Program
The program can also be downloaded in PDF format here.
All technical sessions take place in the Promotiezaal, Naamsestraat 22.
Sunday 22 February 2009
- (Promotiezaal) 17:00 - 20:00: Registration
- (Town hall, Stadhuis) 19:00 - 20:00: Welcome reception
Monday 23 February 2009
- (Museumzaal) 8:30 - 9:15: Registration
- 9:15 - 9:25: Opening
Session I — Stream Ciphers
- 9:25 - 9:50: Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium
FHNW, Windisch, Switzerland and The Weizmann Institute, Israel - 9:50 - 10:15: An Efficient State Recovery Attack on X-FCSR-256
Lund University, Sweden - 10:15 - 10:40: Key Collisions of the RC4 Stream Cipher
Mitsubishi Electric, Japan
- (Museumzaal) 10:40 - 11:15: Coffee Break
Session II — Invited Talk
- 11:15 - 12:15: Intel's New AES Instructions for Enhanced Performance and Security
Intel Corporation, Haifa, Israel and University of Haifa, Israel
- (Salons Georges) 12:15 - 14:00: Lunch Break
Session III — Theory of Hash Functions
- 14:00 - 14:25: Blockcipher Based Hashing Revisited
EPFL, Switzerland - 14:25 - 14:50: On the Security of Tandem-DM
Bauhaus-University Weimar, Germany - 14:50 - 15:15: Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
New York University, USA, Boston University, USA and Massachusetts Institute of Technology, USA
- (Museumzaal) 15:15 - 15:45: Coffee Break
Session IV — Hash Functions Analysis I
- 15:45 - 16:10: Cryptanalysis of RadioGatún
DCSSI, France and Ingenico, France - 16:10 - 16:35: Preimage Attacks on Reduced Tiger and SHA-2
Sony Corporation, Japan - 16:35 - 17:00: Collisions of the LAKE Hash Family
University of Luxembourg, Luxembourg, Technical University of Denmark, Denmark, Nanyang Technological University, Singapore and Macquaire University, Australia
- (STUK, Naamsestraat 96) 19:00 - 20:00: Cultural event
Tuesday 24 February 2009
Session V — Block Ciphers Analysis
- 9:15 - 9:40: New Cryptanalysis of Block Cipher with Low Algebraic Degree
Science College of National University of Defence Technology, China and Southeast University, China - 9:40 - 10:05: Algebraic Techniques in Differential Cryptanalysis
Royal Holloway, University of London, United Kingdom - 10:05 - 10:30: Multidimensional Extension of Matsui's Algorithm 2
Helsinki University of Technology (TKK), Finland and Nokia Finland
- (Museumzaal) 10:30 - 11:00: Coffee Break
Session VI — Hash Functions Analysis II
- 11:00 - 11:25: Meet-in-the-Middle Attacks on SHA-3 Candidates
University of Luxembourg, Luxembourg - 11:25 - 11:50: Practical collisions for EnRUPT
Katholieke Universiteit Leuven and IBBT, Belgium - 11:50 - 12:15: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Graz University of Technology, Austria and Technical University of Denmark, Denmark
- (Salons Georges) 12:15 - 14:00: Lunch Break
Session VII — Block Ciphers
- 14:00 - 14:25: Revisiting the IDEA Philosophy
University of Applied Sciences Western, Switzerland and Nagracard SA, Switzerland - 14:25 - 14:50: Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
FHNW, Windisch, Switzerland and EPFL, Lausanne, Switzerland
- (Museumzaal) 14:50 - 15:20: Coffee Break
Session VIII — Theory
- 15:20 - 15:45: Beyond-Birthday-Bound Security Based on Tweakable Block Ciphers
NEC Corporation, Japan - 15:45 - 16:10: Enhanced Target Collision Resistant Hash Functions Revisited
University of Wollongong, Australia
Rump Session
- 16:15 - 18:00: Rump Session
- (Restaurant Faculty Club) 19:30 - …: Banquet
Wednesday 25 February 2009
Session IX — Message Authentication Codes
- 9:15 - 9:40: MAC Reforgeability
University of Colorado at Boulder, USA and Google, Inc, USA - 9:40 - 10:05: New Distinguishing Attack on MAC using Secret-Prefix Method
Tsinghua University, China and Key Laboratory of Cryptologic Technology and Information Security, China - 10:05 - 10:30: Fast and Secure CBC Type MAC Algorithms
National Institute of Standards and Technology, USA - 10:30 - 10:55: HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
Nagoya University, Japan and NTT Corporation, Japan
- (Museumzaal) 10:55 - 11:25: Coffee Break
Session X — Invited Talk
- 11:25 - 12:10: Looking back at the eSTREAM Project
France Telecom, France
- 12:10 - 12:15: Concluding Remarks
- (Salons Georges) 12:15 - 14:00: Lunch Break
- 14:00: Opening of the First SHA-3 Candidate Conference