| 
 
Workshop ProgramMonday, 2 November 2015
 
| 08:50 | - | 09:20 |  | Registration |  |  |  |  |  |  |  |  |  |  |  |  |  | 09:20 | - | 09:30 |  | Introduction and Welcome |  |  |  |  |  |  |  |  |  |  |  |  |  | 09:30 | - | 10:30 |  | CRYPTO I |  |  |  |  |  |  |  |  |  |  |  | (i) Modeling Causality in Cryptographic Channels, Giorgia Azzurra Marson |  |  |  |  |  | (ii) Towards Practical and Provably Secure Lattice-Based Signatures, Nina Bindel |  |  |  |  |  | (iii) Notions of Deniable Message Authentication, Sogol Mazaheri |  |  |  |  |  |  |  |  |  |  |  |  |  | 10:30 | - | 11:00 |  | Morning Break |  |  |  |  |  |  |  |  |  |  |  |  |  | 11:00 | - | 12:30 |  | PRIVACY & PROTOCOLS |  |  |  |  |  |  |  |  |  |  |  | (i) Footprint scheduling for Dining-Cryptographer networks, Anna Krasnova |  |  |  |  |  | (ii) Attribute-based authentication and signatures with IRMA, Brinda Hampiholi |  |  |  |  |  | (iii) Secret-Sharing Schemes, Error-Correcting Codes and Commitments, Irene Giacomelli |  |  |  |  |  |  |  |  |  |  |  |  |  | 12:30 | - | 14:00 |  | Lunch |  |  |  |  |  |  |  |  |  |  |  |  |  | 14:00 | - | 15:00 |  | KEYNOTE TALK I |  |  |  |  |  | Smart cards to SoC: the DPA Journey, Dr. Elke De Mulder |  |  |  |  |  |  |  |  |  |  |  |  |  | 15:00 | - | 15:30 |  | Afternoon Break |  |  |  |  |  |  |  |  |  |  |  |  |  | 15:30 | - | 17:00 |  | HARDWARE IMPLEMENTATIONS |  |  |  |  |  |  |  |  |  |  |  | (i) Valiant's Universal Circuit Construction in Practice, Ágnes Kiss |  |  |  |  |  | (ii) Dispelling the myth: cloning the Physically Unclonable Functions (PUFs), Fatemeh Ganji |  |  |  |  |  | (iii) Cryptohardware design for ASIC-embeded secure applications, Erica Tena Sanchez |  |  |  |  |  |  |  |  |  |  |  |  |  | 17:00 | - | 18:30 |  | Free Time |  |  |  |  |  |  |  |  |  |  |  |  |  | 18:30 | - | 23:00 |  | Dinner at De Hemel |  Tuesday, 3 November 2015
 
| 9:30 | - | 11:00 |  | CRYPTO II |  |  |  |  |  |  |  |  |  |  |  | (i) Fully Homomorphic Encryption, Elena Fuentes Bongenaar |  |  |  |  |  | (ii) Next level crypto currency: building on top of the Blockchain, Catharina Smeets |  |  |  |  |  | (iii) Last Update on the CAESAR Competition and Our Candidate POET, Farzaneh Abed |  |  |  |  |  |  |  |  |  |  |  |  |  | 11:00 | - | 11:30 |  | Morning Break |  |  |  |  |  |  |  |  |  |  |  |  |  | 11:30 | - | 12:30 |  | KEYNOTE TALK II |  |  |  |  |  | Assumptions in Cryptography, Prof. Christina Brzuska |  |  |  |  |  |  |  |  |  |  |  |  |  | 12:30 | - | 13:30 |  | Lunch |  |  |  |  |  |  |  |  |  |  |  |  |  | 13:30 | - | 14:50 |  | PLENARY SESSION |  |  |  |  |  | Societal Norms and Gender by Prof. Christina Brzuska, followed by panel discussion |  |  |  |  |  |  |  |  |  |  |  |  |  | 14:50 | - | 15:00 |  | Concluding Remarks |  |