| Sunday, May 31st | |||||||
| 20.00-22.00 |
Welcome reception and registration |
||||||
| Monday, June 1st | |||||||
| 08.15-09.00 |
Registration and Welcome |
||||||
|
Introduction to DLog-based schemes |
|||||||
| 09.00-10.30 |
Factoring and DL - Nadia Heninger |
||||||
| 10.30-11.00 | Coffee break |
||||||
| 11.00-12.30 |
ECC - Tanja Lange |
||||||
| 12.30-14.00 |
Lunch |
||||||
|
Provable security and RWC |
|||||||
| 14.00-15.30 |
Provable security - Sebastian Faust |
||||||
| 15.30-16.00 | Coffee break |
||||||
| 16.00-17.00 |
Implementation attacks - Lejla Batina |
||||||
| 17.00-18.00 |
SHA-3 - Joan Daemen |
||||||
| Tuesday, June 2nd | |||||||
|
Implementations and Physycal Security |
|||||||
| 09.00-10.00 |
Hardware design in cryptography - Ingrid Verbauwhede |
||||||
| 10.00-11.00 |
Post-Snowden Crypto - Bart Preneel |
||||||
| 11.00-11.30 | Coffee break |
||||||
|
Selected topics in PKC and implementations |
|||||||
| 11.30-12.30 |
Public-key infrastructure - Bart Preneel |
Security Trends in Mobile Payment application - Marc Witteman |
Hands-on introduction to SCA - Riscure |
||||
| 12.30-14.00 |
Lunch |
||||||
| 14.00-15.30 |
Lattice-based crypto - Damien Stehlé |
Introduction to software implementations - Peter Schwabe |
Hands-on introduction to SCA - Riscure |
||||
| 15.30-16.00 | Coffee break |
||||||
| 16.00-17.30 |
Introduction to quantum algorithms and introduction to code-based cryptography - Daniel J. Bernstein |
Demonstrating the Power of Signal Exploration/Conditioning for SCA Demonstrating TVLA testing - Elke de Mulder |
|||||
| Wednesday, June 3rd | |||||||
| Excursion |
|||||||
| Thursday, June 4th | |||||||
|
PKC implementations |
Authentication and applications |
||||||
| 09.00-10.00 |
Software implementations of ECC - Peter Schwabe |
Authenticated encryption and the CAESAR competition - Joan Daemen |
|||||
| 10.00-11.00 |
Hardware implementations of ECC - Kazuo Sakiyama |
Authenticated key exchange - Kenny Paterson |
|||||
| 11.00-11.30 | Coffee break |
||||||
| 11.30-12.30 |
IRMA: Attribute-Based Identity Management Using Smart Cards - Gergely Alpar |
Physical layer security - Srdjan Capkun |
|||||
| 12.30-14.00 | Lunch |
||||||
|
Real-world crypto |
Hardware security and cryptanalysis |
||||||
| 14.00-15.00 |
Mallory - a threat to your mobile device? - Lynn Margaret Batten |
Parallel Cryptanalysis - Joppe Bos |
|||||
| 15.00-16.00 |
Unpicking PLAID - Jean Paul Degabriele |
Advances in FPGA security - Nele Mentens |
|||||
| 16.00-16.30 | Coffee break |
||||||
| 16.30-17.30 |
Batch NFS - Tanja Lange |
Side-channel attacks against PKC - Lejla Batina |
|||||
| 20.00 | Banquet |
||||||
| Friday, June 5th | |||||||
|
Privacy and anonymity |
Advanced topics |
Training |
|||||
| 09.30-10.30 |
Privacy and Anonymity - Claudia Diaz |
Secure masking schemes - Sebastian Faust |
Introduction to Horizontal attacks - Riscure |
||||
| 10.30-11.30 |
Tor - Jacob Appelbaum |
SIS-based constructions - Léo Ducas |
|||||
| 11.30-12.00 | Coffee break |
||||||
|
Implementation issues |
Advanced topics |
||||||
| 12.00-13.00 |
DUAL-EC: a standardized backdoor - Ruben Niederhagen |
The NTRU encryption scheme - Damien Stehlé |
|||||
| 13.00-14.30 | Lunch |
||||||
| 14.30-15.30 |
How not to generate random numbers - Nadia Heninger |
Advanced code-based cryptography - Daniel J. Bernstein |
|||||
| 15.30-16.30 |
Implementing Lattice-Based Cryptography on Embedded Devices - Thomas Pöppelman |
Hash-based signatures - Andreas Hülsing |
|||||
| 16.30-17.15 | Coffee break and farewell |
||||||