CINXE.COM

FSE 2012 - Program

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="fr" lang="fr"> <!-- Mirrored from fse2012.inria.fr/index.php?page=program by HTTrack Website Copier/3.x [XR&CO'2014], Tue, 20 Aug 2024 18:43:53 GMT --> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>FSE 2012 - Program</title> <meta name="keywords" content="FSE, cryptography, cryptology, fast software encryption. IACR" /> <meta name="description" content="This is FSE 2012 home page." /> <link rel="stylesheet" type="text/css" href="style.css" /> </head> <body> <div id="global"> <div id="toppage"> <div class="smallwhitetext" style="padding:12px"> <h2><a href="index9ba3.html">Home</a></h2>&nbsp;| <h2><a href="index37d6.html">Call&nbsp;for&nbsp;Papers</a></h2>&nbsp;| <h2><a href="indexc768.html">Program</a></h2>&nbsp;| <h2><a href="index1ce6.html">Registration</a></h2>&nbsp;| <h2><a href="index53a6.html">Contact</a></h2> </div> </div> <div id="header"> <h1 id="titletext"><br /> FSE 2012 <br /> <span class="smalltext"> <strong>March 19-21, 2012 <br /> Washington DC, USA</strong> </span> <br /> <span class="smalltext">19th International Workshop on Fast Software Encryption</span> </h1> </div> <div id="content"> <ul id="menu"> <li><h2><a href="index9ba3.html">Home</a></h2></li><li><h2><a href="index37d6.html">Call for Papers</a></h2></li><li><h2><a href="index46e0.html">Paper Submission</a></h2></li><li><h2><a href="index5d95.html">Accepted Papers</a></h2></li><li><h2><a href="indexc768.html" id="current">Program</a></h2></li><li><h2><a href="index929d.html">Rump session</a></h2></li><li><h2><a href="index1ce6.html">Registration</a></h2></li><li><h2><a href="indexbfd0.html">Pre-proceedings</a></h2></li><li><h2><a href="index4b75.html">Practical information</a></h2></li><li><h2><a href="index53a6.html">Contact</a></h2></li> </ul> <div id="contenttext"> <div class="bodytext" id="program"> <link rel="stylesheet" type="text/css" href="style.css" /> <h1>FSE 2012 Schedule</h1> <p>The program is available as a pdf <a href="program.pdf">here</a>.</p> <h2>Sunday 18 March 2012</h2> <ul> <li>17:30 - 19:00: <span class="title2">Welcome reception</span> </li> </ul> <h2>Monday 19 March 2012</h2> <ul> <li>9:00 - 9:55: <span class="title2">Registration</span> </li> <li>9:55 - 10:00: <span class="title2">General Chair's Opening Remarks</span> </li> </ul> <span class="chair">(Chair: Anne Canteaut)</span> <h3>Session I &mdash; Block ciphers</h3> <ul> <li>10:00 - 10:25: <span class="title"><a href="SLIDES/76.pdf">Improved Attacks on Full GOST</a></span> <br/><span class="authors">Itai Dinur, Orr Dunkelman and Adi Shamir</span> <br/><span class="affiliation">The Weizmann Institute, Rehovot, Israel</span> <br/><span class="affiliation">University of Haifa, Israel</span> </li> <li>10:25 - 10:50: <span class="title"><a href="SLIDES/87.pdf">Zero Correlation Linear Cryptanalysis with Reduced Data Complexity</a></span> <br/><span class="authors">Andrey Bogdanov and Meiqin Wang</span> <br/><span class="affiliation">KU Leuven, Belgium</span> <br/><span class="affiliation">Shandong University, China</span> </li> </ul> <ul> <li>10:50 - 11:20: <span class="title2">Coffee Break</span> </li> </ul> <span class="chair">(Chair: Anne Canteaut)</span> <h3>Invited Talk I</h3> <ul> <li>11:20 - 12:20: <span class="title2"><a href="SLIDES/kaisa.pdf">"Provable" security against differential and linear cryptanalysis</a></span> <br/><span class="authors"> Kaisa Nyberg</span> <br/><span class="affiliation"> Aalto University and Nokia, Finland</span> </li> </ul> <ul> <li>12:20 - 14:00: <span class="title2">Lunch</span> </li> </ul> <span class="chair">(Chair: Bruce Schneier)</span> <h3>Session II &mdash; Differential cryptanalysis</h3> <ul> <li>14:00 - 14:25: <span class="title"><a href="SLIDES/16.pdf">A Model for Structure Attacks, with Applications to PRESENT and Serpent</a></span> <br/><span class="authors">Meiqin Wang, Yue Sun, Elmar Tischhauser and Bart Preneel</span> <br/><span class="affiliation">Shandong University, China</span> <br/><span class="affiliation">Tsinghua University, China</span> <br/><span class="affiliation">KU Leuven, Belgium</span> </li> <li>14:25 - 14:50 <span class="title"><a href="SLIDES/57.pdf">A Methodology for Differential-Linear Cryptanalysis and Its Applications</a></span> <br/><span class="authors">Jiqiang Lu</span> <br/><span class="affiliation">Institute for Infocomm Research, Singapore</span> </li> <li>14:50 - 15:15 <span class="title"><a href="SLIDES/13.pdf">New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia</a></span> <br/><span class="authors">Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen and Wei Li</span> <br/><span class="affiliation">Shanghai Jiao Tong University, China</span> <br/><span class="affiliation">Shandong University, China</span> <br/><span class="affiliation">Tsinghua University, China</span> <br/><span class="affiliation">Donghua University, China</span> <br/><span class="affiliation">Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, China</span> </li> </ul> <ul> <li>15:15 - 15:45: <span class="title2">Coffee Break</span> </li> </ul> <span class="chair">(Chair: Stefan Lucks)</span> <h3>Session III &mdash; Hash functions I</h3> <ul> <li>15:45 - 16:10: <span class="title"><a href="SLIDES/47.pdf">Improved Rebound Attack on the Finalist Gr酶stl</a></span> <br/><span class="authors">J茅r茅my Jean, Mar铆a Naya-Plasencia and Thomas Peyrin</span> <br/><span class="affiliation">Ecole Normale Sup茅rieure, France</span> <br/><span class="affiliation">University of Versailles Saint-Quentin-en-Yvelines, France</span> <br/><span class="affiliation">Nanyang Technological University, Singapore</span> </li> <li>16:10 - 16:35: <span class="title"><a href="SLIDES/15.pdf">(Pseudo) Preimage Attack on Reduced-Round Gr酶stl Hash Function and Others</a></span> <br/><span class="authors">Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong and Jian Zou</span> <br/><span class="affiliation">State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences</span> <br/><span class="affiliation">Institute for Infocomm Research, Singapore</span> </li> <li>16:35 - 17:00: <span class="title"><a href="SLIDES/7.pdf">Practical Cryptanalysis of ARMADILLO2</a></span> <br/><span class="authors">Mar铆a Naya-Plasencia and Thomas Peyrin</span> <br/><span class="affiliation">University of Versailles Saint-Quentin-en-Yvelines, France</span> <br/><span class="affiliation">Nanyang Technological University, Singapore</span> </li> <li>17:00 - 17:25: <span class="title"><a href="SLIDES/26.pdf">On the (In)Security of IDEA in Various Hashing Modes</a></span> <br/><span class="authors">Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk and Huaxiong Wang</span> <br/><span class="affiliation">Nanyang Technological University, Singapore</span> <br/><span class="affiliation">Macquarie University, Australia</span> </li> </ul> <h2>Tuesday 20 March 2012</h2> <span class="chair">(Chair: Gilles Van Assche)</span> <h3>Session IV &mdash; Modes of operation</h3> <ul> <li>9:00 - 9:25: <span class="title"><a href="SLIDES/48.pdf">The Security of Ciphertext Stealing</a></span> <br/><span class="authors">Phillip Rogaway, Mark Wooding and Haibin Zhang</span> <br/><span class="affiliation">UC Davis, USA</span> <br/><span class="affiliation">Thales e-Security Ltd, UK</span> </li> <li>9:25 - 9:50: <span class="title"><a href="SLIDES/40.pdf">McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes</a></span> <br/><span class="authors">Ewan Fleischmann, Christian Forler and Stefan Lucks</span> <br/><span class="affiliation">Bauhaus-University, Germany</span> </li> <li>9:50 - 10:15: <span class="title"><a href="SLIDES/36.pdf">Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes</a></span> <br/><span class="authors">Markku-Juhani Olavi Saarinen</span> <br/><span class="affiliation">Revere Security, USA</span> </li> </ul> <ul> <li>10:15 - 10:45: <span class="title2">Coffee Break</span> </li> </ul> <span class="chair">(Chair: Yu Sasaki)</span><h3>Session V &mdash; Hash functions II</h3> <ul> <li>10:45 - 11:10: <span class="title"><a href="SLIDES/84.pdf">Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128</a></span> <br/><span class="authors">Florian Mendel, Tomislav Nad and Martin Schl盲ffer</span> <br/><span class="affiliation">KU Leuven, Belgium</span> <br/><span class="affiliation">Graz University of Technology, Austria</span> </li> <li>11:10 - 11:35: <span class="title"><a href="SLIDES/59.pdf">Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family</a></span> <br/><span class="authors">Dmitry Khovratovich, Christian Rechberger and Alexandra Savelieva</span> <br/><span class="affiliation">Microsoft Research Redmond, USA</span> <br/><span class="affiliation">DTU, Denmark</span> <br/><span class="affiliation">Higher School of Economics, Russia</span> </li> <li>11:35 - 12:00: <span class="title"><a href="SLIDES/67.pdf">Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2</a></span> <br/><span class="authors">Ji Li, Takanori Isobe and Kyoji Shibutani</span> <br/><span class="affiliation">Sony China Research Laboratory</span> <br/><span class="affiliation">Sony Corporation</span> </li> </ul> <ul> <li>12:00 - 14:00: <span class="title2">Lunch Break</span> </li> </ul> <span class="chair">(Chair: Pascal Junod)</span><h3>Session VI &mdash; New tools for cryptanalysis</h3> <ul> <li>14:00 - 14:25: <span class="title"><a href="SLIDES/39.pdf">UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX</a></span> <br/><span class="authors">Vesselin Velichkov, Nicky Mouha, Christophe De Canni猫re and Bart Preneel</span> <br/><span class="affiliation">ESAT/SCD-COSIC, KU Leuven, Belgium</span> <br/><span class="affiliation">University of Luxembourg, Luxembourg</span> <br/><span class="affiliation">IBBT, Belgium</span> </li> <li>14:25 - 14:50: <span class="title"><a href="SLIDES/43.pdf">ElimLin Algorithm Revisited</a></span> <br/><span class="authors">Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil and Serge Vaudenay</span> <br/><span class="affiliation">University College London, UK</span> <br/><span class="affiliation">EPFL, Switzerland</span> </li> </ul> <ul> <li>14:50 - 15:20: <span class="title2">Coffee Break</span> </li> </ul> <span class="chair">(Chair: Pascal Junod)</span><h3>Invited Talk II</h3> <ul> <li>15:20 - 16:20: <span class="title2">The history of linear cryptanalysis</span> <br/><span class="authors">Mitsuru Matsui </span> <br/><span class="affiliation"> Mitsubishi Electric Corporation, Japan</span> </li> </ul> <ul> <li>16:30 - ...: <span class="title2">Rump session </span><span class="chair">(Chairs: Dan Bernstein and Tanja Lange)</span> </ul> <ul> <li>18:00 - ...: <span class="title2">Conference dinner</span> </ul> <h2>Wednesday 21 March 2012</h2> <span class="chair">(Chair: Serge Vaudenay)</span><h3>Session VII &mdash; New designs</h3> <ul> <li>9:00 - 9:25: <span class="title"><a href="SLIDES/4.pdf">Short-output universal hash functions and their use in fast and secure message authentication</a></span> <br/><span class="authors">Long Hoang Nguyen and Andrew William Roscoe</span> <br/><span class="affiliation">Oxford University, UK</span> </li> <li>9:25 - 9:50: <span class="title"><a href="SLIDES/19.pdf">Lapin: an Efficient Authentication Protocol Based on Ring-LPN</a></span> <br/><span class="authors">Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar and Krzysztof Pietrzak</span> <br/><span class="affiliation">Ruhr-Universit盲t Bochum, Germany</span> <br/><span class="affiliation">INRIA / ENS, France</span> <br/><span class="affiliation">IST, Austria</span> </li> <li>9:50 - 10:15: <span class="title"><a href="SLIDES/83.pdf">Higher-Order Masking Schemes for S-Boxes</a></span> <br/><span class="authors">Claude Carlet, Louis Goubin, Emmanuel Prouff, Michael Quisquater and Matthieu Rivain</span> <br/><span class="affiliation">Universit茅 de Paris 8, France</span> <br/><span class="affiliation">Universit茅 de Versailles Saint-Quentin-en-Yvelines, France</span> <br/><span class="affiliation">Oberthur Technologies, France</span> <br/><span class="affiliation">CryptoExperts, France</span> </li> <li>10:15 - 10:40: <span class="title"><a href="SLIDES/18.pdf">Recursive Diffusion Layers for Block Ciphers and Hash Functions</a></span> <br/><span class="authors">Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala and Pouyan Sepehrdad</span> <br/><span class="affiliation">Isfahan University of Technology, Iran</span> <br/><span class="affiliation">University of Isfahan, Iran</span> <br/><span class="affiliation">EPFL, Switzerland</span> </li> </ul> <ul> <li>10:40 - 11:10: <span class="title2">Coffee Break</span> </li> </ul> <span class="chair">(Chair: John Kelsey)</span><h3>Session VIII &mdash; Keccak</h3> <ul> <li>11:10 - 11:35: <span class="title"><a href="SLIDES/12.pdf">Unaligned Rebound Attack: Application to Keccak</a></span> <br/><span class="authors">Alexandre Duc, Jian Guo, Thomas Peyrin and Lei Wei</span> <br/><span class="affiliation">EPFL, Switzerland</span> <br/><span class="affiliation">Institute for Infocomm Research, Singapore</span> <br/><span class="affiliation">Nanyang Technological University, Singapore</span> </li> <li>11:35 - 12:00: <span class="title"><a href="SLIDES/31.pdf">Differential propagation analysis of Keccak</a></span> <br/><span class="authors">Joan Daemen and Gilles Van Assche</span> <br/><span class="affiliation">STMicroelectronics, Belgium</span> </li> <li>12:00 - 12:25: <span class="title"><a href="SLIDES/75.pdf">New attacks on Keccak-224 and Keccak-256</a></span> <br/><span class="authors">Itai Dinur, Orr Dunkelman and Adi Shamir</span> <br/><span class="affiliation">The Weizmann Institute, Rehovot, Israel</span> <br/><span class="affiliation">University of Haifa, Israel</span> </li> </ul> </div> </div> <div id="footer"> <div style="float:left"> Last modification: April 13, 2012 </div> </div> </div> </div> </body> <!-- Mirrored from fse2012.inria.fr/index.php?page=program by HTTrack Website Copier/3.x [XR&CO'2014], Tue, 20 Aug 2024 18:45:00 GMT --> </html>

Pages: 1 2 3 4 5 6 7 8 9 10