CrossFyre 2015
2 - 3 November 2015
Nijmegen - Netherlands


                                     

Workshop Program


Monday, 2 November 2015

    08:50-09:20 Registration
    09:20-09:30 Introduction and Welcome
    09:30-10:30 CRYPTO I
    (i) Modeling Causality in Cryptographic Channels, Giorgia Azzurra Marson
    (ii) Towards Practical and Provably Secure Lattice-Based Signatures, Nina Bindel
    (iii) Notions of Deniable Message Authentication, Sogol Mazaheri
    10:30-11:00 Morning Break
    11:00-12:30 PRIVACY & PROTOCOLS
    (i) Footprint scheduling for Dining-Cryptographer networks, Anna Krasnova
    (ii) Attribute-based authentication and signatures with IRMA, Brinda Hampiholi
    (iii) Secret-Sharing Schemes, Error-Correcting Codes and Commitments, Irene Giacomelli
    12:30-14:00 Lunch
    14:00-15:00 KEYNOTE TALK I
    Smart cards to SoC: the DPA Journey, Dr. Elke De Mulder
    15:00-15:30 Afternoon Break
    15:30-17:00 HARDWARE IMPLEMENTATIONS
    (i) Valiant's Universal Circuit Construction in Practice, Ágnes Kiss
    (ii) Dispelling the myth: cloning the Physically Unclonable Functions (PUFs), Fatemeh Ganji
    (iii) Cryptohardware design for ASIC-embeded secure applications, Erica Tena Sanchez
    17:00-18:30 Free Time
    18:30-23:00 Dinner at De Hemel

Tuesday, 3 November 2015

    9:30-11:00 CRYPTO II
    (i) Fully Homomorphic Encryption, Elena Fuentes Bongenaar
    (ii) Next level crypto currency: building on top of the Blockchain, Catharina Smeets
    (iii) Last Update on the CAESAR Competition and Our Candidate POET, Farzaneh Abed
    11:00-11:30 Morning Break
    11:30-12:30 KEYNOTE TALK II
    Assumptions in Cryptography, Prof. Christina Brzuska
    12:30-13:30 Lunch
    13:30-14:50 PLENARY SESSION
    Societal Norms and Gender by Prof. Christina Brzuska, followed by panel discussion
    14:50-15:00 Concluding Remarks


© 2015 iCIS, RU
Last modified on 22/10/2015