

Christian Rechberger

Christian Rechberger
Christian Rechberger is an Associate Professor in the Department of Applied Mathematics and Computer Science at the Technical University of Denmark. His research centers on the design, analysis, and implementation of symmetric-key primitives, specifically block and stream ciphers, hash functions, and authentication codes. From 2008-2013 he coordinated the hash function working group of the European Union's ECRYPT II Network of Excellence. Dr. Rechberger is a co-designer of the lightweight block cipher PRINCE and of the hash function Grøstl, which was a finalist for the NIST SHA-3 Hash Algorithm Competition.
[For more information, visit Christian Rechberger's web page.]

Paul Syverson

Paul Syverson
Paul Syverson — an inventor of onion routing and other technologies, a creator of Tor, an author of one book on the foundations of logic and over a hundred refereed papers, a chair of many security and privacy conferences, an editor of several journals — has received various patents, several advanced degrees in philosophy and mathematics, and an origami magic rabbit folded for him by Gus Simmons. He is a founder of both the Privacy Enhancing Technologies Symposium (PETS) and the ACM Workshop on Privacy in the Electronic Society (WPES). Among his accolades he has been recognized with an EFF Pioneer Award (given to the Tor Project in 2012), as among the 100 Global Thinkers of 2012 by Foreign Policy Magazine, and most recently as a Fellow of the ACM. For over a quarter century as Mathematician at the U.S. Naval Research Laboratory, he has investigated authentication, epistemic logic, information flow in probabilistic systems, incentives in protocols and systems, traffic-secure communication, and other aspects of computer security and privacy. Paul has served as director of international computer security organizations, and has been a visiting scholar and guest lecturer at universities and institutes in the U.S., England, and Italy.
[You can learn more about Paul at]

SAC and S3 Sponsors