Timetable
Thursday:
08:30 - 09:30 | Registration Open |
Session I (Chair Enes Pasalic): | Invited talk I |
09:30 - 10:30 |
Key-Variance in Statistical Cryptanalysis, [Kaisa Nyberg, Aalto University, Aalto, Finland] |
10:30-11:00 | Coffee break |
Session II (Chair Alexander Pott): | Symmetric key cryptography |
11:00-11:30 |
Boolean Functions withMaximum Algebraic Immunity Based on Properties of Punctured Reed Muller Codes, [Konstantinos Limniotis, Nicholas Kolokotronis] |
11:30-12:00 |
Results on Characterizations of Plateaued Functions in Arbitrary Characteristic, [Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak] |
12:00-12:30 |
Cryptographically Strong S-boxes Generated by Modified Immune Algorithm, [Georgi Ivanov, Svetla Nikova, Nikolay Nikolov] |
12:30-14:00 | Lunch |
Session III (ChairWilfriedMeidl): | Invited talk II |
14:00-15:00 |
Almost perfect nonlinear and planar functions: A survey of (not so) recent results and open problems, [Alexander Pott, Otto von Guericke University, Magdeburg, Germany] |
15:00-15:30 | Coffee break |
Session IV (Chair Kaisa Nyberg) : | Cryptanalysis |
15:30-16:00 |
Analysis of the Authenticated Cipher MORUS, [Aleksandra Mileva, Vesna Dimitrova, Vesselin Velichkov] |
16:00-16:30 |
Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes, [Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov] |
16:30-17:00 |
Time-Advantage Ratios under Simple Transformations: Applications to Leakage Resilient Cryptography, [Maciej Skorski] |
17:00-18:00 | Steering committee meeting |
19:30-22:00 | Conference dinner |
Friday:
Session V (Chair Svetla Nikova): | Invited talk III |
09:30 - 10:30 |
Software-based side-channel attacks, [Billy Bob Brumley, Tampere University of Technology, Tampere, Finland] |
10:30-11:00 | Coffee break |
Session VI (Chair Ferruh Özbudak): | Security and protocols |
11:00-11:30 |
Synchronous Universally Composable Computer Networks, [Dirk Achenbach, JörnMüller-Quade, Jochen Rill] |
11:30-12:00 |
Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps, [Catalin Dragan, Ferucio Laurentiu Tiplea] |
12:00-12:30 |
Closing the Gap: A Universal Privacy Framework for Outsourced Data, [Dirk Achenbach, Matthias Huber, Jörn Müller-Quade, Jochen Rill] |
12:30-14:00 | Lunch |
Session VII (Chair Ayca Cesmelioglu) : | Tutorial talk |
14:00-15:00 |
Constructing Boolean functions for stream ciphers, [Enes Pasalic,University of Primorska, Koper, Slovenia ] |
15:00-15:30 | Coffee break |
Session VIII (Chair Ferucio L. Tiplea): | Implementation and verifiable encryption |
15:30-16:00 |
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs using CUDA, [Sedat Akleylek, Zaliha Yuce Tok, Ozgur Dagdelen] |
16:00-16:30 |
cuHE: A Homomorphic Encryption Accelerator Library, [Wei Dai, Berk Sunar] |
16:30-17:00 |
Extended Functionality in Verifiable Searchable Encryption, [Sarah Louise Renwick, Christian Janson, James Alderman, KeithMartin] |
17:00-17:10 | Closing |