| 9:00 - 9:10 | Opening |
| 9:10 - 10:10 | Session: SHA Collisions - Chair: Christian Rechberger |
| | Collisions for Step-Reduced SHA-256 |
| | Ivica Nikolic and Alex Biryukov |
| | Collisions on SHA-0 in One Hour |
| | Stéphane Manuel and Thomas Peyrin |
| 10:10 - 10:40 | Coffee break |
| 10:40 - 11:30 | Invited Talk - Chair: Bart Preneel |
| | Hash functions and SHA-3 |
| | Lars Knudsen |
| 11:30 - 12:30 | Session: New Hash Function Designs - Chair: Bart Preneel |
| | The Hash Function Family LAKE |
| | Jean-Philippe Aumasson, Willi Meier, and Raphael C.-W. Phan |
| | SWIFFT: A Modest Proposal for FFT Hashing |
| | Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, and Alon Rosen |
| 12:30 - 14:00 | Lunch |
| 14:00 - 15:30 | Session: Block Cipher Cryptanalysis I - Chair: Pascal Junod |
| | A Unified Approach to Related-Key Attacks |
| | Eli Biham, Orr Dunkelman, and Nathan Keller |
| | Algebraic and Slide Attacks on KeeLoq |
| | Nicolas T. Courtois, Gregory V. Bard, and David Wagner |
| | A Meet-in-the-Middle Attack on 8-Round AES |
| | Huseyin Demirci and Ali Aydin Selçuk (presented by Orhun Kara) |
| 15:30 -16:00 | Coffee break |
| 16:00 - 17:30 | Session: Implementation Aspects - Chair: Tanja Lange |
| | Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis |
| | Matthieu Rivain, Emmanuelle Dottax, and Emmanuel Prouff |
| | SQUASH - a New MAC With Provable Security Properties for Highly Constrained Devices Such As RFID Tags |
| | Adi Shamir |
| | (Short talk) Differential Fault Analysis of Trivium |
| | Michal Hojsik and Bohuslav Rudolf |
| | (Short talk) Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation |
| | Yedidya Hilewitz, Yiqun Lisa Yin, and Ruby B. Lee |
| 9:00 - 10:30 | Session: Hash Function Cryptanalysis I - Chair: Stefan Lucks |
| | Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL |
| | Eunjin Lee, Jongsung Kim, Donghoon Chang, Jaechul Sung, and Seokhie Hong |
| | Cryptanalysis of LASH |
| | Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Guo Jian, Ling San, and Huaxiong Wang |
| | A (Second) Preimage Attack on the GOST Hash Function |
| | Florian Mendel, Norbert Pramstaller, and Christian Rechberger |
| 10:30 - 11:00 | Coffee break |
| 11:00 - 12:30 | Session: Stream Cipher Cryptanalysis I - Chair: Willi Meier |
| | Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator |
| | Blandine Debraize and Louis Goubin |
| | New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 |
| | Subhamoy Maitra and Goutam Paul |
| | Efficient Reconstruction of RC4 Keys from Internal States |
| | Eli Biham and Yaniv Carmeli |
| 12:30 - 14:00 | Lunch |
| 14:00 - 15:30 | Session: Security Bounds - Chair: Tetsu Iwata |
| | An Improved Security Bound for HCTR |
| | Debrup Chakraborty and Mridul Nandi |
| | How to Encrypt with a Malicious Random Number Generator |
| | Seny Kamara and Jonathan Katz |
| | A One-Pass Mode of Operation for Deterministic Message Authentication: Security beyond the Birthday Barrier |
| | Kan Yasuda |
| 15:30 - 16:00 | Coffee break |
| 16:00 - 16:45 | Session: Entropy - Chair: Louis Granboulan |
| | Post-Processing Functions for a Biased Physical Random Number Generator |
| | Patrick Lacharme |
| | (Short talk) Entropy of the Internal State of an FCSR in Galois Representation |
| | Andrea Röck |
| 16:45 - 17:45 | Rump Session - Chair: Dan Bernstein [Call for submissions] |
| 9:00 - 10:30 | Session: Block Cipher Cryptanalysis II - Chair: Mitsuru Matsui |
| | Bit-Pattern Based Integral Attack |
| | Muhammad Reza Z'aba, Haavard Raddum, Matt Henricksen, and Ed Dawson |
| | Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent |
| | Baudoin Collard, François-Xavier Standaert, and Jean-Jacques Quisquater |
| | Impossible Differential Cryptanalysis of CLEFIA |
| | Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, and Hiroyasu Kubo |
| 10:30 - 11:00 | Coffee break |
| 11:00 - 12:30 | Session: Hash Function Cryptanalysis II - Chair: Alex Biryukov |
| | MD4 is Not One-Way |
| | Gaëtan Leurent |
| | Improved Indifferentiability Security Analysis of chopMD Hash Function |
| | Donghoon Chang and Mridul Nandi |
| | New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru |
| | Eli Biham |
| 12:30 - 14:00 | Lunch |
| 14:00 - 14:45 | Session: Stream Cipher Cryptanalysis II - Chair: Orr Dunkelman |
| | (Short talk) Some Remarks on the Salsa20 Core Function |
| | Julio Cesar Hernandez-Castro, Juan M. E.Tapiador, and Jean-Jacques Quisquater |
| | New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba |
| | Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, and Christian Rechberger |
| 14:45 | Closing |