Workshop Program
Monday, 2 November 2015
08:50 | - | 09:20 | Registration | |
09:20 | - | 09:30 | Introduction and Welcome | |
09:30 | - | 10:30 | CRYPTO I | |
(i) Modeling Causality in Cryptographic Channels, Giorgia Azzurra Marson | ||||
(ii) Towards Practical and Provably Secure Lattice-Based Signatures, Nina Bindel | ||||
(iii) Notions of Deniable Message Authentication, Sogol Mazaheri | ||||
10:30 | - | 11:00 | Morning Break | |
11:00 | - | 12:30 | PRIVACY & PROTOCOLS | |
(i) Footprint scheduling for Dining-Cryptographer networks, Anna Krasnova | ||||
(ii) Attribute-based authentication and signatures with IRMA, Brinda Hampiholi | ||||
(iii) Secret-Sharing Schemes, Error-Correcting Codes and Commitments, Irene Giacomelli | ||||
12:30 | - | 14:00 | Lunch | |
14:00 | - | 15:00 | KEYNOTE TALK I | |
Smart cards to SoC: the DPA Journey, Dr. Elke De Mulder | ||||
15:00 | - | 15:30 | Afternoon Break | |
15:30 | - | 17:00 | HARDWARE IMPLEMENTATIONS | |
(i) Valiant's Universal Circuit Construction in Practice, Ágnes Kiss | ||||
(ii) Dispelling the myth: cloning the Physically Unclonable Functions (PUFs), Fatemeh Ganji | ||||
(iii) Cryptohardware design for ASIC-embeded secure applications, Erica Tena Sanchez | ||||
17:00 | - | 18:30 | Free Time | |
18:30 | - | 23:00 | Dinner at De Hemel |
Tuesday, 3 November 2015
9:30 | - | 11:00 | CRYPTO II | |
(i) Fully Homomorphic Encryption, Elena Fuentes Bongenaar | ||||
(ii) Next level crypto currency: building on top of the Blockchain, Catharina Smeets | ||||
(iii) Last Update on the CAESAR Competition and Our Candidate POET, Farzaneh Abed | ||||
11:00 | - | 11:30 | Morning Break | |
11:30 | - | 12:30 | KEYNOTE TALK II | |
Assumptions in Cryptography, Prof. Christina Brzuska | ||||
12:30 | - | 13:30 | Lunch | |
13:30 | - | 14:50 | PLENARY SESSION | |
Societal Norms and Gender by Prof. Christina Brzuska, followed by panel discussion | ||||
14:50 | - | 15:00 | Concluding Remarks |