Summer School
June 17–21, 2019

Šibenik, Croatia
   Summer School
   on real-world crypto and privacy
Programme
Sunday, June 16th
17:00-19:00
Registration
Monday, June 17th
08.00-09.00
Registration
08.50-09.00
Welcome
Introductory Talks - Part I
09.00-10.00
Introduction to the theory of secret key cryptography – Andreas Hülsing
[abstract] [slides]
10.00-10.30
Coffee break
10.30-11.30
Overview of the sponge, duplex and Farfalle constructions – Gilles Van Assche
[abstract] [slides]
11.30-12.30
Public-key cryptosystems from groups and group actions – Ben Smith
[abstract] [slides]
12.30-14.00
Lunch
14.00-15.00
Real-World AKE – Tibor Jager
[abstract] [slides]
15.00-16.00
Deep Learning for Embedded Security Evaluation – Emmanuel Prouff
[abstract] [slides]
16.00-16:30
Coffee Break
16.30-18.00
Hardware Acceleration in Cryptography – Patrick Schaumont
[abstract] [slides]
19.00-21.00
Welcome reception
Tuesday, June 18th
Introductory Talks - Part II
09.00-10.00
From Smart Cities to Smart Sex Toys: A Hitchhiker’s Security & Privacy Guide to The Galaxy of Things – Ahmad-Reza Sadeghi
[abstract]
10.00-10.30
Coffee break
10.30-11.30
Introduction to Microarchitectural Attacks – Daniel Gruss
[abstract] [slides]
SCA workshop (10:30 - 17:30, in Sibenik XI (Hotel Ivan))
Evaluating the Security of Implementations Against Side Channel Attacks – Emmanuel Prouff [slides]
11.30-12.30
Towards High-Assurance Cryptographic Systems – Karthikeyan Bhargavan
[abstract] [slides]
(i) Power analysis of degree-2 round functions [slides]
(ii) XKCP internals [slides] Gilles Van Assche
12.30-14.00
Lunch
14.00-15.00
Introduction to Privacy Preserving Computation – Mariana Raykova
[abstract] [slides]
Fault attacks on Embedded Software – Patrick Schaumont [slides]
15.00-15.30
Coffee Break
15.30-16.30
Privacy Research Paradigms in Computer Science – Seda Gürses
[abstract] [slides]
Smaller and faster public-key cryptosystems for IoT from genus-2 curves – Ben Smith [slides]
Security on the Line: Modern Curve-based Cryptography – Joost Renes [slides]
16:30-17:49
Lightning talks by (Master, PhD) students & postdocs
16:30: Mohammed B. M. Kamel: Addressing Model in DHT based Networks
16:38: Ján Jančár: JavaCard at CRoCS
16:48: Levente Kovács: Analysis of pseudorandom sequences
16:56: Muhammad Shujaat Mirza: Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
17:04: Michael Lewellen: CERES Technology
17:14: David Stainton: The Katzenpost Mix Network System
17:24: Piotr Krasnowski: Key exchange protocols over voice channels and verification using Tamarin Prover
17:34: Kacper Zujko: Improving Side Channel Analysis of XMSS
17:39: Anna Kaplan: Universally Composable and Privacy-Preserving Audit Logs Using Bulletin Board
Isogeny based cryptography implementation for FPGA – Pedro Massolino [slides]
Machine Learning and Side-channel Analysis – Stjepan Picek [slides]
Wednesday, June 19th
09:00-17:00
Excursion
Thursday, June 20th
Session I (morning)
          Session II (morning)
09.00-10.00
Updatable Encryption & Key Rotation – Anja Lehmann
[abstract] [slides]
Transient Execution Attacks – Daniel Gruss
[abstract] [slides]
Run-time attack tutorial (09:00 - 12:30) – Lucas Davi & Ahmad-Reza Sadeghi
10.00-10.30
Coffee break
10.30-11.30
Public-key 0-RTT protocols – Tibor Jager
[abstract] [slides]
Verified Cryptography for Verified Protocols – Karthikeyan Bhargavan
[abstract] [slides] [Link to GitHub]
11.30-12.30
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities – Juraj Somorovsky
[abstract] [slides]
Resource-efficient Cryptography for Ubiquitous Computing – Elif Bilge Kavun
[abstract] [slides]
12.30-14.00
Lunch
Session I (afternoon)
          Session II (afternoon)
14.00-15.00
Group Signatures - Concepts, New Advances and Applications – Anja Lehmann
[abstract] [slides]
Introduction to Profiled Side-channel Attacks – Annelie Heuser
[abstract] [slides]
Hands-on hardware tutorial (14:00 - 17:30) – Nele Mentens
15.00-15.30
Coffee break
15.30-16.30
PanORAMa: Oblivious RAM with Logarithmic Overhead – Mariana Raykova
[abstract] [slides]
Selected Topics in Web Security – Engin Kirda
[abstract]
16.30-17.30
Differential treatment of web users: Tor blocking – Sadia Afroz
[abstract] [slides]
Efail attack and its implications – Juraj Somorovsky
[abstract] [slides]
20.00
Banquet
Friday, June 21st
Session I (morning)
Session II (morning)
09.00-10.00
Differential treatment of web users: regional blocking – Sadia Afroz
[abstract] [slides]
Challenges in Real-world "Secure" Cryptographic Hardware Implementations – Elif Bilge Kavun
[abstract] [slides]
10.00-10.30
Coffee break
10.30-11.30
When foes are friends: adversarial examples as protective technologies – Carmela Troncoso
[abstract] [slides]
The need for Hardware roots of trust – Ingrid Verbauwhede
[abstract] [slides]
11.30-12.30
POTs: The revolution will not be optimized? – Seda Gürses
[abstract] [slides]
Recent advances in side-channel analysis using machine learning techniques – Annelie Heuser
[abstract] [slides]
12.30-14.00
Lunch
Session I (afternoon)
Session II (afternoon)
14.00-15.00
Advanced Malware: Attacks, Defenses, and Open Challenges – Engin Kirda
[abstract]
Simplified security arguments for hash-based signatures – Andreas Hülsing
[abstract] [slides]
15.00-16.00
Adversarial machine learning: curiosity, benefit, or threat? – Lujo Bauer
[abstract] [slides]
What makes a cipher efficient? Design choices and relevant metrics – Joan Daemen
[abstract] [slides]
16.00-16:45
Coffee break & Farewell