Monday: |
|
08.30 - 09.15 | Registration |
09.15 - 09.30 | Welcome opening |
09.30 - 10.45 |
Block cipher cryptanalysis I Raddum, "Cryptanalysis of IDEA-X/2" Biham, Dunkelman, Keller, "Differential-Linear cryptanalysis of Serpent" Biham, Dunkelman, Keller, "Rectangle attacks on SHACAL-1" |
10.45 - 11.15 |
Break |
11.15 - 12.05 |
Block cipher cryptanalysis II Saarinen, "Cryptanalysis of Block Ciphers Based on SHA-1 and MD5" Biryukov, "Analysis of Involutional Ciphers: Khazad and Anubis" |
12.05 - 14.00 |
Lunch |
14.00 - 15.00 |
Invited talk - James L. Massey "Interplay between Coding and Cryptography" |
15.00 - 15.50 |
Boolean functions and S-Boxes Fuller, Millan, "On Linear Redundancy in S-Boxes" Carlet, Prouff, "On plateaued functions and their constructions" |
15.50 - 16.20 |
Break |
16.20 - 17.35 |
Stream cipher cryptanalysis Joux, Muller, "Loosening the Knot" Golic, Morgari, "On the resynchronization attack" Babbage, De Cannière, Lano, Preneel, Vandewalle, "Cryptanalysis of Sober-t32" |
19.00 - 23.30 |
Reception + Rump session The rump session program of FSE2003 is printed below. |
Tuesday: |
|
09.00 - 10.40 |
MACs Iwata, Kurosawa, "OMAC: One-Key CBC MAC" Hong, Kang, Preneel, Ryu, "The Security of 3GPP-MAC on the Reduction-based Cryptography" Joux, Poupard, Stern, "New Attacks against Standardized MACs" Knudsen, Kohno, "Analysis of RMAC" |
10.40 - 11.15 |
Break |
11.15 - 12.05 |
Side channel attacks Akker, Goubin, "A generic protection against high-order differential power analysis" Schramm, Wollinger, Paar, "A new class of collision attacks and its application to DES" |
12.05 - 14.00 |
Lunch |
14.00 - 15.15 |
Block cipher theory I Song, Seberry, "Further Observations on the Structure of the AES Algorithm" Junod, Vaudenay, "Optimal Key Ranking Procedures in a Statistical Cryptanalysis" Park, Sung, Lee, Lim, "Improving the Upper Bound on the Maximum Differential and Maximum Linear Hull Probability for SPN Structures and AES" |
15.15 - 15.45 |
Break |
15.45 - 16.25 |
Block cipher theory II Wallén, "Linear Approximations of Addition Modulo $2^n$" Biryukov, De Cannière, "Block Ciphers and Systems of Quadratic Equations" |
19.00 - 23.30 |
Dinner |
Wednesday: |
|
09.00 - 10.40 |
New Designs Rose, Hawkes, "Turing, a Fast Stream Cipher" Boesgaard, Vesterager, Pedersen, Scavenius, Christensen, "Rabbit - A New High-Performance Stream Cipher" Ferguson, Whiting, Schneier, Kohno, Kelsey, Lucks, "Helix, Fast Encryption and Authentication in a Single Cryptographic Primitive" Pal, Sarkar, "PARSHA256 - A New Parallelizable Hash Function and a Multithreaded Implementation" |
10.40 - 11.15 |
Break |
11.15 - 12.05 |
Modes of operation Fouque, Martinet, Poupard, "Practical Symmetric On-line Encryption" Gilbert, "The Security of 'One-Block-to-Many' Modes of Operation" |
12.05 - 12.10 |
Closing |
14.00 - | NESSIE/STORK Workshop, see separate registration on https://www.cosic.esat.kuleuven.ac.be/nessie/workshop4/index.htm |
20.00 Algebraic Attacks on Stream Ciphers with Linear Feedback
Nicolas T. Courtois and Willi Meier
20.05 Six Conditions in OMAC-family are Tight
Tetsu Iwata
20.10 Cryptanalysis of Safer++
Alex Biryukov and Christophe De Cannière and Gustaf Dellkrantz
20.15 What’s up with MUGI
Hirotaka Yoshida
20.20 Introduction of IWAP2003
Yong-Sork Her