Program
Friday, 13th December 2019
09:00 - 09:30: Registration
09:30 - 11:00: Invited talk 1 @Room:720
- Fault model and attack efficiency of physical attacks, Kazuo Sakiyama (The University of Electro-Communications, Japan)
- A tale of 3 competitions: On cryptanalysis competitions for new use-cases of symmetric crypto, Christian Rechberger (Graz University of Technology, Austria)
- Towards a better understanding of (post-)quantum security of symmetric key schemes, Akinori Hosoyamada (NTT, Japan) [slide]
11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 2 @Room: 720
- Cryptanalysis of Reduced Gimli-Hash, Fukang Liu (University of Hyogo, Japan) [slide]
- SHA-1: Beating a Dead Horse, Thomas Peyrin (Nanyang Technological University, Singapore)
12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 18:00: Group work @Room: 501, 502, 503, 504, 505, 513
Saturday, 14th December 2019
09:30 - 11:00: Invited talk 3 @Room: 720
- Cryptanalysis of Lightweight Block Ciphers: Theory Meets Dependencies, Orr Dunkelman (University of Haifa, Israel) [slide]
- Detection of data corruption via combinatorial group testing and beyond, Kazuhiko Minematsu (NEC, Japan) [slide]
- Hardware Implementation of Block Cipher: Case Study Using AES, Rei Ueno (Tohoku University, Japan) [slide]
11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 4 @Room: 720
- Cryptanalysis of Stream Ciphers with short internal states, Subhadeep Banik (EPFL, Switzerland) [slide]
- Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, Siwei Sun (Chinese Academy of Sciences, China) [slide]
12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 18:00: Group work @Room: 501, 502, 503, 504, 505, 513
Sunday, 15th December 2019
09:00 - 11:00: Invited talk 5 @Room: 720
- Domain Specific Ciphers, Carlos Cid (Royal Holloway, University of London, UK) [slide]
- Cube Attacks on KECCAK Keyed Modes, Willi Meier (FHNW, Switzerland) [slide]
- Generic Attacks on Hash Combiners Zhenzhen Bao (Nanyang Technological University, Singapore) [slide]
- Rotational-XOR cryptanalysis on ARX and AND-RX ciphers, Yunwen Liu (National University of Defense Technology, China) [slide]
11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 6 @Room: 720
- Design of Optimally Indifferentiable-Secure Double-Block-Length Hashing, Yusuke Naito (Mitsubishi Corporation, Japan) [slide]
- Lightweight TBC-Based Modes for Small Hardware Implementations, Mustafa Khairallah (Nanyang Technological University, Singapore) [slide]
12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 17:00: Wrap up @Room: 720