Seminar program

From ESC2013
Jump to: navigation, search

Contents

14-January 2013 1st day of the seminar

8:30-9:00 Welcome coffee/tea

9:00 Seminar start

Session 1: 9:00-10:20

Yu Sasaki: Meet-in-the-Middle Attacks on Feistel Functions: Impact of Omitting the Last Network Twist slides

Dan Bernstein: Feistel modes redivivus slides

10:20-10:50 Break

Session 2: 10:50-12:10

Stefan Lucks: Tree Hashing slides

Christian Forler: OCFB: Output Ciphertext Feedback Mode Authenticated Encryption Without a Block Cipher slides

12:30-14:00 Lunch

Session 3: 15:10 - 17:10

Greg Rose: A new efficient construction for wide S-boxes slides

Gaetan Leurent: Differential Attacks against ARX Design slides

Céline Blondeau: Using Multiple Differentials... On the LLR and chi^2 Statistical Tests. slides

17:10 - 17:40 Break

Session 4: 17:40 - 19:00

Jakob Wenzel: A Framework for Automated Biclique Cryptanalysis of Block Ciphers slides

Steve Babbage: Choosing new authentication and key generation algorithms for mobiles slides

19:00 - 21:00 Dinner

15-January 2013 2nd day of the seminar

Session 1: 9:00-10:10


Antoine Joux: New discrete logarithms results slides

Daniel J. Bernstein and Tanja Lange: Non-uniform cracks in the concrete: the power of free precomputation. (Slides are linked from the abstract page)

10:10-10:40 Break

Session 2: 10:40-12:20


Henri Gilbert: An Untwisted Representation of AES slides

Dan Bernstein: Discussion on Authenticated Encryption see http://competitions.cr.yp.to/


12:30-14:00 Lunch

Session 3: 15:10 - 17:10

Jens Hermans: RFID Authentication: security, privacy and the real world slides

Serge Vaudenay: Strong privacy for RFID systems from plaintext-aware encryption slides

Ioana Boureanu: On the Need for Provably Secure Distance Bounding slides


17:10 - 17:40 Break

Session 4: 17:40 - 19:00

Francois-Xavier Standaert New cipher designs for improved SCA resistance slides

Meiqin Wang: Zero-Correlation Linear Cryptanalysis of Reduced-Round Camellia and CLEFIA slides


19:00 - 21:00 Dinner

16-January 2013 3rd day of the seminar

Session 1: 9:00-10:00

Nyberg Kaisa: Computing Averages over Fixed Inputs and Links between Linear and Differential Attacks slides

Orr Dunkelman: New Directions in Dividing: Le Fabuleux Destin d'MISTY1 (The Case of MISTY1) slides

10:00-10:30 Break

Session 2: 10:30-11:40

Itai Dinur: Exploiting Symmetry in Collision Attacks on Round-Reduced SHA-3 slides

Willi Meier: Near-colliding Keys in RC4 slides

11:50-13:30 Lunch

Free time in the afternoon

Excursion to the Maginot fort Hackenberg. Temperature inside the fort is 12 degrees, so take warm clothes (still it is much warmer than outside).

Bus starts from the hotel at 13:40.

Excursion 14:30 - 17:00.

Arrive back at the hotel at 17:40

18:00 Rump session

19:00 - 21:00 Dinner

17-January 2013 4th day of the seminar

Session 1: 9:00-10:10

Dmitry Khovratovich: Key Wrapping with the Keccak permutation slides

Antoine Joux: Improved attack on the Even-Mansour construction slides


10:10-10:40 Break


Session 2: 10:40-12:10

Gregor Leander: Bounds in Shallows and in Miseries slides

Vesselin Velichkov: On the Construction of Partial Difference Distribution Tables for ARX Ciphers slides

12:30-14:00 Lunch


Session 3: 15:10 - 17:10

Michael Peeters, Joan Daemen and Gilles van Assche: Power analysis of implementations protected with secret sharing - Application to Keccak slides

Tetsu Iwata: On the Counter Collision Probability of GCM slides


17:10 - 17:40 Break

Session 4: 17:40 - 19:00

María Naya-Plasencia: "Meet-in-the-middle" through an Sbox slides

Frederik Armknecht: On group-homomorphic encryption slides

19:00 - 21:00 Dinner

18-January 2013 5th day of the seminar

Session 1: 9:00-10:25

Bart Mennink: "Impossibility Results for Indifferentiability with Resets" slides

Pascal Junod: QCrypt: implementing a next-generation quantum key distillation engine in practice slides

Johann Großschädl: Hardware/Software Co-Design of Lightweight Elliptic Curve Cryptography for the Internet of Things slides

10:30-11:00 Break

Session 2: 10:50-12:20

Ralf-Philipp Weinmann: Malicious Cryptographic Design

Jean-Philippe Aumasson: BLAKE2 slides

Closing ESC2013

12:30-14:00 Lunch

Personal tools
Namespaces

Variants
Actions
ESC 2013
Tools