08:30 - 09:20 | |
09:20 - 09:30 | Opening remarks |
09:30 - 10:00 | (ESAT, Belgium) Towards beyond birthday bound secure COPAs |
10:00 - 10:45 | (Indian Statistical Institute, India) Lower Bound on the Calls of Block Ciphers in Symmetric-Key Designs [slides] |
10:45 - 11:15 | |
11:15 - 12:00 | (ANSSI, France) Constructing Tweakable Block Ciphers in the Random Permutation Model [slides] |
12:00 - 12:30 | (Chinese Academy of Sciences, China) PMAC-Double: Doubling PMAC with a Single Key [slides] |
14:00 - 18:00 | |
16:00 - 16:30 |
09:15 - 10:00 | (UVSQ, France) Understanding the Division Property |
10:00 - 10:45 | (INRIA, France) Generic Attacks against MAC Algorithms [slides] |
10:45 - 11:15 | |
11:15 - 12:00 | (NTT, Japan) Recent Applications of Hellman's Time-Memory Tradeoff [slides] |
12:00 - 12:30 | (Shang Hai Jiao Tong University, China) Optimal Constructions of Universal One-way Hash Functions from Special One-way Functions [slides] |
14:00 - 18:00 | |
16:00 - 16:30 |
19:00 - 23:00 |
09:30 - 10:00 | (ESAT, Belgium) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees [slides] |
10:00 - 10:45 | (ANSSI, France) Fault-based Cryptanalysis on Block Ciphers [slides] |
10:45 - 11:15 | |
11:15 - 12:00 | (EPFL, Switzerland) Online Authenticated Encryption [slides] |
12:00 - 12:30 | (Chinese Academy of Sciences, China) Mixed-integer Programming based Differential and Linear Cryptanalysis [slides] |
14:00 - 18:00 | |
16:00 - 16:30 |
09:15 - 09:45 | (Sejong University, Korea) Partition-and-Mix: Generalizing the Swap-or-Not Shuffle [slides] |
09:45 - 10:30 | (Graz University of Technology, Austria) Analysis of Kupyna [slides] |
10:30 - 11:00 | |
11:00 - 11:45 | (NTT, Japan) Part I: The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption [slides] Part II: PMAC's Message Length Dependence [slides] |
11:45 - 12:15 | (NEC Corporation, Japan) Efficient Message Authentication Codes with Combinatorial Group Testing [slides] |
12:15 - 12:45 | (Nagoya University, Japan) Provable Security Bounds of GCM |
14:00 - 16:00 | |
16:00 - 16:30 | |
16:30 - 17:30 |