International View of the State-of-the-Art of Cryptography and Security and its Use in Practice (IV)
December 6, 2013
Venue: JW Marriott Hotel, Bangalore, India (preliminary)
Participation:
Please contact Claire Vishik(claire.vishik@intel.com) if interested in participation
Workshop Description
Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice), Beijing (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice II), and Athens (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice III) that set the stage for discussions on cryptography among a group of key researchers from Europe, Asia, and North America, the one day workshop in Bangalore, following AsiaCrypt 2013 will again bring together internationally recognized scientists to discuss direction and development in theoretical and applied cryptography and surrounding societal issues.
There will be four focus areas:
- Real-life cryptography
- Standardization
- Regulatory requirements
- Innovative use cases for cryptography
Each focus area will be anchored in an invited talk and/or panel, but the emphasis will be on discussion. The participants will address broad research directions in encryption and secure computation and their applications in cloud computing, smart grid, mobile and embedded computing, hardware, software, and network security. They will also examine non-technical issues surrounding deployment and adoption of new security technologies using encryption, such as privacy or economic consideration. Approaches and projects in different countries will be discussed, in order to increase awareness of the R&D activities internationally and continue to for a strong community of research and practice and in order to generate new ideas in this field.
Although the workshop will cover a broad spectrum of issues from the list presented below with a specific focus that will be announced shortly. The topics of interest include (but are not limited to) the following subjects:
- Secret versus public ciphers
- Cipher and algorithm development process
- Algorithms maturity and review
- Lightweight cryptography
- New requirements for cryptography for novel applications
- Cipher implementation and interoperability
- Standardization
- Regulatory initiatives
- Privacy enhancing cryptography
Preliminary Program
|
|
|
|
|
8:15am |
|
Registration |
8:30am |
|
Opening statement (Organizers) |
|
8:40am |
|
Opening keynote (TBD) |
|
9:10am |
|
Panel 1 and discussion: Advances in cryptography; new use cases, Participants: Dan Bernstein (University of Illinois at Chicago), Tanja Lange (Eindhoven), Veni Madhavan (ERNET), others TBD |
|
10:30am |
|
Coffee break |
|
11am |
|
Panel II and discussion: Regulatory environment and standardization: Sunil Abraham (India CIS), Kazue Sako (NEC), Claire Vishik (Intel), others TBD |
|
12:30pm |
|
Lunch |
|
|
1:30pm |
|
Panel 3 and discussion: Implementation and interoperability for new environments (e.g., smart grid, Internet of things): Reji Kumar (Smart Grid India), other TBD |
|
3pm |
|
Coffee break |
|
3:30pm |
|
Panel IV and discussion: Privacy, social networking, ubiquitous connectivity and cryptography: Rene Peralta (NIST), Kumar Ranganathan, others TBD |
|
5pm |
|
Thoughts and next workshop |
|
5:20pm |
|
Closing statements (Organizers) |
|
5:30pm |
|
Adjourn |