Program
Download the program in [pdf] format!!
Sunday 7, February 2010 |
|
---|---|
Registration & Welcome Reception | |
18:30-20:00 | Registration |
19:00-20:00 | Welcome Reception |
Monday 8, February 2010 |
|
09:00-09:30 | Registration (Coffee & Juice) |
09:30-09:40 | Welcome Remarks |
SESSION 1: Stream Ciphers and Block Ciphers (Chair : Jin Hong) | |
09:40-10:05 |
Cryptanalysis of the DECT Standard Cipher [Slide] [Video] Karsten Nohl, Erik Tews, and Ralf-Philipp Weinmann University of Virginia, USA, TU Darmstadt, Germany, and University of Luxembourg, Luxembourg |
10:05-10:30 |
Improving the Generalized Feistel [Slide] Tomoyasu Suzaki and Kazuhiko Minematsu NEC Corporation, Japan |
10:30-10:55 |
Nonlinear Equivalence of Stream Ciphers [Slide] [Video] Sondre Rønjom and Carlos Cid Norwegian National Security Authority (NSM), Bærum, Norway and Royal Holloway, University of London, Egham, UK |
10:55-11:20 | Coffee Break |
Invited Talk I (Chair : Seokhie Hong) | |
11:20-12:10 |
The Survey of Cryptanalysis on Hash Functions [Slide] [Video] Xiaoyun Wang Department of Mathematics and System Science, Shandong University, China |
12:10-13:50 | Lunch |
SESSION 2: RFID and Implementations (Chair : Carlos Cid) | |
13:50-14:15 |
Lightweight Privacy Preserving Authentication for RFID Based on a Stream Cipher [Slide] Olivier Billet, Jonathan Etrog, and Henri Gilbert Orange Labs, France |
14:15-14:40 |
Fast Software AES Encryption [Slide] Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright EPFL, Switzerland, EPFL, Switzerland, The Cooper Union, USA, and Naval Postgraduate School, USA |
14:40-15:05 | Coffee Break |
SESSION 3: Hash Functions I (Chair : Jongsung Kim) | |
15:05-15:30 |
Attacking the Knudsen-Preneel Compression Functions (*best paper award*) [Slide] Onur Özen, Thomas Shrimpton, and Martijn Stam EPFL, Switzerland, Portland State University, USA, and EPFL, Switzerland |
15:30-15:55 |
Finding Preimages of Tiger Up to 23 Steps [Slide] Lei Wang and Yu Sasaki The University of Electro-Communications, Japan and NTT Corporation, Japan |
15:55-16:20 |
Cryptanalysis of ESSENCE [Slide] [Video] Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier and Thomas Peyrin INRIA, France, Aalto University, Finland, Nagravision SA, Switzerland, INRIA, France, ENS, France, FHNW, Switzerland, and Ingenico, France |
17:00-18:30 | Social Event (Nanta, http://nanta.i-pmc.co.kr/en/index.asp) |
Tuesday 9, February 2010 | |
09:00-09:30 | Registration (Coffee & Juice) |
SESSION 4: Theory (Chair : Thomas Shrimpton) | |
09:30-09:55 |
Domain Extension for Enhanced Target Collision-Resistant Hash Functions [Slide] [Video] Ilya Mironov Microsoft Research, Silicon Valley Campus |
09:55-10:20 |
Security Analysis of the Mode of JH Hash Function [Slide] [Video] Rishiraj Bhattacharyya, Avradip Mandal, and Mridul Nandi Indian Statistical Institute, Kolkata, India, University of Luxembourg, Luxembourg, and National Institute of Standards and Technology and George Washington University, USA |
10:20-10:45 |
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships [Slide] [Video] Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu University of Wollongong, Australia |
10:45-11:10 | Coffee Break |
SESSION 5: Message Authentication Codes (Chair : Bart Preneel) | |
11:10-11:35 |
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs [Slide] Mridul Nandi National Institute of Standards and Technology and George Washington University, USA |
11:35-12:00 |
How to Thwart Birthday Attacks against MACs via Small Randomness [Slide] [Video] Kazuhiko Minematsu NEC Corporation, Japan |
12:00-12:25 |
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited [Slide] [Video] Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, and Bo Liang Chinese Academy of Sciences, China |
12:25-14:05 | Lunch |
SESSION 6: Hash Functions II (Chair : Yu Sasaki) | |
14:05-14:30 |
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 [Slide] Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, and Toshinobu Kaneko Hitachi, Ltd., Japan, Hitachi, Ltd., Japan, Tokyo University of Science, Japan, and Tokyo University of Science, Japan |
14:30-14:55 |
Rebound Attack on Reduced-Round Versions of the JH [Slide] Vincent Rijmen, Deniz Toz, and Kerem Varici Katholieke Universiteit Leuven, Belgium |
SESSION 7: Hash Function III (Short Presentations) (Chair : Yu Sasaki) | |
14:55-15:10 |
Pseudo-cryptanalysis of the Original Blue Midnight Wish [Slide] [Video] Søren S. Thomsen DTU Mathematics, Technical University of Denmark, Denmark |
15:10-15:25 |
Differential and Invertibility Properties of BLAKE [Slide] Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, and Willi Meier Nagravision SA, Switzerland, NTU, Singapore, FHNW, Switzerland, DTU, Denmark, and FHNW, Switzerland |
15:25-16:00 | Coffee Break |
16:00-17:30 | Rump Session (Chair : Orr Dunkelman) |
18:00-20:30 | Gala Dinner & Social Event |
Wednesday 10, February 2010 |
|
09:00-09:30 | Registration (Coffee & Juice) |
Invited Talk II (Chair : Tetsu Iwata) | |
09:30-10:20 |
A Provable-Security Perspective on the Development of Hash Functions [Slide] [Video] Thomas Shrimpton Portland State University, USA |
10:20-10:50 | Coffee Break |
SESSION 8: Cryptanalysis (Chair : Taizo Shirai) | |
10:50-11:15 |
Rotational Cryptanalysis of ARX [Slide] [Video] Dmitry Khovratovich and Ivica Nikolic University of Luxembourg, Luxembourg |
11:15-11:40 |
Another Look at Complementation Properties [Slide] [Video] Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, and Pierre-Alain Fouque École normale supérieure, France and Weizmann Institute of Science, Israel |
11:40-12:05 |
Super-Sbox Cryptanalysis: Improved Attacks for AES-like Permutations [Slide] [Video] Henri Gilbert and Thomas Peyrin Orange Labs, France and Ingenico, France |
12:05-12:10 | Closing Remarks |
12:10-13:50 | Lunch |