Sunday, June 5th | |||||||
18.00-20.00 |
Registration |
||||||
Monday, June 6th | |||||||
08.15-09.00 |
Registration and Welcome |
||||||
Introductory Talks - Part I |
|||||||
09.00-10.30 |
Introduction to Symmetric Cryptography – Joan Daemen |
||||||
10.30-11.00 | Coffee break |
||||||
11.00-12.30 |
Basic public-key constructions with Elliptic Curves – Benjamin Smith |
||||||
12.30-14.00 |
Lunch |
||||||
14.00-15.00 |
Introduction to Side Channel Cryptanalysis – FX Standaert |
||||||
15.00-16.00 |
Hardware Tutorial – Ingrid Verbauwhede |
||||||
16.00-16.30 | Coffee break |
||||||
16.30-18.00 |
Hardware Tutorial (Lab) – Nele Mentens and Ricardo Chaves [Lab material] |
||||||
19.00-21.00 |
Welcome Reception |
||||||
Tuesday, June 7th | |||||||
Introductory Talks - Part II |
|||||||
09.00-10.00 |
Secure Positioning: From GPS to IoT Applications – Srdjan Capkun |
||||||
10.00-10.30 | Coffee break |
||||||
10.30-11.30 |
Blockcipher security notions – Martijn Stam |
||||||
11.30-12.30 |
Formal proofs of cryptographic primitives – Gilles Barthe |
||||||
12.30-14.00 | Lunch |
||||||
14.00-15.00 |
Authenticated Encryption (AE), part 1 – Phil Rogaway |
||||||
15.00-16.00 |
Authenticated Encryption (AE), part 2 – Phil Rogaway |
||||||
16.00-16.30 | Coffee Break |
||||||
16.30-17.30 |
Introduction to symbolic-verification methods – David Basin |
||||||
17.30-18.30 |
Open Access |
||||||
Wednesday, June 8th | |||||||
Excursion |
|||||||
Thursday, June 9th | |||||||
Asymmetric Cryptography |
Systems Security |
||||||
09.00-10.00 |
Public-key cryptography in Tor and pluggable transports – Tanja Lange |
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough – Joppe Bos |
|||||
10.00-10.30 | Coffee break |
||||||
10.30-11.30 |
Advanced constructions in Curve-based Cryptography – Benjamin Smith |
Towards Robust White-Box Cryptography: Designs, Analysis, Space Hardness, and Applications – Andrey Bogdanov |
|||||
Symmetric Cryptography |
|||||||
11.30-12.30 |
Two ways of building round functions for block ciphers – Joan Daemen |
Towards Practical ORAM – Guevara Noubir |
|||||
12.30-14.00 | Lunch |
||||||
14.00-15.00 |
Hash functions – Bart Preneel |
Towards Deployment of a Next-generation Secure Internet Architecture – Adrian Perrig |
|||||
Privacy - Part I |
TLS |
||||||
15.00-16.00 |
Traffic Analysis – Carmela Troncoso |
TLS export cipher attacks, Part 1 – Nadia Heninger |
|||||
16.00-16.30 | Coffee break |
||||||
16.30-17.30 |
Post-Snowden Crypto – Bart Preneel |
TLS export cipher attacks, Part 2 – Alex Halderman |
Training (16:30 - 19:00) Introduction to attacks on White Box Crypto – Riscure |
||||
20.00 | Banquet |
||||||
Friday, June 10th | |||||||
Side Channel |
Network Security |
||||||
09.00-10.00 |
Leakage-resilient cryptography – FX Standaert |
AE Security for SSH, part 1 – Kenny Paterson |
|||||
10.00-10.30 | Coffee break |
||||||
10.30-11.30 |
Side-channel attacks on PKC and countermeasures – Lejla Batina |
AE Security for SSH, part 2 – Kenny Paterson |
|||||
11.30-12.30 |
Timing attacks and countermeasures – Peter Schwabe |
The DNS Security mess – Dan Bernstein |
|||||
12.30-14.00 | Lunch |
||||||
Proof & Formal Methods |
Privacy - Part II |
||||||
14.00-15.00 |
Advanced talk on formal methods in Cryptography – Gilles Barthe |
Tor – Roger Dingledine |
|||||
15.00-16.00 |
Advanced talk on protocol verification – David Basin |
Code Stylometry and Programmer De-anonymization – Rachel Greenstadt |
|||||
16.00-16.45 | Coffee break and farewell |