Fast Software Encryption 2015IACR logo

 

 

Program FSE 2015 Istanbul

 

 

 

Sunday, 08 March 2015

  • 17:00 - 19:00: Welcome Reception - Registration - Lazzoni Hotel (Sütlüce Mah. İmrahor Caddesi, Beyoğlu - Link for Map)

 

Monday, 09 March 2015

  • 08:55 - 09:55 Registration and coffee at Istanbul Commerce University, Sütlüce Campus
  • 09:55 - 10:05 Opening Remarks
  • 10:05 - 11:20 Session I - Block Cipher Cryptanalysis I (Chair: Bart Preneel)

o    Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE [slides]

Alex Biryukov; Patrick Derbez; Léo Perrin (University of Luxembourg; University of Luxembourg; University of Luxembourg)

o    Improved Higher-Order Differential Attacks on MISTY1 [slides]

Achiya Bar-On (Bar Ilan University)

o    Meet-in-the-Middle Technique for Truncated Differential and its Applications to CLEFIA and Camellia [slides]

Leibo Li; Keting Jia; Xiaoyun Wang; Xiaoyang Dong (Shandong University; Tsinghua University; Tsinghua University; Shandong University)

  • 11:20 - 11:40 Coffee break
  • 11:40 - 12:30 Session II - Understanding Attacks (Chair: Andrey Bogdanov)

o    Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation [slides]

A. Bay; Céline Blondeau; Serge Vaudenay (EPFL; Aalto University, School of Science; EPFL)

o    Relations between Impossible, Integral and Zero-Correlation Key-Recovery Attacks [slides]

Céline Blondeau; Marine Minier (Aalto University, Finland; INSA Lyon, France)

  • 12:30 - 13:30 Invited Talk 1 (Chair: Thomas Peyrin)

o    Challenges in Lightweight Crypto Standardization

Meltem Turan Sönmez (NIST)

  • 13:30 - 14:30 Lunch
  • 14:30 - 15:45 Session III - Implementation Issues (Chair: Serge Vaudenay)

o    Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment [slides]

Cezary Glowacz; Vincent Grosso; Romain Poussier; Joachim Schueth; Francois-Xavier Standaert (T-Systems, Germany; UCL Crypto Group; UCL Crypto Group; T-Systems, Germany; UCL Crypto Group)

o    Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity [slides]

Jean-Sebastien Coron; Johan Groszschaedl; Mehdi Tibouchi; Praveen Kumar Vadnala  (University of Luxembourg; University of Luxembourg; NTT Secure Platform Laboratories, Japan; University of Luxembourg)

o    Comb To Pipeline: Fast Software Encryption Revisited [slides]

Andrey Bogdanov; Martin M. Lauridsen; Elmar Tischhauser (DTU Compute; DTU Compute; DTU Compute)

  • 15:45 - 16:05 Coffee Break
  • 16:05 - 17:20 Session IV - Block Cipher Cryptanalysis II (Chair: Orhun Kara)

o    Security of AES with a Secret S-box [slides]

Tyge Tiessen; Lars R. Knudsen; Stefan Kölbl; Martin M. Lauridsen (Technical University of Denmark; Technical University of Denmark; Technical University of Denmark; Technical University of Denmark)

o    Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE [slides]

Patrick Derbez; Léo Perrin (University of Luxembourg; University of Luxembourg)

o    Linear Distinguishers in the Key-less Setting: Application to PRESENT [slides]

Martin M. Lauridsen; Christian Rechberger  (DTU; DTU)

 

Tuesday, 10 March 2015

  • 08:50 - 10:30 Session V - Cryptanalysis of Authenticated Encryption Schemes (Chair: Dmitry Khovratovich)

o    Differential-Linear Cryptanalysis of ICEPOLE [slides]

Tao Huang; Ivan Tjuawinata; Hongjun Wu (Nanyang Technological University; Nanyang Technological University; Nanyang Technological University)

o    Cryptanalysis of JAMBU [slides]

Thomas Peyrin; Siang Meng Sim; Lei Wang; Guoyan Zhang (Nanyang Technological University; Nanyang Technological University; Nanyang Technological University; Shan Dong University)

o    Related-Key Forgeries for Proest-OTR [slides]

Christoph Dobraunig; Maria Eichlseder; Florian Mendel (IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology)

o    Practical Cryptanalysis of the Open Smart Grid Protocol [slides]

Philipp Jovanovic; Samuel Neves (University of Passau; University of Coimbra)

  • 10:30 - 10:50 Coffee break
  • 10:50 - 12:30 Session VI - Proofs (Chair: Carlos Cid)

o    Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes [slides]

Peter Gazi; Jooyoung Lee; Yannick Seurin; John Steinberger; Stefano Tessaro (IST Austria; Sejong University; ANSSI; Tsinghua University; UC Santa Barbara)

o    The Related-Key Security of Iterated Even-Mansour Ciphers [slides]

Pooya Farshim; Gordon Procter (Queen's University Belfast; Royal Holloway, University of London)

o    Security of Keyed Sponge Constructions Using a Modular Proof Approach [slides]

Elena Andreeva; Joan Daemen; Bart Mennink; Gilles Van Assche KU Leuven, Belgium; (STMicroelectronics, Belgium; KU Leuven, Belgium; STMicroelectronics, Belgium)

o    GCM Security Bounds Reconsidered [slides]

Yuichi Niwa; Keisuke Ohashi; Kazuhiko Minematsu; Tetsu Iwata (Nagoya University; Nagoya University; NEC Corporation; Nagoya University)

  • 12:30 - 13:20 Session VII - Design (Chair: Tetsu Iwata)

o    Boosting OMD for Almost Free Authentication of Associated Data [slides]

Reza Reyhanitabar; Serge Vaudenay; Damian Vizár (EPFL, Switzerland; EPFL, Switzerland; EPFL, Switzerland)

o    Optimally Secure Tweakable Blockciphers [slides]

Bart Mennink (KU Leuven, Belgium)

  • 13:20 - 14:30 Lunch
  • 14:30 - 15:45 Session VIII - Lightweight (Chair: Anne Canteaut)

o    On Lightweight Stream Ciphers with Shorter Internal States [slides]

Frederik Armknecht; Vasily Mikhalev (University of Mannheim; University of Mannheim)

o    Lightweight MDS Involution Matrices [slides]

Siang Meng Sim; Khoongming Khoo; Frédérique Oggier; Thomas Peyrin (Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore)

o    A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT [slides]

Wentao Zhang; Zhenzhen Bao; Vincent Rijmen; Meicheng Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China)

  • 15:45 - 16:05 Coffee Break
  • 16:05 - 17:05 Rump Session (Chair: Daniel J. Bernstein and Tanja Lange)
  • 17:30 - 19:00 Boat Tour in Bosphorous
  • 19:00 - 21:00 Workshop Banquet
  • 21:30 - 23:00 Return Boat Tour (Eminönü)

 

Wednesday, 11 March 2015

 

  • 10:30 - 11:45 Session IX - Cryptanalysis of Hash Functions and Stream Ciphers (Chair: Christian Rechberger)

o    Rotational Cryptanalysis of ARX Revisited [slides]

Dmitry Khovratovich; Ivica Nikolić; Josef Pieprzyk; Przemyslaw Sokolowski; Ron Steinfeld (University of Luxembourg, Luxembourg; Nanyang Technological University, Singapore; Queensland University of Technology, Australia; Adam Mickiewicz University, Poland; Monash University, Clayton, Australia)

o    Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation [slides]

Jérémy Jean; Ivica Nikolić (Nanyang Technological University; Nanyang Technological University)

o    New Linear Correlations related to State Information of RC4 PRGA using IV in WPA [slides]

Ryoma Ito; Atsuko Miyaji (Japan Advanced Institute of Science and Technology; Japan Advanced Institute of Science and Technology)

  • 11:45 - 12:05 Coffee Break
  • 12:05 - 12:30 Session X - Mass Surveillance (Chair: Gregor Leander)

o    A More Cautious Approach to Security Against Mass Surveillance [slides]

Jean Paul Degabriele; Pooya Farshim; Bertram Poettering Royal Holloway, (University of London, UK; Queen's University Belfast, UK; Ruhr University Bochum, Germany)

  • 12:30 - 13:30 Invited Talk II (Chair: Gregor Leander)

o    Conflicting roles: the NSA and cryptography 

Jacob Appelbaum (Tor Project)

  • 13:30 - 14:30 Lunch and workshop closing