08:00 - 17:00 |
Registration |
08:50 - 09:00 |
Opening Remarks |
09:00 - 09:50 |
Technical session 1: Cryptology and Coding Theory
Session Chair: Huaxiong Wang |
|
S1-1 |
Solving LPN Using Covering Codes 
Qian Guo; Thomas Johansson; Carl Löndahl |
S1-2 |
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form 
Jean-Charles Faugère; Ludovic Perret; Frédéric de Portzamparc |
09:50 - 10:40 |
Technical session 2: New Proposals
Session Chair: Serge Vaudenay |
|
S2-1 |
Bivariate Polynomials Modulo Composites and their Applications 
Dan Boneh; Henry Corrigan-Gibbs |
S2-2 |
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key 
Alex Biryukov; Charles Bouillaguet; Dmitry Khovratovich |
10:40 - 11:10 |
Coffee Break |
11:10 - 12:25 |
Technical session 3: Authenticated Encryption
Session Chair: Thomas Peyrin |
|
S3-1 |
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes 
Philipp Jovanovic; Atul Luykx; Bart Mennink |
S3-2 |
How to Securely Release Unverified Plaintext in Authenticated Encryption 
Elena Andreeva; Andrey Bogdanov; Atul Luykx; Bart Mennink; Nicky Mouha; Kan Yasuda |
S3-3 |
Forging Attacks on two Authenticated Encryption Schemes COBRA and POET
Mridul Nandi |
12:25 - 14:00 |
Lunch @ Market Café, 1F |
14:00 - 15:40 |
Technical session 4: Symmetric Key Cryptanalysis
Session Chair: Itai Dinur |
|
S4-1 |
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami; San Ling; Ivica Nikolić; Josef Pieprzyk; Huaxiong Wang |
S4-2 |
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers 
Siwei Sun; Lei Hu; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Ling Song |
S4-3 |
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon 
Christina Boura; María Naya-Plasencia; Valentin Suder |
S4-4 |
A Simplified Representation of AES
Henri Gilbert |
15:40 - 16:10 |
Coffee Break |
16:10 - 17:50 |
Technical session 5: Side Channel Analysis I
Session Chair: Mitsuru Matsui |
|
S5-1 |
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
Jake Longo; Daniel P. Martin; Elisabeth Oswald; Daniel Page; Martijn Stam; Michael J. Tunstall |
S5-2 |
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer 
Luke Mather; Elisabeth Oswald; Carolyn Whitnall |
S5-3 |
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias 
Diego F. Aranha; Pierre-Alain Fouque; Benoît Gérard; Jean-Gabriel Kammerer; Mehdi Tibouchi; Jean-Christophe Zapalowicz |
S5-4 |
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon; Benoît Gérard; François-Xavier Standaert |
18:00 - 20:00 |
AsiaCrypt Steering Committee Meeting @ Union Hall, 2F |