PDF version of the program can be found here.
Monday, September 1st
08:30 – 09:00 | Registration |
09:00 – 09:15 | Opening Remarks |
09:15 – 10:15 | Invited Talk: Guido Marco BERTONI, Permutation-based encryption for lightweight applications. |
10:15 – 10:30 | Coffee Break |
Session I: Efficient Implementations and designs | |
10:30 – 11:00 | Douglas Shors, Louis Wingers, Ray Beaulieu, Stefan Treatman-Clark, Bryan Weeks and Jason Smith. Implementation and Performance of the SIMON and SPECK Lightweight Block Ciphers on AVR 8-bit Microcontrollers. |
11:00 – 11:30 | Meltem Sonmez Turan and Rene Peralta. The Multiplicative Complexity of Boolean Functions on Four and Five Variables. |
11:30 – 12:00 | Coffee Break |
12:00 – 12:30 | Ege Gulcan, Aydin Aysu and Patrick Schaumont. A Flexible and Compact Hardware Architecture for the SIMON Block Cipher. |
12:30 – 13:00 | Mitsuru Matsui and Yumiko Murakami. AES Smaller Than S-box – Minimalism in Software Design on Low End Microcontrollers. |
13:00 – 14:00 | Lunch |
14:00 – 15:00 | Invited Talk: Tolga ACAR, Selecting and Deploying Elliptic Curves in Security Protocols |
15:00 – 15:30 | Coffee Break |
Session II: Attacks | |
15:30 – 16:00 | Cihangir Tezcan and Ferruh Özbudak. Differential Factors: Improved Attacks on SERPENT. |
16:00 – 16:30 | Fabrizio De Santis, Oscar M. Guillen, Ermin Sakic and Georg Sigl. Ciphertext-Only Fault Attacks on PRESENT. |
17:00 – 19:00 | Bosphorus tour. Boat will pick us up from the dock close to the venue building. |
19:30 – 22:00 | Dinner at Cemile Sultan Korusu |
22:30 | Water taxi will pick up guests from Kandilli and drop them off at Eminönü |
Tuesday, September 2nd
9:00 – 10:00 | Invited Talk: Johann Heyszl, High-Resolution Magnetic Field Side-Channels and their Affect on Cryptographic Implementations. |
10:00 – 10:15 | Coffee Break |
Session III: Attacks (Continued) | |
10:15 – 10:45 | Rusydi H. Makarim and Cihangir Tezcan. Relating Undisturbed Bits to Other Properties of Substitution Boxes. |
10:45 – 11:15 | Riham Altawy and Amr Youssef. Differential sieving for 2-step matching meet-in-the-middle attack with application to LBlock. |
11:15 – 11:45 | Coffee Break |
11:45 – 12:15 | Ling Song, Lei Hu, Bingke Ma and Danping Shi. Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers. |
Session IV: Protocols | |
12:15- 12:45 | Daisuke Moriyama. A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. |
12:45 – 13:00 | Closing Remarks |
13:00 – 14:00 | Lunch |