AppliedCrypto 2010

Introduction
Events:
Program
Participation:
Venue
Registration
Visas
Flights
Maps
Housing
Internet
Weather

Program

The AppliedCrypto 2010 program contains three different types of events:
  • Talks of interest to applied cryptographers at Crypto 2010, CHES 2010, FDTC 2010, and the Second SHA-3 Candidate Conference.
  • Various social events from Crypto 2010, CHES 2010, FDTC 2010, and the Second SHA-3 Candidate Conference.
  • Extra activities of interest to applied cryptographers, such as coding sprints. One activity is listed here so far; check back later for more.
Events not included in the AppliedCrypto program are listed here but crossed out. This schedule is expected to eliminate any need to consult the schedules for Crypto 2010, CHES 2010, FDTC 2010, and the Second SHA-3 Candidate Conference.
Sunday 15 August 2010
17:00
Dorms (Anacapa etc.)Crypto
Registration in Anacapa Formal Lounge. Actually open until 20:00.
17:00
17:30
Dorms (Anacapa etc.)Crypto
Reception dinner in Anacapa/Santa Cruz Ocean Lawn, just outside Anacapa Formal Lounge.
17:30
17:45
De La Guerra Dining CommonsDorm residents
Dinner, if you signed up for it as part of a housing package. The Anacapa reception has more than enough food, and everyone will be there instead.
17:45
19:15 19:15
21:30 21:30 21:30
Monday 16 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 07:30 to 09:00, according to the UCSB Housing web pages.
07:30
08:45 08:45
Campbell AuditoriumCrypto
Opening remarks
08:45
09:00
Campbell AuditoriumCrypto
Brakerski/Goldwasser "Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: quadratic residuosity strikes back)"
09:00
09:15
Campbell AuditoriumAppliedCrypto
"Writing really fast code." Free lab session for students and anyone else interested, starting with the following surprisingly tricky question: "How quickly can we add 1000 32-bit integers?" Meet at the tables outside Campbell. Bring your laptop, fully charged. Participants will be expected to connect to an AppliedCrypto Linux server through ssh and write code on that server, rather than facing the lab leader with an endless variety of different programming environments. Make sure to sign up for an account as part of the AppliedCrypto registration.
09:15
09:25
Campbell AuditoriumCrypto
Dodis/Pietrzak "Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks"
09:25
09:50
Campbell AuditoriumCrypto
Goldwasser/Juma/Rothblum/Vahlis "Continual leakage in the only-computation leakage model"
09:50
10:15
Campbell AuditoriumCrypto
Coffee break. In the sun outside the lecture building. Coffee, reasonable tea, typically some fruits.
10:15 10:15
10:45
Campbell AuditoriumCrypto
Peikert "An efficient and parallel Gaussian sampler for lattices"
10:45
11:10 11:10
Campbell AuditoriumCrypto
Agrawal/Boneh/Boyen "Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE"
11:10
11:35
Campbell AuditoriumCrypto
Invited talk: Goldwasser/Micali/Rackoff "Zero knowledge—25 years"
11:35
12:35
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:35 12:35
13:45 13:45
14:15
Campbell AuditoriumCrypto
Gentry "Toward basing fully homomorphic encryption on worst-case hardness"
14:15
14:40
Campbell AuditoriumCrypto
Aguilar/Gaborit/Herranz "Additively homomorphic encryption with d-operand multiplications"
14:40
15:05
Campbell AuditoriumCrypto
Gentry/Halevi/Vaikuntanathan "i-Hop homomorphic encryption and rerandomizable Yao circuits"
15:05
15:30
Campbell AuditoriumCrypto
Coffee break
15:30 15:30
16:00
Campbell AuditoriumAppliedCrypto
"Writing really fast code, part 2." Meet at the tables outside Campbell.
16:00
Campbell AuditoriumCrypto
Goyal/Ishai/Mahmoody/Sahai "Interactive locking, zero-knowledge PCPs, and unconditional cryptography"
16:00
16:25
Campbell AuditoriumCrypto
Okamoto/Takashima "Fully secure functional encryption with general relations from the decisional linear assumption"
16:25
16:50
Campbell AuditoriumCrypto
Abe/Fuchsbauer/Groth/Haralambiev/Ohkubo "Structure-preserving signatures and commitments to group elements"
16:50
17:00 17:00
17:15
Campbell AuditoriumCrypto
Brier/Coron/Icart/Madore/Randriam/Tibouchi "Efficient indifferentiable hashing into ordinary elliptic curves"
17:15 17:15
17:40 17:40
17:45
De La Guerra Dining CommonsDorm residents
Dinner, if you signed up for it as part of a housing package. The Anacapa dinner has more than enough food, and everyone will be there instead.
17:45
19:00
Dorms (Anacapa etc.)Crypto
Dinner in Anacapa/Santa Cruz Ocean Lawn
19:00
19:15 19:15
21:00 21:00 21:00
Tuesday 17 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 07:30 to 09:00.
07:30
08:45 08:45
Campbell AuditoriumCrypto
Camenisch/Casati/Gross/Shoup "Credential authenticated identification and key exchange"
08:45
09:10
Campbell AuditoriumCrypto
Goyal/Jain/Ostrovsky "Concurrent password-authenticated key exchange in the plain model"
09:10
09:35
Campbell AuditoriumCrypto
Kiltz/O'Neill/Smith "Instantiability of RSA-OAEP under chosen-plaintext attack"
09:35
10:00
Campbell AuditoriumCrypto
Wee "Efficient chosen-ciphertext security via extractable hash proofs"
10:00
10:25
Campbell AuditoriumCrypto
Coffee break
10:25 10:25
10:55
Campbell AuditoriumCrypto
Kleinjung/Aoki/Franke/Lenstra/Thomé/Bos/Gaudry/Kruppa/Montgomery/Osvik/te Riele/Timofeev/Zimmermann "Factorization of a 768-bit RSA modulus"
10:55
11:20
Campbell AuditoriumCrypto
Henecka/May/Meurer "Correcting errors in RSA private keys"
11:20
11:45
Campbell AuditoriumCrypto
Peyrin "Improved differential attacks for ECHO and Groestl"
11:45
12:10
Campbell AuditoriumCrypto
Dunkelman/Keller/Shamir "A practical-time attack on the KASUMI cryptosystem used in GSM and 3G telephony"
12:10
12:35
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:35
13:45 13:45
17:00
Corwin PavilionCHES
Registration
17:00
17:45
De La Guerra Dining CommonsDorm residents
Dinner, if you signed up for it as part of a housing package. The rump session is supposed to have a real dinner this year, instead of the usual snacks.
17:45
18:00
Corwin PavilionCrypto+CHES
Rump session
18:00
19:15 19:15
23:00 23:00 23:00
Wednesday 18 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 06:45 to 09:00.
07:30
08:45
Corwin PavilionCHES
Opening remarks
08:45
09:00
Corwin PavilionCHES
Aumasson/Henzen/Meier/Naya-Plasencia "Quark: a lightweight hash"
09:00
Campbell AuditoriumCrypto
Unruh/Müller-Quade "Universally composable Incoercibility"
09:00
09:25
Corwin PavilionCHES
Knudsen/Leander/Poschmann/Robshaw "PRINTcipher: a block cipher for IC-printing"
09:25
Campbell AuditoriumCrypto
Lin/Pass/Tseng/Venkitasubramaniam "Concurrent non-malleable zero knowledge proofs"
09:25
09:50
Corwin PavilionCHES
Bertoni/Daemen/Peeters/Van Assche "Sponge-based pseudo-random number generators"
09:50
Campbell AuditoriumCrypto
Cho/Lee/Ostrovsky "Equivalence of uniform key agreement and composition insecurity"
09:50
10:15
Corwin PavilionCHES
Morning break (in the "Lagoon Plaza" right outside Corwin)
10:15
Campbell AuditoriumCrypto
Coffee break
10:15
10:45
Corwin PavilionCHES
Guillermin "A high speed coprocessor for elliptic curve scalar multiplications over Fp"
10:45
Campbell AuditoriumCrypto
Gennaro/Gentry/Parno "Non-interactive verifiable computing: outsourcing computation to untrusted workers"
10:45
11:10
Corwin PavilionCHES
Goundar/Joye/Miyaji "Co-Z addition formulae and binary ladders on elliptic curves"
11:10
Campbell AuditoriumCrypto
Chung/Kalai/Vadhan "Improved delegation of computation using fully homomorphic encryption"
11:10
11:35
Corwin PavilionCHES
Longa/Gebotys "Efficient techniques for high-speed elliptic curve cryptography"
11:35
Campbell AuditoriumCrypto
Pinkas/Reinman "Oblivious RAM revisited"
11:35
12:00
Storke PlazaCHES
Lunch
12:00
Campbell AuditoriumCrypto
Bitansky/Canetti "On strong simulation and composable point obfuscation"
12:00
12:25
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:15 to 14:00.
12:25
13:45 13:45
14:00
Corwin PavilionCHES
Coron/Kizhvatov "Analysis and improvement of the random delay countermeasure of CHES 2009"
14:00
Campbell AuditoriumCrypto
Beimel/Omri/Orlov "Protocols for multiparty coin toss with dishonest majority"
14:00
14:25
Corwin PavilionCHES
Aciicmez/Brumley/Grabher "New results on instruction cache attacks"
14:25
Campbell AuditoriumCrypto
Damgård/Orlandi "Multiparty computation for dishonest majority: from passive to active security at low cost"
14:25
14:50
Corwin PavilionCHES
Moradi/Mischke/Eisenbarth "Correlation-enhanced power analysis collision attack"
14:50
Campbell AuditoriumCrypto
Ishai/Kushilevitz/Paskin-Cherniavsky "Secure multiparty computation with minimal interaction"
14:50
15:15
Corwin PavilionCHES
Benoît/Peyrin "Side-channel analysis of six SHA-3 candidates"
15:15
Campbell AuditoriumCrypto
Maji/Prabhakaran/Rosulek "A zero-one law for cryptographic complexity with respect to computational UC security"
15:15
15:40
Campbell AuditoriumCHES
Afternoon break
15:40
Campbell AuditoriumCrypto
Coffee break
15:40
16:10
Campbell AuditoriumCrypto+CHES
Invited talk: Damgård/Naccache "Is theoretical cryptography any good in practice?"
16:10 16:10
17:10 17:10
17:15
Campbell AuditoriumCrypto+CHES
IACR membership meeting
17:15
17:45
De La Guerra Dining CommonsDorm residents
Dinner, if you signed up for it as part of a housing package. The beach barbecue has more than enough food, and everyone wil be there instead.
17:45
18:00
BeachCrypto+CHES
Beach barbecue; officially until 20:15
18:00
19:15 19:15
20:00
Dorms (Anacapa etc.)Crypto+CHES
Crypto Cafe
20:00
22:30 22:30 22:30
Thursday 19 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 06:45 to 09:00.
07:30
08:45 08:45
Campbell AuditoriumCrypto
Hoang/Rogaway "On generalized Feistel networks"
08:45
09:00
Corwin PavilionCHES
Skorobogatov "Flash memory 'bumping' attacks"
09:00
09:10
Campbell AuditoriumCrypto
Krawczyk "Cryptographic extraction and key derivation: the HKDF scheme"
09:10
09:25
Corwin PavilionCHES
Du/Narasimhan "Self-referencing: a scalable side-channel approach for hardware"
09:25
09:35
Campbell AuditoriumCrypto
De/Trevisan/Tulsiani "Time space tradeoffs for attacks against one-way functions and PRGs"
09:35
09:50
Corwin PavilionCHES
Di-Battista/Courrège/Rouzeyre/Torres/Perdu "When failure analysis meets side-channel attacks"
09:50
10:00
Campbell AuditoriumCrypto
Bellare/Cash "Pseudorandom functions and permutations provably secure against related-key attacks"
10:00
10:15
Corwin PavilionCHES
Morning break (and poster session)
10:15
10:25
Campbell AuditoriumCrypto
Coffee break
10:25
10:45
Corwin PavilionCHES
Bouillaguet/Chen/Cheng/Chou/Niederhagen/Shamir/Yang "Fast exhaustive search for polynomial systems in F_2"
10:45
10:55
Campbell AuditoriumCrypto
Dupuis/Nielsen/Salvail "Secure two-party quantum evaluation of unitaries against specious adversaries"
10:55
11:10
Corwin PavilionCHES
Poschmann/Wang/Ling "256 bit standardized crypto for 650 GE—GOST revisited"
11:10
11:20
Campbell AuditoriumCrypto
Winkler/Wullschleger "On the efficiency of classical and quantum oblivious transfer reductions"
11:20
11:35
Corwin PavilionCHES
Nogami/Nekado/Toyota/Hongo/Morikawa "Mixed bases for efficient inversion in F_{((2^2)^2)^2} and conversion matrices of SubBytes of AES"
11:35
11:45
Campbell AuditoriumCrypto
Bouman/Fehr "Sampling in a quantum population, and applications"
11:45
12:00
Storke PlazaCHES
Lunch
12:00
12:10 12:10
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:15 to 14:00.
12:15
13:45 13:45
14:00
Corwin PavilionCHES
Henzen/Gendotti/Guillet/Pargaetzi/Zoller/Gürkaynak "Developing a hardware evaluation method for SHA-3 candidates"
14:00
14:25
Corwin PavilionCHES
Gaj/Homsirikamol/Rogawski "Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs"
14:25
14:50
Corwin PavilionCHES
Bos/Stefan "Performance analysis of the SHA-3 candidates on exotic multi-core architectures"
14:50
15:15
Corwin PavilionCHES
Wenzel-Benner/Graef "XBX: eXternal Benchmarking eXtension for the SUPERCOP crypto benchmarking framework"
15:15
15:40
Corwin PavilionCHES
Afternoon break (and poster session)
15:40
16:10
Corwin PavilionCHES
Berzati/Canovas-Dumas/Goubin "Public key perturbation of randomized RSA implementations"
16:10
16:35
Corwin PavilionCHES
Li/Sakiyama/Gomisawa/Fukunaga/Takahashi/Ohta "Fault sensitivity analysis"
16:35
17:00 17:00
17:30
Dorms (Anacapa etc.)CHES
Shuttles to Four Seasons Biltmore; number and timing of buses is still unannounced
17:30
17:40 17:40
17:45
De La Guerra Dining CommonsDorm residents
Dinner, if you signed up for it as part of a housing package.
17:45
18:15
Four Seasons BiltmoreCHES
Reception
18:15
18:45
Four Seasons BiltmoreCHES
Awards dinner
18:45
19:15 19:15
20:00
Four Seasons BiltmoreCHES
Rump session
20:00
22:00 22:00 22:00
Friday 20 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 07:30 to 09:00.
07:30
08:45 08:45
09:00
Corwin PavilionCHES
Hofer/Boehm "An alternative to error correction for SRAM-like PUFs"
09:00
09:25
Corwin PavilionCHES
Varchola/Drutarovsky "New high entropy element for FPGA based true random number generators"
09:25
09:50
Corwin PavilionCHES
Suzuki/Shimizu "The glitch PUF: a new delay-PUF architecture exploiting glitch shapes"
09:50
10:15
Corwin PavilionCHES
Morning break (and poster session)
10:15
10:45
Corwin PavilionCHES
Invited talk: Shacham "Cars and voting machines: embedded systems in the field"
10:45
11:45
Storke PlazaCHES
Lunch
11:45
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:15
13:30
Corwin PavilionCHES
Jäarvinen/Kolesnikov/Sadeghi/Schneider "Garbled circuits for leakage-resilience: hardware implementation and evaluation of one-time programs"
13:30
13:45 13:45
13:55
Corwin PavilionCHES
Badel/Dağtekin/Nakahara/Ouafi/Reffé/Sepehrdad/Sušil/Vaudenay "ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware"
13:55
14:20
Corwin PavilionCHES
Afternoon break
14:20
14:50
Corwin PavilionCHES
Rivain/Prouff "Provably secure higher-order masking of AES"
14:50
15:15
Corwin PavilionCHES
Oren/Kirschbaum/Popp/Wool "Algebraic side-channel analysis in the presence of errors"
15:15
15:40
Corwin PavilionCHES
Tunstall/Joye "Coordinate blinding over large prime fields"
15:40
16:05
Corwin PavilionCHES
Concluding remarks
16:05
16:15 16:15
17:45
De La Guerra Dining CommonsDorm residents
Dinner
17:45
19:15 19:15 19:15
Saturday 21 August 2010
07:30
Corwin PavilionFDTC
Breakfast (in the Lagoon Plaza outside Corwin)
07:30
De La Guerra Dining CommonsDorm residents
Breakfast? Not clear if De La Guerra will be open.
07:30
08:45
Corwin PavilionFDTC
Registration (actually starting 08:00)
08:45 08:45
09:00
Corwin PavilionFDTC
Opening remarks; this and all subsequent talks are in the MCC Theater across from Corwin
09:00
09:10
Corwin PavilionFDTC
Kim "Differential fault analysis against AES-192 and AES-256 with minimal faults"
09:10
09:35
Corwin PavilionFDTC
Clavier/Feix/Gagnerot/Roussellet "Passive and active combined attacks on AES"
09:35
10:00
Corwin PavilionFDTC
Morning break
10:00
10:30
Corwin PavilionFDTC
Skorobogatov "Optical fault masking attacks"
10:30
10:55
Corwin PavilionFDTC
Fournier/Loubet/Moundi "Memory address scrambling revealed using fault attacks"
10:55
11:20
Corwin PavilionFDTC
Invited talk: Shamir "Generic analysis of small cryptographic leaks"
11:20
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:15
13:45 13:45
14:00
Dorms (Anacapa etc.)AppliedCrypto
"Benchmarking hash functions." Meet at the Anacapa Formal Lounge, or at the reception if the lounge is locked.
14:00
Corwin PavilionFDTC
Guilley/Sauvage/Danger/Selmane "Fault injection resilience"
14:00
14:25
Corwin PavilionFDTC
Medwed/Schmidt "A continuous fault countermeasure for AES providing a constant error detection rate"
14:25
14:50
Corwin PavilionFDTC
Trichina "Multi-fault laser attacks on protected CRT RSA"
14:50
15:30 15:30
15:45
Corwin PavilionFDTC
Afternoon break
15:45 15:45
16:15
Corwin PavilionFDTC
Coron/Giraud/Morin/Piret/Vigilant "Fault attacks and countermeasures on Vigilant's RSA-CRT algorithm"
16:15
16:40
Corwin PavilionFDTC
Karaklajic/Knezevic/Verbauwhede "Low cost built in self test for public key crypto cores"
16:40
17:05
Corwin PavilionFDTC
Closing remarks
17:05
17:15 17:15
17:45
De La Guerra Dining CommonsDorm residents
Dinner
17:45
19:15 19:15 19:15
Sunday 22 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast? Not clear if De La Guerra will be open.
07:30
08:45 08:45
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:15
13:45 13:45
17:45
De La Guerra Dining CommonsDorm residents
Dinner
17:45
19:15 19:15
Monday 23 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 07:15 to 09:00.
07:30
08:45 08:45
09:00
Corwin PavilionSHA-3
Opening remarks
09:00
09:10
Corwin PavilionSHA-3
Thomsen "Deterministic differential properties of the BMW compression function"
09:10
09:25
Corwin PavilionSHA-3
Aumasson "Distinguisher for full final round of Fugue-256"
09:25
09:40
Corwin PavilionSHA-3
Sasaki "New non-ideal properties of AES-based permutations: applications to ECHO and Grøstl"
09:40
09:55
Corwin PavilionSHA-3
Schlaeffer "Subspace distinguisher for 58 rounds of the ECHO-256 hash function"
09:55
10:10
Corwin PavilionSHA-3
Rechberger "Rotational rebound attacks on reduced Skein"
10:10
10:25 10:25
10:30
Corwin PavilionSHA-3
Coffee break
10:30
10:55
Corwin PavilionSHA-3
Yu "Cryptanalysis of the compression function of SIMD"
10:55
11:10
Corwin PavilionSHA-3
Calik "Message recovery and pseudo-preimage attacks on the compression function of Hamsi-256"
11:10
11:25
Corwin PavilionSHA-3
McKay "Symmetric states and their structure—Improved analysis of CubeHash"
11:25
11:40
Corwin PavilionSHA-3
Bertoni "Building power analysis resistant implementations of Keccak"
11:40
11:55
Corwin PavilionSHA-3
Daemen "Duplexing the sponge—authenticated encryption and other applications"
11:55
12:10 12:10
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:15
13:45
Corwin PavilionSHA-3
Tillich "Uniform evaluation of hardware implementations of the round-two SHA-3 candidates"
13:45
14:00
Corwin PavilionSHA-3
Schaumont "Fair and comprehensive performance evaluation of 14 second round SHA-3 ASIC implementations"
14:00
14:15
Corwin PavilionSHA-3
Baldwin "FPGA implementations of the round two SHA-3 candidates"
14:15
14:30
Corwin PavilionSHA-3
Matsuo "How can we conduct fair and consistent hardware evaluation for SHA-3 candidate"
14:30
14:45
Corwin PavilionSHA-3
Gaj "Comprehensive comparison of hardware performance of fourteen round 2 SHA-3 candidates with 512-bit outputs using field programmable gate arrays" and "ATHENa—Automated Tool for Hardware EvaluationN—toward fair and comprehensive benchmarking of cryptographic algorithms using FPGAs"
14:45
15:00
Corwin PavilionSHA-3
Coffee break
15:00
15:30
Corwin PavilionSHA-3
Järvinen "Sharing resources between AES and the SHA-3 second round candidates Fugue and Grøstl"
15:30
15:42
Corwin PavilionSHA-3
Savas "Efficient hardware implementations of high throughput SHA-3 candidates Keccak, Luffa and Blue Midnight Wish for Single- and Multi-Message Hashing"
15:42
15:54
Corwin PavilionSHA-3
Hadedy "Resource-efficient implementation of Blue Midnight Wish-256 Hash Function on Xilinx FPGA platform"
15:54
16:06
Corwin PavilionSHA-3
Francq "Unfolding method for Shabal on Virtex-5 FPGAs—concrete results"
16:06
16:18
Corwin PavilionSHA-3
Walker "A Skein-512 hardware implementation"
16:18
16:30
Corwin PavilionSHA-3
Short break
16:30
16:40
Corwin PavilionSHA-3
Burr "Open discussion—SHA-3 competition strategies and timeline"
16:40
17:30 17:30
17:45
De La Guerra Dining CommonsDorm residents
Dinner. Maybe the reception will have enough food to substitute for dinner, but this isn't clear.
17:45
19:00
Faculty ClubSHA-3
Reception
19:00
19:15 19:15
21:00 21:00 21:00
Tuesday 24 August 2010
07:30
De La Guerra Dining CommonsDorm residents
Breakfast. Actually open 07:15 to 09:00.
07:30
08:45 08:45
09:00
Corwin PavilionSHA-3
Pornin "Comparative performance review of the SHA-3 second-round candidates"
09:00
09:15
Corwin PavilionSHA-3
Bernstein "Software speed of SHA-3 candidates"
09:15
09:30
Corwin PavilionSHA-3
Wenzel-Benner "Benchmarking SHA-3 candidates on embedded platforms"
09:30
09:45 09:45
09:50
Corwin PavilionSHA-3
Heyse "Evaluation of SHA-3 candidates for 8-bit embedded processors"
09:50
10:05
Corwin PavilionSHA-3
Yalcin "Serialized Keccak architecture for lightweight applications"
10:05
10:20
Corwin PavilionSHA-3
Coffee break
10:20
10:45
Corwin PavilionSHA-3
Otte "Optimizing Blue Midnight Wish for size"
10:45
10:57
Corwin PavilionSHA-3
Calik "An efficient software implementation of Fugue"
10:57
11:09 11:09
11:10
Corwin PavilionSHA-3
Turan "Practical near-collisions for reduced round Blake, Fugue, Hamsi and JH"
11:10
11:25
Corwin PavilionSHA-3
Morawiecki "A SAT-based preimage analysis of reduced KECCAK hash functions"
11:25
11:40
Corwin PavilionSHA-3
McKay "Pseudo-linear approximations for ARX ciphers with application to Threefish"
11:40
11:55
Corwin PavilionSHA-3
Mennink "Security reductions of the SHA-3 candidates; On the indifferentiability of the Grøstl hash function"
11:55
12:10 12:10
12:15
De La Guerra Dining CommonsDorm residents
Lunch. Actually open 11:30 to 13:30.
12:15
13:45
Corwin PavilionSHA-3
Aumasson "Blake"
13:45
13:57
Corwin PavilionSHA-3
Knapskog "BMW"
13:57
14:09
Corwin PavilionSHA-3
Bernstein "CubeHash"
14:09
14:21
Corwin PavilionSHA-3
Peyrin "ECHO"
14:21
14:33
Corwin PavilionSHA-3
Jutla "Fugue"
14:33
14:45
Corwin PavilionSHA-3
Rechberger "Groestl"
14:45
14:57
Corwin PavilionSHA-3
Kucuk "Hamsi"
14:57
15:09 15:09
15:15
Corwin PavilionSHA-3
Coffee break
15:15
15:40
Corwin PavilionSHA-3
Wu "JH"
15:40
15:52
Corwin PavilionSHA-3
Van Assche "Keccak" and "On the security of the keyed sponge construction"
15:52
16:04
Corwin PavilionSHA-3
Watanabe "Luffa"
16:04
16:16
Corwin PavilionSHA-3
Canteaut "Shabal" and "Internal distinguishers in indifferentiable hashing—the Shabal case"
16:16
16:28
Corwin PavilionSHA-3
Dunkelman "SHAvite-3"
16:28
16:40
Corwin PavilionSHA-3
Bouillaguet "SIMD" and "Security analysis of SIMD"
16:40
16:52
Corwin PavilionSHA-3
Callas "Skein"
16:52
17:04 17:04
17:10
Corwin PavilionSHA-3
Closing remarks
17:10
17:30 17:30
17:45
De La Guerra Dining CommonsDorm residents
Dinner
17:45
19:15 19:15

Version

This is version 2017.01.22 of the program.html web page.