Fast Software Encryption 2007
March 26-28
Luxembourg City, Luxembourg
Program
Program in PDF- 26 March, Monday
- 8:00 - 8:45 Registration
- 8:45 - 8:55 Welcome notes
- 8:55 - 9:00 Overview of the submissions and the review process
- Session 1. CRYPTANALYSIS and DESIGN of HASH FUNCTIONS (I) (chair: Bart Preneel)
- 9:00 - 9:25 Producing Collisions for PANAMA, Instantaneously
- STMicroelectronics, Zaventem, Belgium
- 9:25 - 9:50 Cryptanalysis of FORK-256
- Scott Contini(2), Josef Pieprzyk (2)
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Department of Computing, Macquarie University, Australia - 9:50 - 10:15 Grindahl — a family of hash functions
- Technical University of Denmark
Graz University of Technology
Technical University of Denmark - 10:15 - 10:45 BREAK
- Session 2. STREAM CIPHER CRYPTANALYSIS (I) (chair: Willi Meier)
- 10:45 - 11:10Overtaking VEST
- (1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab - 11:10 - 11:35Differential-Linear Attacks against the Stream Cipher Phelix
- Katholieke Universiteit Leuven, Belgium
- 11:35 - 12:00Cryptanalysis of Achterbahn-128/80
- INRIA-Rocquencourt
- 12:00 - 14:00 LUNCH
- Session 3. THEORY (chair: Tetsu Iwata)
- 14:00 - 14:25How to Enrich an Enciphering Scheme's Domain
- University of California San Diego
University of California Davis
Chiang Mai University, Thailand - 14:25 - 14:50Security Analysis of Constructions Combining FIL Random Oracles
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Universite de Versailles Saint-Quentin, France - 14:50 - 15:15Bad and Good Ways of Post-Processing Biased Random Numbers
- Siemens AG
- 15:15 - 15:45 BREAK
- Session 4.1. FAST TALKS: BLOCK CIPHER CRYPTANALYSIS (chair: Pascal Junod)
- 15:45 - 16:00Improved Slide Attacks
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - 16:00 - 16:15A New Class of Weak Keys for Blowfish
- Tubitak UEKAE pk 74, 41470 Gebze, Kocaeli/Turkey
- Session 4.2 FAST TALKS: BLOCK CIPHER DESIGN (chair: Pascal Junod)
- 16:15 - 16:30The 128-bit Blockcipher CLEFIA
- (1) Sony Corporation
(2) Nagoya University - 16:30 - 16:45New Light-Weight DES Variants Suited for RFID Applications
- Horst-Goertz-Institute for IT-Security, Ruhr University Bochum
- 27 March, Tuesday
- Session 5. BLOCK CIPHER CRYPTANALYSIS (chair: Lars Knudsen)
- 9:00 - 9:25A New Attack on 6-Round IDEA
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - 9:25 - 9:50Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- CIST, Korea University
CIST, Korea University
COSIC, Katholieke Universiteit Leuven - 9:50 - 10:15Detailed Analysis on XSL Applied to BES
- DSO National Laboratories, Singapore
- 10:15 - 10:45 BREAK
- Session 6. STREAM CIPHER CRYPTANALYSIS (II) (chair: Kaisa Nyberg)
- 10:45 - 11:10On the Security of IV Dependent Stream Ciphers
- France Telecom RD
- 11:10 - 11:35Two General Attacks on Pomaranch-like Keystream Generators
- Department of Information Technology, Lund University, Sweden
- 11:35 - 12:00Analysis of QUAD
- Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung University - 12:00 - 14:00 LUNCH
- INVITED TALK
- 14:00 - 14:50 Invited talk
- RUMP SESSION (Chair: Joan Daemen)
- 15:00 - 16:00 Rump session
- SIGHTSEEING ACTIVITY
- 16:00 - 19:00
- 19:30 CONFERENCE DINNER in the Bourglinster castle
- 28 March, Wednesday
- Session 7. CRYPTANALYSIS of HASH FUNCTIONS (II) (chair: Mitsuru Matsui)
- 9:00 - 9:25Message Freedom in MD4 and MD5 Collisions: Application to APOP
- ENS
- 9:25 - 9:50New Message Difference for MD4
- The University of Electro-Communications
- 9:50 - 10:15Gröbner Basis based Cryptanalysis of SHA-1
- IPA
Osaka Prefecture University
Chuo University - 10:15 - 10:45 BREAK
- Session 9. THEORY of STREAM CIPHERS (chair: Orr Dunkelman)
- 10:45 - 11:10Algebraic Immunity of S-boxes and Augmented Functions
- FHNW, Switzerland
- 11:10 - 11:35Generalized Correlation Analysis of Vectorial Boolean Functions
- University of Paris 8 (MAATICAH), also with INRIA Project CODES (France)
DSO National Laboratories (Singapore) - Session 10. SIDE CHANNEL ATTACKS (chair: Jin Hong)
- 11:35 - 12:00An Analytical Model for Time-Driven Cache Attacks
- (1) Intel Corporation
(2) Oregon State University - 12:00 - 14:00 LUNCH
- Session 11. MACs and SMALL BLOCK CIPHERS (chair: Stefan Lucks)
- 14:00 - 14:25Improving the Security of MACs via Randomized Message Preprocessing
- New York University
ENS Paris - 14:25 - 14:50New Bounds for PMAC, TMAC, and XCBC
- NEC Corporation
Waseda University - 14:50 - 15:15Perfect Block Ciphers With Small Blocks
- Ecole Normale Superieure and EADS
Cryptolog International (Paris, France) - 15:15 Workshop closing
- Extra sightseeing activities with luxembourgian guides