Invited Speakers & Slides
- Patrick Derbez, Université Rennes 1 / IRISA, FRANCE
Yet another attack on whitebox AES implementation[slides]
- Tetsu Iwata, Nagoya University, JAPAN
ZMAC: Specification, Security Proof, and Instantiation[slides]
- Danping Shi, Institute of Information Engineering, Chinese Academy of Sciences, CHINA
Programming the Demirci-Selcuk Meet-in-the-Middle Attack with Constraints[slides]
- Yunwen Liu, COSIC, KU Leuven, BELGIUM
The Phantom of Differential Characteristics[slides]
- Nicky Mouha, NIST, USA
Finding Bugs in Cryptographic Hash Function Implementations[slides]
- Mridul Nandi, Indian Statistical Institute, INDIA
Tools for Symmetric Key Provable Security[slides]
- Sumanta Sarkar, TCS Innovation Labs, INDIA
On the lightweight design choices for diffusion layer of block ciphers[slides]
- Yu Sasaki, NTT Secure Platform Laboratories, JAPAN
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics[slides]
- Ling Song, Institute of Information Engineering, Chinese Academy of Sciences, CHINA
&
Nanyang Technological University,SINGAPORE Conditional Cube Attacks on Keccak-p Based Constructions[slides]
- Yosuke Todo, NTT Secure Platform Laboratories, JAPAN
Some Improvements of Non-Blackbox Cube Attacks[slides]
- Meiqin Wang, Shandong University, CHINA
Automatic Search of (Related-Key, Impossible) Differential and(Zero-Correlation) Linear Trails for S-Box Based Ciphers with STP
- Lei Wang, Shanghai Jiao Tong University, CHINA
Towards Minimizing Key-alternating Feistel Ciphers
|