Workshop Program
Monday, 2 November 2015
| 08:50 | - | 09:20 | | Registration |
| | | | | |
| | | | | |
| 09:20 | - | 09:30 | | Introduction and Welcome |
| | | | | |
| | | | | |
| 09:30 | - | 10:30 | | CRYPTO I |
| | | | | |
| | | | | (i) Modeling Causality in Cryptographic Channels, Giorgia Azzurra Marson |
| | | | | (ii) Towards Practical and Provably Secure Lattice-Based Signatures, Nina Bindel |
| | | | | (iii) Notions of Deniable Message Authentication, Sogol Mazaheri |
| | | | | |
| | | | | |
| 10:30 | - | 11:00 | | Morning Break |
| | | | | |
| | | | | |
| 11:00 | - | 12:30 | | PRIVACY & PROTOCOLS |
| | | | | |
| | | | | (i) Footprint scheduling for Dining-Cryptographer networks, Anna Krasnova |
| | | | | (ii) Attribute-based authentication and signatures with IRMA, Brinda Hampiholi |
| | | | | (iii) Secret-Sharing Schemes, Error-Correcting Codes and Commitments, Irene Giacomelli |
| | | | | |
| | | | | |
| 12:30 | - | 14:00 | | Lunch |
| | | | | |
| | | | | |
| 14:00 | - | 15:00 | | KEYNOTE TALK I |
| | | | | Smart cards to SoC: the DPA Journey, Dr. Elke De Mulder |
| | | | | |
| | | | | |
| 15:00 | - | 15:30 | | Afternoon Break |
| | | | | |
| | | | | |
| 15:30 | - | 17:00 | | HARDWARE IMPLEMENTATIONS |
| | | | | |
| | | | | (i) Valiant's Universal Circuit Construction in Practice, Ágnes Kiss |
| | | | | (ii) Dispelling the myth: cloning the Physically Unclonable Functions (PUFs), Fatemeh Ganji |
| | | | | (iii) Cryptohardware design for ASIC-embeded secure applications, Erica Tena Sanchez |
| | | | | |
| | | | | |
| 17:00 | - | 18:30 | | Free Time |
| | | | | |
| | | | | |
| 18:30 | - | 23:00 | | Dinner at De Hemel |
Tuesday, 3 November 2015
| 9:30 | - | 11:00 | | CRYPTO II |
| | | | | |
| | | | | (i) Fully Homomorphic Encryption, Elena Fuentes Bongenaar |
| | | | | (ii) Next level crypto currency: building on top of the Blockchain, Catharina Smeets |
| | | | | (iii) Last Update on the CAESAR Competition and Our Candidate POET, Farzaneh Abed |
| | | | | |
| | | | | |
| 11:00 | - | 11:30 | | Morning Break |
| | | | | |
| | | | | |
| 11:30 | - | 12:30 | | KEYNOTE TALK II |
| | | | | Assumptions in Cryptography, Prof. Christina Brzuska |
| | | | | |
| | | | | |
| 12:30 | - | 13:30 | | Lunch |
| | | | | |
| | | | | |
| 13:30 | - | 14:50 | | PLENARY SESSION |
| | | | | Societal Norms and Gender by Prof. Christina Brzuska, followed by panel discussion |
| | | | | |
| | | | | |
| 14:50 | - | 15:00 | | Concluding Remarks |
|