9:00 - 9:10 | Opening |
9:10 - 10:10 | Session: SHA Collisions - Chair: Christian Rechberger |
| Collisions for Step-Reduced SHA-256 |
| Ivica Nikolic and Alex Biryukov |
| Collisions on SHA-0 in One Hour |
| Stéphane Manuel and Thomas Peyrin |
10:10 - 10:40 | Coffee break |
10:40 - 11:30 | Invited Talk - Chair: Bart Preneel |
| Hash functions and SHA-3 |
| Lars Knudsen |
11:30 - 12:30 | Session: New Hash Function Designs - Chair: Bart Preneel |
| The Hash Function Family LAKE |
| Jean-Philippe Aumasson, Willi Meier, and Raphael C.-W. Phan |
| SWIFFT: A Modest Proposal for FFT Hashing |
| Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, and Alon Rosen |
12:30 - 14:00 | Lunch |
14:00 - 15:30 | Session: Block Cipher Cryptanalysis I - Chair: Pascal Junod |
| A Unified Approach to Related-Key Attacks |
| Eli Biham, Orr Dunkelman, and Nathan Keller |
| Algebraic and Slide Attacks on KeeLoq |
| Nicolas T. Courtois, Gregory V. Bard, and David Wagner |
| A Meet-in-the-Middle Attack on 8-Round AES |
| Huseyin Demirci and Ali Aydin Selçuk (presented by Orhun Kara) |
15:30 -16:00 | Coffee break |
16:00 - 17:30 | Session: Implementation Aspects - Chair: Tanja Lange |
| Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis |
| Matthieu Rivain, Emmanuelle Dottax, and Emmanuel Prouff |
| SQUASH - a New MAC With Provable Security Properties for Highly Constrained Devices Such As RFID Tags |
| Adi Shamir |
| (Short talk) Differential Fault Analysis of Trivium |
| Michal Hojsik and Bohuslav Rudolf |
| (Short talk) Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation |
| Yedidya Hilewitz, Yiqun Lisa Yin, and Ruby B. Lee |
9:00 - 10:30 | Session: Hash Function Cryptanalysis I - Chair: Stefan Lucks |
| Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL |
| Eunjin Lee, Jongsung Kim, Donghoon Chang, Jaechul Sung, and Seokhie Hong |
| Cryptanalysis of LASH |
| Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Guo Jian, Ling San, and Huaxiong Wang |
| A (Second) Preimage Attack on the GOST Hash Function |
| Florian Mendel, Norbert Pramstaller, and Christian Rechberger |
10:30 - 11:00 | Coffee break |
11:00 - 12:30 | Session: Stream Cipher Cryptanalysis I - Chair: Willi Meier |
| Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator |
| Blandine Debraize and Louis Goubin |
| New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 |
| Subhamoy Maitra and Goutam Paul |
| Efficient Reconstruction of RC4 Keys from Internal States |
| Eli Biham and Yaniv Carmeli |
12:30 - 14:00 | Lunch |
14:00 - 15:30 | Session: Security Bounds - Chair: Tetsu Iwata |
| An Improved Security Bound for HCTR |
| Debrup Chakraborty and Mridul Nandi |
| How to Encrypt with a Malicious Random Number Generator |
| Seny Kamara and Jonathan Katz |
| A One-Pass Mode of Operation for Deterministic Message Authentication: Security beyond the Birthday Barrier |
| Kan Yasuda |
15:30 - 16:00 | Coffee break |
16:00 - 16:45 | Session: Entropy - Chair: Louis Granboulan |
| Post-Processing Functions for a Biased Physical Random Number Generator |
| Patrick Lacharme |
| (Short talk) Entropy of the Internal State of an FCSR in Galois Representation |
| Andrea Röck |
16:45 - 17:45 | Rump Session - Chair: Dan Bernstein [Call for submissions] |
9:00 - 10:30 | Session: Block Cipher Cryptanalysis II - Chair: Mitsuru Matsui |
| Bit-Pattern Based Integral Attack |
| Muhammad Reza Z'aba, Haavard Raddum, Matt Henricksen, and Ed Dawson |
| Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent |
| Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater |
| Impossible Differential Cryptanalysis of CLEFIA |
| Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, and Hiroyasu Kubo |
10:30 - 11:00 | Coffee break |
11:00 - 12:30 | Session: Hash Function Cryptanalysis II - Chair: Alex Biryukov |
| MD4 is Not One-Way |
| Gaëtan Leurent |
| Improved Indifferentiability Security Analysis of chopMD Hash Function |
| Donghoon Chang and Mridul Nandi |
| New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru |
| Eli Biham |
12:30 - 14:00 | Lunch |
14:00 - 14:45 | Session: Stream Cipher Cryptanalysis II - Chair: Orr Dunkelman |
| (Short talk) Some Remarks on the Salsa20 Core Function |
| Julio Cesar Hernandez-Castro, Juan M. E.Tapiador, and Jean-Jacques Quisquater |
| New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba |
| Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, and Christian Rechberger |
14:45 | Closing |