Download the program in [pdf] format!!

Sunday 7, February 2010

Registration & Welcome Reception
18:30-20:00 Registration
19:00-20:00 Welcome Reception

Monday 8, February 2010

09:00-09:30 Registration (Coffee & Juice)
09:30-09:40 Welcome Remarks

SESSION 1: Stream Ciphers and Block Ciphers   (Chair : Jin Hong)
09:40-10:05 Cryptanalysis of the DECT Standard Cipher    [Slide]  [Video]
Karsten Nohl, Erik Tews, and Ralf-Philipp Weinmann
University of Virginia, USA, TU Darmstadt, Germany, and University of Luxembourg, Luxembourg
10:05-10:30 Improving the Generalized Feistel    [Slide]
Tomoyasu Suzaki and Kazuhiko Minematsu
NEC Corporation, Japan
10:30-10:55 Nonlinear Equivalence of Stream Ciphers    [Slide]  [Video]
Sondre Rønjom and Carlos Cid
Norwegian National Security Authority (NSM), Bærum, Norway and Royal Holloway, University of London, Egham, UK
10:55-11:20 Coffee Break

Invited Talk I   (Chair : Seokhie Hong)
11:20-12:10 The Survey of Cryptanalysis on Hash Functions    [Slide]  [Video]
Xiaoyun Wang
Department of Mathematics and System Science, Shandong University, China
12:10-13:50 Lunch

SESSION 2: RFID and Implementations   (Chair : Carlos Cid)
13:50-14:15 Lightweight Privacy Preserving Authentication for RFID Based on a Stream Cipher    [Slide]
Olivier Billet, Jonathan Etrog, and Henri Gilbert
Orange Labs, France
14:15-14:40 Fast Software AES Encryption    [Slide]
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright
EPFL, Switzerland, EPFL, Switzerland, The Cooper Union, USA, and Naval Postgraduate School, USA
14:40-15:05 Coffee Break

SESSION 3: Hash Functions I   (Chair : Jongsung Kim)
15:05-15:30 Attacking the Knudsen-Preneel Compression Functions  (*best paper award*)    [Slide]
Onur Özen, Thomas Shrimpton, and Martijn Stam
EPFL, Switzerland, Portland State University, USA, and EPFL, Switzerland
15:30-15:55 Finding Preimages of Tiger Up to 23 Steps    [Slide]
Lei Wang and Yu Sasaki
The University of Electro-Communications, Japan and NTT Corporation, Japan
15:55-16:20 Cryptanalysis of ESSENCE    [Slide]  [Video]
Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier and Thomas Peyrin
INRIA, France, Aalto University, Finland, Nagravision SA, Switzerland, INRIA, France, ENS, France, FHNW, Switzerland, and Ingenico, France
17:00-18:30 Social Event (Nanta,

Tuesday 9, February 2010

09:00-09:30 Registration (Coffee & Juice)

SESSION 4: Theory   (Chair : Thomas Shrimpton)
09:30-09:55 Domain Extension for Enhanced Target Collision-Resistant Hash Functions    [Slide]  [Video]
Ilya Mironov
Microsoft Research, Silicon Valley Campus
09:55-10:20 Security Analysis of the Mode of JH Hash Function    [Slide]  [Video]
Rishiraj Bhattacharyya, Avradip Mandal, and Mridul Nandi
Indian Statistical Institute, Kolkata, India, University of Luxembourg, Luxembourg, and National Institute of Standards and Technology and George Washington University, USA
10:20-10:45 Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships    [Slide]  [Video]
Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu
University of Wollongong, Australia
10:45-11:10 Coffee Break

SESSION 5: Message Authentication Codes   (Chair : Bart Preneel)
11:10-11:35 A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs    [Slide]
Mridul Nandi
National Institute of Standards and Technology and George Washington University, USA
11:35-12:00 How to Thwart Birthday Attacks against MACs via Small Randomness    [Slide]  [Video]
Kazuhiko Minematsu
NEC Corporation, Japan
12:00-12:25 Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited    [Slide]  [Video]
Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, and Bo Liang
Chinese Academy of Sciences, China
12:25-14:05 Lunch

SESSION 6: Hash Functions II   (Chair : Yu Sasaki)
14:05-14:30 Higher Order Differential Attack on Step-Reduced Variants of Luffa v1    [Slide]
Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, and Toshinobu Kaneko
Hitachi, Ltd., Japan, Hitachi, Ltd., Japan, Tokyo University of Science, Japan, and Tokyo University of Science, Japan
14:30-14:55 Rebound Attack on Reduced-Round Versions of the JH    [Slide]
Vincent Rijmen, Deniz Toz, and Kerem Varici
Katholieke Universiteit Leuven, Belgium

SESSION 7: Hash Function III (Short Presentations)   (Chair : Yu Sasaki)
14:55-15:10 Pseudo-cryptanalysis of the Original Blue Midnight Wish    [Slide]  [Video]
Søren S. Thomsen
DTU Mathematics, Technical University of Denmark, Denmark
15:10-15:25 Differential and Invertibility Properties of BLAKE    [Slide]
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, and Willi Meier
Nagravision SA, Switzerland, NTU, Singapore, FHNW, Switzerland, DTU, Denmark, and FHNW, Switzerland
15:25-16:00 Coffee Break
16:00-17:30 Rump Session   (Chair : Orr Dunkelman)
18:00-20:30 Gala Dinner & Social Event

Wednesday 10, February 2010

09:00-09:30 Registration (Coffee & Juice)

Invited Talk II   (Chair : Tetsu Iwata)
09:30-10:20 A Provable-Security Perspective on the Development of Hash Functions    [Slide]  [Video]
Thomas Shrimpton
Portland State University, USA
10:20-10:50 Coffee Break

SESSION 8: Cryptanalysis   (Chair : Taizo Shirai)
10:50-11:15 Rotational Cryptanalysis of ARX    [Slide]  [Video]
Dmitry Khovratovich and Ivica Nikolic
University of Luxembourg, Luxembourg
11:15-11:40 Another Look at Complementation Properties    [Slide]  [Video]
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, and Pierre-Alain Fouque
École normale supérieure, France and Weizmann Institute of Science, Israel
11:40-12:05 Super-Sbox Cryptanalysis: Improved Attacks for AES-like Permutations    [Slide]  [Video]
Henri Gilbert and Thomas Peyrin
Orange Labs, France and Ingenico, France
12:05-12:10 Closing Remarks
12:10-13:50 Lunch