Sunday 15 August 2010 |
17:00 |
Dorms (Anacapa etc.) | Crypto | Registration in Anacapa Formal Lounge. Actually open until 20:00.
|
17:00 |
|
17:30 |
Dorms (Anacapa etc.) | Crypto | Reception dinner in Anacapa/Santa Cruz Ocean Lawn, just outside Anacapa Formal Lounge.
|
17:30 |
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The Anacapa reception has more than enough food, and everyone will be there instead.
|
17:45 |
19:15 |
|
19:15 |
21:30 |
|
21:30 |
|
21:30 |
Monday 16 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:30 to 09:00, according to the UCSB Housing web pages.
|
07:30 |
|
08:45 |
|
08:45 |
Campbell Auditorium | Crypto | Opening remarks
|
08:45 |
|
09:00 |
Campbell Auditorium | Crypto | Brakerski/Goldwasser "Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: quadratic residuosity strikes back)"
|
09:00 |
09:15 |
Campbell Auditorium | AppliedCrypto | "Writing really fast code." Free lab session for students and anyone else interested, starting with the following surprisingly tricky question: "How quickly can we add 1000 32-bit integers?" Meet at the tables outside Campbell. Bring your laptop, fully charged. Participants will be expected to connect to an AppliedCrypto Linux server through ssh and write code on that server, rather than facing the lab leader with an endless variety of different programming environments. Make sure to sign up for an account as part of the AppliedCrypto registration.
|
09:15 |
09:25 |
Campbell Auditorium | Crypto | Dodis/Pietrzak "Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks"
|
09:25 |
09:50 |
Campbell Auditorium | Crypto | Goldwasser/Juma/Rothblum/Vahlis "Continual leakage in the only-computation leakage model"
|
09:50 |
10:15 |
Campbell Auditorium | Crypto | Coffee break. In the sun outside the lecture building. Coffee, reasonable tea, typically some fruits.
|
10:15 |
|
10:15 |
10:45 |
Campbell Auditorium | Crypto | Peikert "An efficient and parallel Gaussian sampler for lattices"
|
10:45 |
|
11:10 |
|
11:10 |
Campbell Auditorium | Crypto | Agrawal/Boneh/Boyen "Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE"
|
11:10 |
|
11:35 |
Campbell Auditorium | Crypto | Invited talk: Goldwasser/Micali/Rackoff "Zero knowledge—25 years"
|
11:35 |
12:35 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:35 |
|
12:35 |
13:45 |
|
13:45 |
|
|
14:15 |
Campbell Auditorium | Crypto | Gentry "Toward basing fully homomorphic encryption on worst-case hardness"
|
14:15 |
|
14:40 |
Campbell Auditorium | Crypto | Aguilar/Gaborit/Herranz "Additively homomorphic encryption with d-operand multiplications"
|
14:40 |
|
15:05 |
Campbell Auditorium | Crypto | Gentry/Halevi/Vaikuntanathan "i-Hop homomorphic encryption and rerandomizable Yao circuits"
|
15:05 |
15:30 |
Campbell Auditorium | Crypto | Coffee break
|
15:30 |
|
15:30 |
16:00 |
Campbell Auditorium | AppliedCrypto | "Writing really fast code, part 2." Meet at the tables outside Campbell.
|
16:00 |
Campbell Auditorium | Crypto | Goyal/Ishai/Mahmoody/Sahai "Interactive locking, zero-knowledge PCPs, and unconditional cryptography"
|
16:00 |
16:25 |
Campbell Auditorium | Crypto | Okamoto/Takashima "Fully secure functional encryption with general relations from the decisional linear assumption"
|
16:25 |
16:50 |
Campbell Auditorium | Crypto | Abe/Fuchsbauer/Groth/Haralambiev/Ohkubo "Structure-preserving signatures and commitments to group elements"
|
16:50 |
17:00 |
|
17:00 |
17:15 |
Campbell Auditorium | Crypto | Brier/Coron/Icart/Madore/Randriam/Tibouchi "Efficient indifferentiable hashing into ordinary elliptic curves"
|
17:15 |
|
17:15 |
17:40 |
|
17:40 |
|
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The Anacapa dinner has more than enough food, and everyone will be there instead.
|
17:45 |
19:00 |
Dorms (Anacapa etc.) | Crypto | Dinner in Anacapa/Santa Cruz Ocean Lawn
|
19:00 |
19:15 |
|
19:15 |
21:00 |
|
21:00 |
|
21:00 |
Tuesday 17 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:30 to 09:00.
|
07:30 |
|
08:45 |
|
08:45 |
Campbell Auditorium | Crypto | Camenisch/Casati/Gross/Shoup "Credential authenticated identification and key exchange"
|
08:45 |
|
09:10 |
Campbell Auditorium | Crypto | Goyal/Jain/Ostrovsky "Concurrent password-authenticated key exchange in the plain model"
|
09:10 |
|
09:35 |
Campbell Auditorium | Crypto | Kiltz/O'Neill/Smith "Instantiability of RSA-OAEP under chosen-plaintext attack"
|
09:35 |
|
10:00 |
Campbell Auditorium | Crypto | Wee "Efficient chosen-ciphertext security via extractable hash proofs"
|
10:00 |
10:25 |
Campbell Auditorium | Crypto | Coffee break
|
10:25 |
|
10:25 |
10:55 |
Campbell Auditorium | Crypto | Kleinjung/Aoki/Franke/Lenstra/Thomé/Bos/Gaudry/Kruppa/Montgomery/Osvik/te Riele/Timofeev/Zimmermann "Factorization of a 768-bit RSA modulus"
|
10:55 |
|
11:20 |
Campbell Auditorium | Crypto | Henecka/May/Meurer "Correcting errors in RSA private keys"
|
11:20 |
|
11:45 |
Campbell Auditorium | Crypto | Peyrin "Improved differential attacks for ECHO and Groestl"
|
11:45 |
|
12:10 |
Campbell Auditorium | Crypto | Dunkelman/Keller/Shamir "A practical-time attack on the KASUMI cryptosystem used in GSM and 3G telephony"
|
12:10 |
|
12:35 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:35 |
|
13:45 |
|
13:45 |
|
17:00 |
Registration
|
17:00 |
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The rump session is supposed to have a real dinner this year, instead of the usual snacks.
|
17:45 |
18:00 |
Corwin Pavilion | Crypto+CHES | Rump session
|
18:00 |
19:15 |
|
19:15 |
23:00 |
|
23:00 |
|
23:00 |
Wednesday 18 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 06:45 to 09:00.
|
07:30 |
|
08:45 |
Opening remarks
|
08:45 |
|
09:00 |
Aumasson/Henzen/Meier/Naya-Plasencia "Quark: a lightweight hash"
|
09:00 |
Campbell Auditorium | Crypto | Unruh/Müller-Quade "Universally composable Incoercibility"
|
09:00 |
09:25 |
Knudsen/Leander/Poschmann/Robshaw "PRINTcipher: a block cipher for IC-printing"
|
09:25 |
Campbell Auditorium | Crypto | Lin/Pass/Tseng/Venkitasubramaniam "Concurrent non-malleable zero knowledge proofs"
|
09:25 |
09:50 |
Bertoni/Daemen/Peeters/Van Assche "Sponge-based pseudo-random number generators"
|
09:50 |
Campbell Auditorium | Crypto | Cho/Lee/Ostrovsky "Equivalence of uniform key agreement and composition insecurity"
|
09:50 |
10:15 |
Morning break (in the "Lagoon Plaza" right outside Corwin)
|
10:15 |
Campbell Auditorium | Crypto | Coffee break
|
10:15 |
10:45 |
Guillermin "A high speed coprocessor for elliptic curve scalar multiplications over Fp"
|
10:45 |
Campbell Auditorium | Crypto | Gennaro/Gentry/Parno "Non-interactive verifiable computing: outsourcing computation to untrusted workers"
|
10:45 |
11:10 |
Goundar/Joye/Miyaji "Co-Z addition formulae and binary ladders on elliptic curves"
|
11:10 |
Campbell Auditorium | Crypto | Chung/Kalai/Vadhan "Improved delegation of computation using fully homomorphic encryption"
|
11:10 |
11:35 |
Longa/Gebotys "Efficient techniques for high-speed elliptic curve cryptography"
|
11:35 |
Campbell Auditorium | Crypto | Pinkas/Reinman "Oblivious RAM revisited"
|
11:35 |
12:00 |
Lunch
|
12:00 |
Campbell Auditorium | Crypto | Bitansky/Canetti "On strong simulation and composable point obfuscation"
|
12:00 |
12:25 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:15 to 14:00.
|
12:25 |
13:45 |
|
13:45 |
14:00 |
Coron/Kizhvatov "Analysis and improvement of the random delay countermeasure of CHES 2009"
|
14:00 |
Campbell Auditorium | Crypto | Beimel/Omri/Orlov "Protocols for multiparty coin toss with dishonest majority"
|
14:00 |
14:25 |
Aciicmez/Brumley/Grabher "New results on instruction cache attacks"
|
14:25 |
Campbell Auditorium | Crypto | Damgård/Orlandi "Multiparty computation for dishonest majority: from passive to active security at low cost"
|
14:25 |
14:50 |
Moradi/Mischke/Eisenbarth "Correlation-enhanced power analysis collision attack"
|
14:50 |
Campbell Auditorium | Crypto | Ishai/Kushilevitz/Paskin-Cherniavsky "Secure multiparty computation with minimal interaction"
|
14:50 |
15:15 |
Benoît/Peyrin "Side-channel analysis of six SHA-3 candidates"
|
15:15 |
Campbell Auditorium | Crypto | Maji/Prabhakaran/Rosulek "A zero-one law for cryptographic complexity with respect to computational UC security"
|
15:15 |
15:40 |
Afternoon break
|
15:40 |
Campbell Auditorium | Crypto | Coffee break
|
15:40 |
16:10 |
Campbell Auditorium | Crypto+CHES | Invited talk: Damgård/Naccache "Is theoretical cryptography any good in practice?"
|
16:10 |
|
16:10 |
17:10 |
|
17:10 |
|
17:15 |
Campbell Auditorium | Crypto+CHES | IACR membership meeting
|
17:15 |
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The beach barbecue has more than enough food, and everyone wil be there instead.
|
17:45 |
18:00 |
Beach barbecue; officially until 20:15
|
18:00 |
19:15 |
|
19:15 |
20:00 |
Dorms (Anacapa etc.) | Crypto+CHES | Crypto Cafe
|
20:00 |
|
22:30 |
|
22:30 |
|
22:30 |
Thursday 19 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 06:45 to 09:00.
|
07:30 |
|
08:45 |
|
08:45 |
Campbell Auditorium | Crypto | Hoang/Rogaway "On generalized Feistel networks"
|
08:45 |
09:00 |
Skorobogatov "Flash memory 'bumping' attacks"
|
09:00 |
09:10 |
Campbell Auditorium | Crypto | Krawczyk "Cryptographic extraction and key derivation: the HKDF scheme"
|
09:10 |
09:25 |
Du/Narasimhan "Self-referencing: a scalable side-channel approach for hardware"
|
09:25 |
09:35 |
Campbell Auditorium | Crypto | De/Trevisan/Tulsiani "Time space tradeoffs for attacks against one-way functions and PRGs"
|
09:35 |
09:50 |
Di-Battista/Courrège/Rouzeyre/Torres/Perdu "When failure analysis meets side-channel attacks"
|
09:50 |
10:00 |
Campbell Auditorium | Crypto | Bellare/Cash "Pseudorandom functions and permutations provably secure against related-key attacks"
|
10:00 |
10:15 |
Morning break (and poster session)
|
10:15 |
10:25 |
Campbell Auditorium | Crypto | Coffee break
|
10:25 |
10:45 |
Bouillaguet/Chen/Cheng/Chou/Niederhagen/Shamir/Yang "Fast exhaustive search for polynomial systems in F_2"
|
10:45 |
10:55 |
Campbell Auditorium | Crypto | Dupuis/Nielsen/Salvail "Secure two-party quantum evaluation of unitaries against specious adversaries"
|
10:55 |
11:10 |
Poschmann/Wang/Ling "256 bit standardized crypto for 650 GE—GOST revisited"
|
11:10 |
11:20 |
Campbell Auditorium | Crypto | Winkler/Wullschleger "On the efficiency of classical and quantum oblivious transfer reductions"
|
11:20 |
11:35 |
Nogami/Nekado/Toyota/Hongo/Morikawa "Mixed bases for efficient inversion in F_{((2^2)^2)^2} and conversion matrices of SubBytes of AES"
|
11:35 |
11:45 |
Campbell Auditorium | Crypto | Bouman/Fehr "Sampling in a quantum population, and applications"
|
11:45 |
12:00 |
Lunch
|
12:00 |
12:10 |
|
12:10 |
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:15 to 14:00.
|
12:15 |
13:45 |
|
13:45 |
14:00 |
Henzen/Gendotti/Guillet/Pargaetzi/Zoller/Gürkaynak "Developing a hardware evaluation method for SHA-3 candidates"
|
14:00 |
|
14:25 |
Gaj/Homsirikamol/Rogawski "Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs"
|
14:25 |
|
14:50 |
Bos/Stefan "Performance analysis of the SHA-3 candidates on exotic multi-core architectures"
|
14:50 |
|
15:15 |
Wenzel-Benner/Graef "XBX: eXternal Benchmarking eXtension for the SUPERCOP crypto benchmarking framework"
|
15:15 |
|
15:40 |
Afternoon break (and poster session)
|
15:40 |
|
16:10 |
Berzati/Canovas-Dumas/Goubin "Public key perturbation of randomized RSA implementations"
|
16:10 |
|
16:35 |
Li/Sakiyama/Gomisawa/Fukunaga/Takahashi/Ohta "Fault sensitivity analysis"
|
16:35 |
|
17:00 |
|
17:00 |
|
17:30 |
Shuttles to Four Seasons Biltmore; number and timing of buses is still unannounced
|
17:30 |
|
17:40 |
|
17:40 |
|
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package.
|
17:45 |
18:15 |
Four Seasons Biltmore | CHES | Reception
|
18:15 |
18:45 |
Four Seasons Biltmore | CHES | Awards dinner
|
18:45 |
19:15 |
|
19:15 |
20:00 |
Four Seasons Biltmore | CHES | Rump session
|
20:00 |
|
22:00 |
|
22:00 |
|
22:00 |
Friday 20 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:30 to 09:00.
|
07:30 |
|
08:45 |
|
08:45 |
|
09:00 |
Hofer/Boehm "An alternative to error correction for SRAM-like PUFs"
|
09:00 |
|
09:25 |
Varchola/Drutarovsky "New high entropy element for FPGA based true random number generators"
|
09:25 |
|
09:50 |
Suzuki/Shimizu "The glitch PUF: a new delay-PUF architecture exploiting glitch shapes"
|
09:50 |
|
10:15 |
Morning break (and poster session)
|
10:15 |
|
10:45 |
Invited talk: Shacham "Cars and voting machines: embedded systems in the field"
|
10:45 |
|
11:45 |
Lunch
|
11:45 |
|
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:15 |
13:30 |
Jäarvinen/Kolesnikov/Sadeghi/Schneider "Garbled circuits for leakage-resilience: hardware implementation and evaluation of one-time programs"
|
13:30 |
13:45 |
|
13:45 |
13:55 |
Badel/Dağtekin/Nakahara/Ouafi/Reffé/Sepehrdad/Sušil/Vaudenay "ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware"
|
13:55 |
|
14:20 |
Afternoon break
|
14:20 |
|
14:50 |
Rivain/Prouff "Provably secure higher-order masking of AES"
|
14:50 |
|
15:15 |
Oren/Kirschbaum/Popp/Wool "Algebraic side-channel analysis in the presence of errors"
|
15:15 |
|
15:40 |
Tunstall/Joye "Coordinate blinding over large prime fields"
|
15:40 |
|
16:05 |
Concluding remarks
|
16:05 |
|
16:15 |
|
16:15 |
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:45 |
|
19:15 |
|
19:15 |
|
19:15 |
Saturday 21 August 2010 |
07:30 |
Breakfast (in the Lagoon Plaza outside Corwin)
|
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast? Not clear if De La Guerra will be open.
|
07:30 |
08:45 |
Registration (actually starting 08:00)
|
08:45 |
|
08:45 |
09:00 |
Opening remarks; this and all subsequent talks are in the MCC Theater across from Corwin
|
09:00 |
|
09:10 |
Kim "Differential fault analysis against AES-192 and AES-256 with minimal faults"
|
09:10 |
|
09:35 |
Clavier/Feix/Gagnerot/Roussellet "Passive and active combined attacks on AES"
|
09:35 |
|
10:00 |
Morning break
|
10:00 |
|
10:30 |
Skorobogatov "Optical fault masking attacks"
|
10:30 |
|
10:55 |
Fournier/Loubet/Moundi "Memory address scrambling revealed using fault attacks"
|
10:55 |
|
11:20 |
Invited talk: Shamir "Generic analysis of small cryptographic leaks"
|
11:20 |
|
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:15 |
|
13:45 |
|
13:45 |
|
14:00 |
Dorms (Anacapa etc.) | AppliedCrypto | "Benchmarking hash functions." Meet at the Anacapa Formal Lounge, or at the reception if the lounge is locked.
|
14:00 |
Guilley/Sauvage/Danger/Selmane "Fault injection resilience"
|
14:00 |
14:25 |
Medwed/Schmidt "A continuous fault countermeasure for AES providing a constant error detection rate"
|
14:25 |
14:50 |
Trichina "Multi-fault laser attacks on protected CRT RSA"
|
14:50 |
15:30 |
|
15:30 |
15:45 |
Afternoon break
|
15:45 |
|
15:45 |
16:15 |
Coron/Giraud/Morin/Piret/Vigilant "Fault attacks and countermeasures on Vigilant's RSA-CRT algorithm"
|
16:15 |
|
16:40 |
Karaklajic/Knezevic/Verbauwhede "Low cost built in self test for public key crypto cores"
|
16:40 |
|
17:05 |
Closing remarks
|
17:05 |
|
17:15 |
|
17:15 |
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:45 |
|
19:15 |
|
19:15 |
|
19:15 |
Sunday 22 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast? Not clear if De La Guerra will be open.
|
07:30 |
08:45 |
|
08:45 |
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:15 |
13:45 |
|
13:45 |
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:45 |
19:15 |
|
19:15 |
Monday 23 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:15 to 09:00.
|
07:30 |
|
08:45 |
|
08:45 |
|
09:00 |
Opening remarks
|
09:00 |
|
09:10 |
Thomsen "Deterministic differential properties of the BMW compression function"
|
09:10 |
|
09:25 |
Aumasson "Distinguisher for full final round of Fugue-256"
|
09:25 |
|
09:40 |
Sasaki "New non-ideal properties of AES-based permutations: applications to ECHO and Grøstl"
|
09:40 |
|
09:55 |
Schlaeffer "Subspace distinguisher for 58 rounds of the ECHO-256 hash function"
|
09:55 |
|
10:10 |
Rechberger "Rotational rebound attacks on reduced Skein"
|
10:10 |
|
10:25 |
|
10:25 |
|
10:30 |
Coffee break
|
10:30 |
|
10:55 |
Yu "Cryptanalysis of the compression function of SIMD"
|
10:55 |
|
11:10 |
Calik "Message recovery and pseudo-preimage attacks on the compression function of Hamsi-256"
|
11:10 |
|
11:25 |
McKay "Symmetric states and their structure—Improved analysis of CubeHash"
|
11:25 |
|
11:40 |
Bertoni "Building power analysis resistant implementations of Keccak"
|
11:40 |
|
11:55 |
Daemen "Duplexing the sponge—authenticated encryption and other applications"
|
11:55 |
|
12:10 |
|
12:10 |
|
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:15 |
|
13:45 |
Tillich "Uniform evaluation of hardware implementations of the round-two SHA-3 candidates"
|
13:45 |
|
14:00 |
Schaumont "Fair and comprehensive performance evaluation of 14 second round SHA-3 ASIC implementations"
|
14:00 |
|
14:15 |
Baldwin "FPGA implementations of the round two SHA-3 candidates"
|
14:15 |
|
14:30 |
Matsuo "How can we conduct fair and consistent hardware evaluation for SHA-3 candidate"
|
14:30 |
|
14:45 |
Gaj "Comprehensive comparison of hardware performance of fourteen round 2 SHA-3 candidates with 512-bit outputs using field programmable gate arrays" and "ATHENa—Automated Tool for Hardware EvaluationN—toward fair and comprehensive benchmarking of cryptographic algorithms using FPGAs"
|
14:45 |
|
15:00 |
Coffee break
|
15:00 |
|
15:30 |
Järvinen "Sharing resources between AES and the SHA-3 second round candidates Fugue and Grøstl"
|
15:30 |
|
15:42 |
Savas "Efficient hardware implementations of high throughput SHA-3 candidates Keccak, Luffa and Blue Midnight Wish for Single- and Multi-Message Hashing"
|
15:42 |
|
15:54 |
Hadedy "Resource-efficient implementation of Blue Midnight Wish-256 Hash Function on Xilinx FPGA platform"
|
15:54 |
|
16:06 |
Francq "Unfolding method for Shabal on Virtex-5 FPGAs—concrete results"
|
16:06 |
|
16:18 |
Walker "A Skein-512 hardware implementation"
|
16:18 |
|
16:30 |
Short break
|
16:30 |
|
16:40 |
Burr "Open discussion—SHA-3 competition strategies and timeline"
|
16:40 |
|
17:30 |
|
17:30 |
|
|
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner. Maybe the reception will have enough food to substitute for dinner, but this isn't clear.
|
17:45 |
19:00 |
Reception
|
19:00 |
19:15 |
|
19:15 |
21:00 |
|
21:00 |
|
21:00 |
Tuesday 24 August 2010 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:15 to 09:00.
|
07:30 |
08:45 |
|
08:45 |
09:00 |
Pornin "Comparative performance review of the SHA-3 second-round candidates"
|
09:00 |
09:15 |
Bernstein "Software speed of SHA-3 candidates"
|
09:15 |
09:30 |
Wenzel-Benner "Benchmarking SHA-3 candidates on embedded platforms"
|
09:30 |
09:45 |
|
09:45 |
09:50 |
Heyse "Evaluation of SHA-3 candidates for 8-bit embedded processors"
|
09:50 |
10:05 |
Yalcin "Serialized Keccak architecture for lightweight applications"
|
10:05 |
10:20 |
Coffee break
|
10:20 |
10:45 |
Otte "Optimizing Blue Midnight Wish for size"
|
10:45 |
10:57 |
Calik "An efficient software implementation of Fugue"
|
10:57 |
11:09 |
|
11:09 |
11:10 |
Turan "Practical near-collisions for reduced round Blake, Fugue, Hamsi and JH"
|
11:10 |
11:25 |
Morawiecki "A SAT-based preimage analysis of reduced KECCAK hash functions"
|
11:25 |
11:40 |
McKay "Pseudo-linear approximations for ARX ciphers with application to Threefish"
|
11:40 |
11:55 |
Mennink "Security reductions of the SHA-3 candidates; On the indifferentiability of the Grøstl hash function"
|
11:55 |
12:10 |
|
12:10 |
12:15 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:15 |
13:45 |
Aumasson "Blake"
|
13:45 |
13:57 |
Knapskog "BMW"
|
13:57 |
14:09 |
Bernstein "CubeHash"
|
14:09 |
14:21 |
Peyrin "ECHO"
|
14:21 |
14:33 |
Jutla "Fugue"
|
14:33 |
14:45 |
Rechberger "Groestl"
|
14:45 |
14:57 |
Kucuk "Hamsi"
|
14:57 |
15:09 |
|
15:09 |
15:15 |
Coffee break
|
15:15 |
15:40 |
Wu "JH"
|
15:40 |
15:52 |
Van Assche "Keccak" and "On the security of the keyed sponge construction"
|
15:52 |
16:04 |
Watanabe "Luffa"
|
16:04 |
16:16 |
Canteaut "Shabal" and "Internal distinguishers in indifferentiable hashing—the Shabal case"
|
16:16 |
16:28 |
Dunkelman "SHAvite-3"
|
16:28 |
16:40 |
Bouillaguet "SIMD" and "Security analysis of SIMD"
|
16:40 |
16:52 |
Callas "Skein"
|
16:52 |
17:04 |
|
17:04 |
17:10 |
Closing remarks
|
17:10 |
17:30 |
|
17:30 |
17:45 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:45 |
19:15 |
|
19:15 |