Program

Wednesday May, 28th
08h00 - 09h00
Registration
9h00 - 10h15

 Public-Key Cryptography (I)

  • Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
      Julien Devigne, Eleonora Guerrini, and Fabien Laguillaumie
  • Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
      Afonso Arriaga, Qiang Tang, and Peter Ryan
  • Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
      Kaoru Kurosawa and Le Trieu Phong
10h15 - 11h00
Official Opening Ceremony
11h00 - 11h30
Coffee Break
11h30 - 12h30
Invited Speaker: Antoine Joux
12h30 - 14h30
Lunch
14h30 - 15h15

 Hash Functions

  • Differential Biases in Reduced-Round Keccak
      Sourav Das and Willi Meier
  • Practical Distinguishers Against 6-Round Keccak-f Exploiting Self-Symmetry
      Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, and Dipanwita Roy Chowdhury
  • Preimage Attacks on Reduced-round Stribog
      Riham AlTawy and Amr Youssef
15h15 - 15h45
Coffee Break
15h45 - 18h00

 Secret-Key Cryptanalysis

  • Breaking the IOC Authenticated Encryption Mode
      Paul Bottinelli, Reza Reyhanitabar, and Serge Vaudenay
  • New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
      Lin Ding, Chenhui Jin, Jie Guan, and Chuanda Qi
  • Multidimensional Zero-Correlation Linear Cryptanalysis of E2
      Long Wen, Meiqin Wang, and Andrey Bogdanov

 

Thursday May, 29th
09h00 – 10h15

 Public-Key Cryptanalysis and Number Theory

  • Further Improvement of Factoring RSA Moduli with Implicit Hint
      Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie
  • New Attacks on the RSA Cryptosystem
      Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Hatem M. Bahig, and Dieaa I. Nassr
  • Formulae for computation of Tate pairing on hyperelliptic curve using hyperelliptic nets
      Christophe Tran
10h15 - 10h45
Coffee Break
10h45 – 12h30

 Hardware Implementation

  • New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
      Zhe Liu and Johann Großschädl
  • Minimizing S-Boxes in Hardware by Utilizing Linear Transformations
      Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, and Marc Stöttinger
  • Efficient Masked S-Boxes Processing, A Step Forward
      Vincent Grosso, Emmanuel Prouff, and François-Xavier Standaert
  • A More Efficient AES Threshold Implementation
      Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen
12h30
Lunch
15h00
Excursion
20h00
Gala Dinner

 

Friday May, 30th
09h00 – 09h50

 Protocols

  • Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum
      Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, and Kazuki Yoneyama
  • Position-Based Cryptography from the Noisy Channels
      Stefan Dziembowski and Maciej Zdanowicz
09h50 – 10h40

 Lattice-based Cryptography

  • A Comparison of the Homomorphic Encryption Schemes FV and YASHE
      Tancrède Lepoint and Michael Naehrig
  • Towards Lattice Based Aggregate Signatures
      Rachid EL Bansarkhani and Johannes Buchmann
10h40 - 11h15
Coffee Break
11h15 – 12h15
Invited Speaker: Philippe Gaborit
12h15 - 14h00
Lunch
14h00 – 15h15

 Public-Key Cryptography (II)

  • A Second Look at Fischlin's Transformation
      Özgür Dagdelen and Daniele Venturi
  • Anonymous IBE from Quadratic Residuosity with Improved Performance
      Michael Clear, Hitesh Tewari, and Ciaran McGoldrick
  • Expressive Attribute Based Signcryption with Constant-Size Ciphertext
      Y. Sreenivasa Rao and Ratna Dutta
15h15 - 15h45
Coffee Break
15h45 – 17h00

 Secret-Key Cryptography

  • DRECON : DPA Resistant Encryption by Construction
      Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, and Debdeep Mukhopadhyay
  • Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions
      Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
  • Universal Hash-Function Families: From Hashing to Authentication
      Basel Alomair
17h00
Closing Remarks

 

           
Copyright © Africacrypt14| All Rights Reserved