Fast Software Encryption 2015
Program FSE 2015 Istanbul
Sunday, 08 March 2015
- 17:00 - 19:00: Welcome Reception - Registration - Lazzoni Hotel (Sütlüce Mah. İmrahor Caddesi, Beyoğlu - Link for Map)
Monday, 09 March 2015
- 08:55 - 09:55 Registration and coffee at Istanbul Commerce University, Sütlüce Campus
- 09:55 - 10:05 Opening Remarks
- 10:05 - 11:20 Session I - Block Cipher Cryptanalysis I (Chair: Bart Preneel)
o Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE [slides]
Alex Biryukov; Patrick Derbez; Léo Perrin (University of Luxembourg; University of Luxembourg; University of Luxembourg)
o Improved Higher-Order Differential Attacks on MISTY1 [slides]
Achiya Bar-On (Bar Ilan University)
o Meet-in-the-Middle Technique for Truncated Differential and its Applications to CLEFIA and Camellia [slides]
Leibo Li; Keting Jia; Xiaoyun Wang; Xiaoyang Dong (Shandong University; Tsinghua University; Tsinghua University; Shandong University)
- 11:20 - 11:40 Coffee break
- 11:40 - 12:30 Session II - Understanding Attacks (Chair: Andrey Bogdanov)
o Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation [slides]
A. Bay; Céline Blondeau; Serge Vaudenay (EPFL; Aalto University, School of Science; EPFL)
o Relations between Impossible, Integral and Zero-Correlation Key-Recovery Attacks [slides]
Céline Blondeau; Marine Minier (Aalto University, Finland; INSA Lyon, France)
- 12:30 - 13:30 Invited Talk 1 (Chair: Thomas Peyrin)
o Challenges in Lightweight Crypto Standardization
Meltem Turan Sönmez (NIST)
- 13:30 - 14:30 Lunch
- 14:30 - 15:45 Session III - Implementation Issues (Chair: Serge Vaudenay)
o Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment [slides]
Cezary Glowacz; Vincent Grosso; Romain Poussier; Joachim Schueth; Francois-Xavier Standaert (T-Systems, Germany; UCL Crypto Group; UCL Crypto Group; T-Systems, Germany; UCL Crypto Group)
o Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity [slides]
Jean-Sebastien Coron; Johan Groszschaedl; Mehdi Tibouchi; Praveen Kumar Vadnala (University of Luxembourg; University of Luxembourg; NTT Secure Platform Laboratories, Japan; University of Luxembourg)
o Comb To Pipeline: Fast Software Encryption Revisited [slides]
Andrey Bogdanov; Martin M. Lauridsen; Elmar Tischhauser (DTU Compute; DTU Compute; DTU Compute)
- 15:45 - 16:05 Coffee Break
- 16:05 - 17:20 Session IV - Block Cipher Cryptanalysis II (Chair: Orhun Kara)
o Security of AES with a Secret S-box [slides]
Tyge Tiessen; Lars R. Knudsen; Stefan Kölbl; Martin M. Lauridsen (Technical University of Denmark; Technical University of Denmark; Technical University of Denmark; Technical University of Denmark)
o Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE [slides]
Patrick Derbez; Léo Perrin (University of Luxembourg; University of Luxembourg)
o Linear Distinguishers in the Key-less Setting: Application to PRESENT [slides]
Martin M. Lauridsen; Christian Rechberger (DTU; DTU)
Tuesday, 10 March 2015
- 08:50 - 10:30 Session V - Cryptanalysis of Authenticated Encryption Schemes (Chair: Dmitry Khovratovich)
o Differential-Linear Cryptanalysis of ICEPOLE [slides]
Tao Huang; Ivan Tjuawinata; Hongjun Wu (Nanyang Technological University; Nanyang Technological University; Nanyang Technological University)
o Cryptanalysis of JAMBU [slides]
Thomas Peyrin; Siang Meng Sim; Lei Wang; Guoyan Zhang (Nanyang Technological University; Nanyang Technological University; Nanyang Technological University; Shan Dong University)
o Related-Key Forgeries for Proest-OTR [slides]
Christoph Dobraunig; Maria Eichlseder; Florian Mendel (IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology)
o Practical Cryptanalysis of the Open Smart Grid Protocol [slides]
Philipp Jovanovic; Samuel Neves (University of Passau; University of Coimbra)
- 10:30 - 10:50 Coffee break
- 10:50 - 12:30 Session VI - Proofs (Chair: Carlos Cid)
o Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes [slides]
Peter Gazi; Jooyoung Lee; Yannick Seurin; John Steinberger; Stefano Tessaro (IST Austria; Sejong University; ANSSI; Tsinghua University; UC Santa Barbara)
o The Related-Key Security of Iterated Even-Mansour Ciphers [slides]
Pooya Farshim; Gordon Procter (Queen's University Belfast; Royal Holloway, University of London)
o Security of Keyed Sponge Constructions Using a Modular Proof Approach [slides]
Elena Andreeva; Joan Daemen; Bart Mennink; Gilles Van Assche KU Leuven, Belgium; (STMicroelectronics, Belgium; KU Leuven, Belgium; STMicroelectronics, Belgium)
o GCM Security Bounds Reconsidered [slides]
Yuichi Niwa; Keisuke Ohashi; Kazuhiko Minematsu; Tetsu Iwata (Nagoya University; Nagoya University; NEC Corporation; Nagoya University)
- 12:30 - 13:20 Session VII - Design (Chair: Tetsu Iwata)
o Boosting OMD for Almost Free Authentication of Associated Data [slides]
Reza Reyhanitabar; Serge Vaudenay; Damian Vizár (EPFL, Switzerland; EPFL, Switzerland; EPFL, Switzerland)
o Optimally Secure Tweakable Blockciphers [slides]
Bart Mennink (KU Leuven, Belgium)
- 13:20 - 14:30 Lunch
- 14:30 - 15:45 Session VIII - Lightweight (Chair: Anne Canteaut)
o On Lightweight Stream Ciphers with Shorter Internal States [slides]
Frederik Armknecht; Vasily Mikhalev (University of Mannheim; University of Mannheim)
o Lightweight MDS Involution Matrices [slides]
Siang Meng Sim; Khoongming Khoo; Frédérique Oggier; Thomas Peyrin (Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore)
o A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT [slides]
Wentao Zhang; Zhenzhen Bao; Vincent Rijmen; Meicheng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China)
- 15:45 - 16:05 Coffee Break
- 16:05 - 17:05 Rump Session (Chair: Daniel J. Bernstein and Tanja Lange)
- 17:30 - 19:00 Boat Tour in Bosphorous
- 19:00 - 21:00 Workshop Banquet
- 21:30 - 23:00 Return Boat Tour (Eminönü)
Wednesday, 11 March 2015
- 10:30 - 11:45 Session IX - Cryptanalysis of Hash Functions and Stream Ciphers (Chair: Christian Rechberger)
o Rotational Cryptanalysis of ARX Revisited [slides]
Dmitry Khovratovich; Ivica Nikolić; Josef Pieprzyk; Przemyslaw Sokolowski; Ron Steinfeld (University of Luxembourg, Luxembourg; Nanyang Technological University, Singapore; Queensland University of Technology, Australia; Adam Mickiewicz University, Poland; Monash University, Clayton, Australia)
o Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation [slides]
Jérémy Jean; Ivica Nikolić (Nanyang Technological University; Nanyang Technological University)
o New Linear Correlations related to State Information of RC4 PRGA using IV in WPA [slides]
Ryoma Ito; Atsuko Miyaji (Japan Advanced Institute of Science and Technology; Japan Advanced Institute of Science and Technology)
- 11:45 - 12:05 Coffee Break
- 12:05 - 12:30 Session X - Mass Surveillance (Chair: Gregor Leander)
o A More Cautious Approach to Security Against Mass Surveillance [slides]
Jean Paul Degabriele; Pooya Farshim; Bertram Poettering Royal Holloway, (University of London, UK; Queen's University Belfast, UK; Ruhr University Bochum, Germany)
- 12:30 - 13:30 Invited Talk II (Chair: Gregor Leander)
o Conflicting roles: the NSA and cryptography
Jacob Appelbaum (Tor Project)
- 13:30 - 14:30 Lunch and workshop closing