Program


Friday, 13th December 2019

09:00 - 09:30: Registration
09:30 - 11:00: Invited talk 1 @Room:720

  • Fault model and attack efficiency of physical attacks, Kazuo Sakiyama (The University of Electro-Communications, Japan)
  • A tale of 3 competitions: On cryptanalysis competitions for new use-cases of symmetric crypto, Christian Rechberger (Graz University of Technology, Austria)
  • Towards a better understanding of (post-)quantum security of symmetric key schemes, Akinori Hosoyamada (NTT, Japan) [slide]

11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 2 @Room: 720

  • Cryptanalysis of Reduced Gimli-Hash, Fukang Liu (University of Hyogo, Japan) [slide]
  • SHA-1: Beating a Dead Horse, Thomas Peyrin (Nanyang Technological University, Singapore)

12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 18:00: Group work @Room: 501, 502, 503, 504, 505, 513


Saturday, 14th December 2019

09:30 - 11:00: Invited talk 3 @Room: 720

  • Cryptanalysis of Lightweight Block Ciphers: Theory Meets Dependencies, Orr Dunkelman (University of Haifa, Israel) [slide]
  • Detection of data corruption via combinatorial group testing and beyond, Kazuhiko Minematsu (NEC, Japan) [slide]
  • Hardware Implementation of Block Cipher: Case Study Using AES, Rei Ueno (Tohoku University, Japan) [slide]

11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 4 @Room: 720

  • Cryptanalysis of Stream Ciphers with short internal states, Subhadeep Banik (EPFL, Switzerland) [slide]
  • Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS, Siwei Sun (Chinese Academy of Sciences, China) [slide]

12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 18:00: Group work @Room: 501, 502, 503, 504, 505, 513


Sunday, 15th December 2019

09:00 - 11:00: Invited talk 5 @Room: 720

  • Domain Specific Ciphers, Carlos Cid (Royal Holloway, University of London, UK) [slide]
  • Cube Attacks on KECCAK Keyed Modes, Willi Meier (FHNW, Switzerland) [slide]
  • Generic Attacks on Hash Combiners Zhenzhen Bao (Nanyang Technological University, Singapore) [slide]
  • Rotational-XOR cryptanalysis on ARX and AND-RX ciphers, Yunwen Liu (National University of Defense Technology, China) [slide]

11:00 - 11:30: Coffee break @Room: 719
11:30 - 12:30: Invited talk 6 @Room: 720

  • Design of Optimally Indifferentiable-Secure Double-Block-Length Hashing, Yusuke Naito (Mitsubishi Corporation, Japan) [slide]
  • Lightweight TBC-Based Modes for Small Hardware Implementations, Mustafa Khairallah (Nanyang Technological University, Singapore) [slide]

12:30 - 13:30: Lunch @Room: 719
13:30 - 15:30: Group work @Room: 501, 502, 503, 504, 505, 513
15:30 - 16:00: Coffee break @Room: 512
16:00 - 17:00: Wrap up @Room: 720