Program
The program is available as a pdf here.
All technical sessions take place in the Oticon-salen at DTU in Lyngby.
Sunday 13 February 2011
- (Hotel Kong Arthur) 19:00 - 21:00: Registration
- (Hotel Kong Arthur) 19:00 - 21:00: Welcome reception
Monday 14 February 2011
- (Hotel Kong Arthur) 9:00: Buses to Conference Venue
- (Oticon-salen) 9:00 - 9:55: Registration
Session I — Differential Cryptanalysis
- 10:00 - 10:25: Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
DTU Mathematics, Technical University of Denmark - 10:25 - 10:50: Search for Related-key Differential Characteristics in DES-like ciphers
- 10:50 - 11:15: Multiple Differential Cryptanalysis: Theory and Pratice
- (Oticon-salen) 11:15 - 11:40: Coffee Break
Invited Talk I
- 11:40 - 12:40: Fast correlation attacks: Methods and countermeasures
FHNW Switzerland
- (Glassalen) 12:45 - 14:00: Lunch Break
Session II — Hash Functions I
- 14:00 - 14:25: Analysis of reduced-SHAvite-3-256 v2
Université de Lyon, INRIA, INSA Lyon, France
FHNW, Switzerland
Nanyang Technological University, Singapore - 14:25 - 14:50: An Improved Algebraic Attack on Hamsi-256
Computer Science department, The Weizmann Institute, Rehovot, Israel - 14:50 - 15:15: Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
ENS, Paris, France
- (Oticon-salen) 15:15 - 15:45: Coffee Break
Session III — Security and Models
- 15:45 - 16:10: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
SALSA Project - INRIA Paris-Rocquencourt, France
Information Security Group, Royal Holloway, University of London, UK.
Department of Computer Science, University of Calgary, Australia - 16:10 - 16:35: On the Security of Hash Functions Employing Blockcipher Postprocessing
National Institute of Standards and Technology (NIST), USA
C R Rao AIMSCS Institute, Hyderabad, India, and Google Inc.
Department of Computer Science, Columbia University, New York, USA.
Best Paper Award Ceremony
- (Oticon-salen) 16:35 - 16:40
Rump Session
- (Oticon-salen) 16:45 - 17:40: ...
- (Oticon-salen) 18:00 Buses to Hotel Kong Arthur
Tuesday 15 February 2011
- (Hotel Kong Arthur) 9:00: Buses to Conference Venue
Session IV — Stream Ciphers
- 9:45 - 10:10: Breaking Grain-128 with Dynamic Cube Attacks
Computer Science department, The Weizmann Institute, Rehovot, Israel - 10:10 - 10:35: Cryptanalysis of the Knapsack Generator
FHNW Switzerland - 10:35 - 11:00: Attack on Broadcast RC4 Revisited
Applied Statistics Unit, Indian Statistical Institute, Kolkata, India
Department of Computer Science & Engineering, Jadavpur University, Kolkata, India
- (Oticon-salen) 11:00 - 11:30: Coffee Break
Session V — Hash Functions II
- 11:30 - 11:55: Boomerang Attacks on BLAKE-32
University of Luxembourg - 11:55 - 12:20: Practical Partial-Collisions on the Compression Function of BMW
University of Luxembourg
DTU Mathematics, Technical University of Denmark - 12:20 - 12:45: Higher-order differential properties of Keccak and Luffa
SECRET Project-Team, INRIA Paris-Rocquencourt, France
Gemalto, France
Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium
- (Glassalen) 12:45 - 14:00: Lunch Break
Session VI — Block Ciphers and Modes
- 14:00 - 14:25: Cryptanalysis of PRESENT-like ciphers with secret S-boxes
DTU Mathematics, Technical University of Denmark - 14:25 - 14:50: A Single-Key Attack on the Full GOST Block Cipher
Sony Corporation, Japan - 14:50 - 15:15: The Software Performance of Authenticated-Encryption Modes
California State University, Sacramento, USA
University of California, Davis, USA
- (Oticon-salen) 15:15 - 15:45: Coffee Break
Invited Talk II
- 15:45 - 16:45: The past, present and future of hash functions - a rehash of some old and new results.
Aarhus University, Denmark
- (Oticon-salen) 17:00 Buses to Hotel Kong Arthur
- (Danish Design Center) 18:00 - 19:00: Cocktail and Exhibition
- (Danish Design Center) 19:00 - 23:00: Dinner
Wednesday 16 February 2011
- (Hotel Kong Arthur) 9:00: Buses to Conference Venue
Session VII — Linear and Differential Cryptanalysis
- 9:45 - 10:10: Cryptanalysis of Hummingbird-1
Revere Security, Addison, USA - 10:10 - 10:35: The Additive Differential Probability of ARX
Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium
Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium - 10:35 - 11:00: Linear Approximations of Addition Modulo 2^n-1
Institute of Software, Chinese Academy of Sciences,Beijing, China
- (Oticon-salen) 11:00 - 11:30: Coffee Break
Session VIII — Hash Functions III
- 11:30 - 11:55: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
NTT Corporation, Japan - 11:55 - 12:20: Known-Key Distinguishers for 11-Round Feistel Ciphers: Application to Collision Attacks on Their Hashing Modes
NTT Corporation, Japan
- (Glassalen) 12:30 - 13:30: Lunch Break
- (City Hall Copenhagen) 19:00 - 21:00: Reception at the City Hall Copenhagen, joint with SKEW 2011