Fast Software Encryption 2006

March 15-17
Graz, Austria

Program

PDF

All talks and breaks will be held at "Minoritensaal".

Wednesday, March 15th

08:00 - 08:50
Registration
08:50 - 09:00
Welcome notes by Vincent Rijmen
Session 1
Stream Ciphers (I)
09:00 - 09:25
"Cryptanalysis of Achterbahn" by T.Johansson, W.Meier, and F.Muller
09:25 - 09:50
"Cryptanalysis of Grain" by C.Berbain, H.Gilbert, and A.Maximov
09:50 - 10:15
"Cryptanalysis of Stream Cipher DECIM" by H.Wu and B.Preneel
Break
Session 2
Block Ciphers
10:45 - 11:10
"On Feistel Structure Using a Diffusion Switching Mechanism" by T.Shirai and K.Shibutani
11:10 - 11:35
"Pseudo-Random Permutation Families Over Abelian Groups" by L.Granboulan, É.Levieil, and G.Piret
11:35 - 12:00
"A Zero-Dimensional Groebner Basis for AES-128" by J.Buchmann, A.Pychkine, and R.Weinmann
 
Lunch at "Schlossberg-Restaurant"
Session 3
Hash Functions (I)
14:00 - 14:25
"Cryptanalysis of the Full HAVAL with 4 and 5 Passes" by H.Yu, X.Wang, A.Yun, and S.Park
14:25 - 14:50
"Collisions and Near-Collisions for Reduced-Round TIGER" by J.Kelsey and S.Lucks
14:50 - 15:15
"Analysis of Step-Reduced SHA-256" by F.Mendel, N.Pramstaller, C.Rechberger, and V.Rijmen
Break
Session 4
Analysis
15:45 - 16:10
"Improved Linear Distinguishers for SNOW 2.0" by K.Nyberg and J.Wallén
16:10 - 16:35
16:35 - 17:00
"Breaking the ICE: Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions" by J.Hoch and A.Shamir
19:00 -
Welcome Reception at "Burg"

Thursday, March 16th

Session 5
Proposals
09:00 - 09:25
"A New Dedicated 256-bit Hash Function: FORK-256" by D.Hong, J.Sung, S.Lee, D.Moon, S.Chee
09:25 - 09:50
09:50 - 10:15
Break
Session 6
Hash Functions (II)
10:45 - 11:10
"Searching for Differential Paths in MD4" by M.Schläffer and E.Oswald
11:10 - 11:35
"A Study of the MD5 Attacks" by J.Black, M.Cochran, and T.Highland
11:35 - 12:00
"The Impact of Carries on the Complexity of Collision Attacks" by F.Mendel, N.Pramstaller, C.Rechberger, and V.Rijmen
 
Lunch at "Schlossberg-Restaurant"
Session 7
Invited Speaker and Rump Session
14:00 - 14:45
15:00 - 16:00
Rump Session
City Tour Graz
departure 17:15
Conference Dinner at Schloss Obermayerhofen

 

Friday, March 17th

Session 8
Modes and Models
09:00 - 09:25
"A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries" by D.Chakraborty and P.Sarkar
09:25 - 09:50
09:50 - 10:15
"The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function" by J.Black
Break
Session 9
Implementation and Bounds
10:45 - 11:10
"How Far Can We Go on the x64 Processors?" by M.Matsui
11:10 - 11:35
11:35 - 12:00
"Upper Bounds on Algebraic Immunity of Power Functions" by Y.Nawaz, G.Gong, and K.Gupta
 
Lunch at "Schlossberg-Restaurant"
Session 10
Stream Ciphers (II)
14:00 - 14:25
"Chosen Ciphertext Attacks Against MOSQUITO" by A.Joux and F.Muller
14:25 - 14:50
"Distinguishing Attack on the Stream Cipher Ry" by G.Sekar, S.Paul, and B.Preneel
14:50 - 15:15
Workshop Closing by Matt Robshaw

 

Extra Activities:

Saturday, March 18th

A skiing day will be organized after the workshop has ended. More information is here.