3–4 Sep 2015
Koper, Slovenia
Europe/Ljubljana timezone

Timetable

Timetable
 
Thursday:
 
08:30 - 09:30 Registration Open
Session I (Chair Enes Pasalic): Invited talk I
09:30 - 10:30 Key-Variance in Statistical Cryptanalysis,
[Kaisa Nyberg, Aalto University, Aalto, Finland]
10:30-11:00 Coffee break
Session II (Chair Alexander Pott): Symmetric key cryptography
11:00-11:30 Boolean Functions withMaximum Algebraic Immunity Based on Properties of Punctured Reed Muller Codes,
[Konstantinos Limniotis, Nicholas Kolokotronis]
11:30-12:00 Results on Characterizations of Plateaued Functions in Arbitrary Characteristic,
[Sihem Mesnager, Ferruh Özbudak, Ahmet
Sinak]
12:00-12:30 Cryptographically Strong S-boxes Generated by Modified Immune Algorithm,
[Georgi Ivanov, Svetla Nikova, Nikolay Nikolov]
12:30-14:00 Lunch
Session III (ChairWilfriedMeidl): Invited talk II
14:00-15:00 Almost perfect nonlinear and planar functions:
A survey of (not so) recent results and open problems,
[Alexander Pott, Otto von Guericke University, Magdeburg, Germany]
15:00-15:30 Coffee break
Session IV (Chair Kaisa Nyberg) : Cryptanalysis
15:30-16:00 Analysis of the Authenticated Cipher MORUS,
[Aleksandra Mileva, Vesna Dimitrova, Vesselin Velichkov]
16:00-16:30 Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes,
[Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov]
16:30-17:00 Time-Advantage Ratios under Simple Transformations: Applications to Leakage Resilient Cryptography,
[Maciej Skorski]
17:00-18:00 Steering committee meeting
19:30-22:00 Conference dinner


Friday:

Session V (Chair Svetla Nikova): Invited talk III
09:30 - 10:30 Software-based side-channel attacks,
[Billy Bob Brumley, Tampere University of Technology, Tampere, Finland]
10:30-11:00 Coffee break
Session VI (Chair Ferruh Özbudak): Security and protocols
11:00-11:30 Synchronous Universally Composable Computer Networks,
[Dirk Achenbach, JörnMüller-Quade, Jochen Rill]
11:30-12:00 Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps,
[Catalin Dragan, Ferucio Laurentiu Tiplea]
12:00-12:30 Closing the Gap: A Universal Privacy Framework for Outsourced Data,
[Dirk Achenbach, Matthias Huber, Jörn Müller-Quade, Jochen Rill]
12:30-14:00 Lunch
Session VII (Chair Ayca Cesmelioglu) : Tutorial talk
14:00-15:00 Constructing Boolean functions for stream ciphers,
[Enes Pasalic,University of Primorska, Koper, Slovenia ]
15:00-15:30 Coffee break
Session VIII (Chair Ferucio L. Tiplea): Implementation and verifiable encryption
15:30-16:00 On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs using CUDA,
[Sedat Akleylek, Zaliha Yuce Tok, Ozgur Dagdelen]
16:00-16:30 cuHE: A Homomorphic Encryption Accelerator Library,
[Wei Dai, Berk Sunar]
16:30-17:00 Extended Functionality in Verifiable Searchable Encryption,
[Sarah Louise Renwick, Christian Janson, James Alderman, KeithMartin]
17:00-17:10 Closing