Confirmed Invited Speakers (@Room: 720)
invited talk1 (9:30 ~ 11:00 on Dec 13th)
- Kazuo Sakiyama (The University of Electro-Communications, Japan),
“Fault model and attack efficiency of physical attacks”
- Christian Rechberger (Graz University of Technology, Austria),
“A tale of 3 competitions: On cryptanalysis competitions for new use-cases of symmetric crypto”
- Akinori Hosoyamada (NTT, Japan),
“Towards a better understanding of (post-)quantum security of symmetric key schemes”
invited talk2 (11:30 ~ 12:30 on Dec 13th)
- Fukang Liu (University of Hyogo, Japan),
“Cryptanalysis of Reduced Gimli-Hash”
- Thomas Peyrin (Nanyang Technological University, Singapore),
“SHA-1: Beating a Dead Horse”
invited talk3 (9:30 ~ 11:00 on Dec 14th)
- Orr Dunkelman (University of Haifa, Israel),
“Cryptanalysis of Lightweight Block Ciphers: Theory Meets Dependencies”
- Kazuhiko Minematsu (NEC, Japan),
“Detection of data corruption via combinatorial group testing and beyond”
- Rei Ueno (Tohoku University, Japan),
“Hardware Implementation of Block Cipher: Case Study Using AES”
invited talk4 (11:30 ~ 12:30 on Dec 14th)
- Subhadeep Banik (EPFL, Switzerland),
“Cryptanalysis of Stream Ciphers with short internal states”
- Siwei Sun (Chinese Academy of Sciences, China),
“Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS”
invited talk5 (9:00 ~ 11:00 on Dec 15th)
- Carlos Cid (Royal Holloway, University of London, UK),
“Domain Specific Ciphers”
- Willi Meier (FHNW, Switzerland),
“Cube Attacks on KECCAK Keyed Modes”
- Zhenzhen Bao (Nanyang Technological University, Singapore),
“Generic Attacks on Hash Combiners”
- Yunwen Liu (National University of Defense Technology, China),
“Rotational-XOR cryptanalysis on ARX and AND-RX ciphers”
invited talk6 (11:30 ~ 12:30 on Dec 15th)
- Yusuke Naito (Mitsubishi Corporation, Japan),
“Design of Optimally Indifferentiable-Secure Double-Block-Length Hashing”
- Mustafa Khairallah (Nanyang Technological University, Singapore),
“Lightweight TBC-Based Modes for Small Hardware Implementations”