Program

Program Arctic Crypt 2016

Monday, July 18

  • 8:50 – 9:00 Welcoming remarks

Session 1: Codes and stream ciphers (chair: Tor Helleseth)

  • 9:00 – 10:00 Thomas Johansson (Invited Talk). Some new results on QC-MDPC
  • 10:00 – 11:00 Willi Meier (Invited Talk). Stream Ciphers – A Perspective

11:00 – 11:30 Coffee Break

Session 2: Symmetric cryptology I (chair: Thomas Johansson)

  • 11: 30 – 12:00 Valerie Nachef, Jacques Patarin and Emmanuel Volte. Generic Attacks with Standard Deviation Analysis on A-Feistel Schemes
  • 12:00 – 12:30 Christian Forler, Eik List, Stefan Lucks and Jakob Wenzel. POEx: A Beyond-Birthday-Bound-Secure On-Line Cipher

12:30 – 14:00 Lunch

Session 3: Homomorphic encryption (chair: Eike Kiltz)

  • 14:00 – 14:30 Sonia Bogos, John Gaspoz and Serge Vaudenay. Analysis of a Homomorphic Encryption Scheme
  • 14:30 – 15:00 Gizem Çetin, Yarkın Doröz, Berk Sunar and William Martin. Arithmetic Using Word-wise Homomorphic Encryption

15:00 – 15:30 Coffee Break

 

Session 4: Privacy-friendly protocols (chair: Øyvind Ytrehus)

  • 15:30 – 16:00 Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy and David Wu. Function-Hiding Inner Product Encryption is Practical
  • 16:00 – 16:30 Arman Fazeli, Alexander Vardy and Eitan Yaakobi. Private Information Retrieval without Storage Overhead: Coding Instead of Replication

Session 5: Midnight lectures (July 18/19) (chair: Bart Preneel)

  • 23:00 – 00:00 Ronald R. Rivest (Invited Talk). Symmetric Encryption based on Keyrings and Error Correction
  • 00:00 – 01:00 Adi Shamir (Invited Talk). How Can Drunk Cryptographers Locate Polar Bears

Tuesday, July 19

Session 6: Authenticated encryption (chair: Greg Rose)

  • 10:00 – 11:00 Joan Daemen (Invited Talk). Generic security of full-state keyed duplex

11:00 – 11:30 Coffee Break

Session 7: Symmetric cryptology II (chair: Willi Meier)

  • 11:30 – 12:00 Greg Rose. KISS: A Bit Too Simple
  • 12:00 – 12:30 Tomas Fabsic, Otokar Grosek, Karol Nemoga and Pavol Zajac. On generating invertible circulant binary matrices with a prescribed number of ones

12:30 – 14:00 Lunch

Session 8: Postquantum crypto (chair: Adi Shamir)

  • 14:00 – 15:00 Dan Bernstein (Invited Talk). NTRU Prime

15:00 – 15:30 Coffee Break

Session 9: Efficient implementations and quantum crypto (chair: Dan Bernstein)

  • 15:30 – 16:00 Michael Scott. Missing a trick: Karatsuba revisited
  • 16:00 – 16:30 Houda Ferradi, Rémi Géraud, Diana Maimut, Naccache David and Hang Zhou. Backtracking-Assisted Multiplication
  • 16:30 – 17:00 Eric Chitambar, Ben Fortescue and Min-Hsiu Hsieh. Quantum Versus Classical Advantages in Secret Key Distillation (and Their Links to Quantum Entanglement)

Wednesday, July 20

08:30 – 19:30 Full day sightseeing

Thursday, July 21

Session 10: Public key cryptography: old and new (chair: Michael Scott)

  • 9:00 – 10:00 Eike Kiltz (Invited Talk). On the provable security of (EC)DSA signatures
  • 10:00 – 11:00 Tanja Lange (Invited Talk). Post-quantum crypto and side-channel attacks – getting ready for the real world

11:00 – 11:30 Coffee Break

Session 11: Digital signatures (chair: Tanja Lange)

  • 11:30 – 12:00 Kamil Kluczniak, Lucjan Hanzlik and Miroslaw Kutylowski. Ad-Hoc-Domain Signatures for Personal eID Documents
  • 12:00 – 12:30 Marie-Sarah Lacharité. Security of BLS and BGLS signatures in a multi-user setting

13:00 – 14:00 Lunch

Session 12: Side channel attacks (chair: Christian Rechberger)

  • 14:00 – 14:30 Eloi de Cherisey, Sylvain Guilley, Annelie Heuser and Olivier Rioul. On the Optimality and Practicability of Mutual Information Analysis in Some Scenarios
  • 14:30 – 15:00 Yuval Yarom, Daniel Genkin and Nadia Heninger. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA

15:00 – 15:30 Coffee Break

Session 13: Symmetric cryptology III (chair: Gregor Leander)

  • 15:30 – 16:00 Shahram Rasoolzadeh and Håvard Raddum. Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
  • 16:00 – 16:30 Tingting Cui, Huaifeng Chen, Long Wen and Meiqin Wang. Statistic Integral Attack on CAST-256 and IDEA
  • 16:30 – 17:00 Geong Sen Poh, Moesfa Soeheila Mohamad and Ji-Jian Chin, Searchable Symmetric Encryption over Multiple Servers

19:00 – 22:30 Banquet, Restaurant Nansen in Hotel Radisson

Friday, July 22

Session 14: Block ciphers (chair: Joan Daemen)

  • 9:00 – 10:00 Christian Rechberger (Invited Talk). Symmetric Cryptography for New Applications

Session 15: Chaining and sharing (chair: Nadia Henninger )

  • 10:00– 10:30 Cecile Pierrot and Benjamin Wesolowski. Malleability of the blockchain’s entropy
  • 10:30 – 11:00 Brett Hemenway and Rafail Ostrovsky. Efficient Robust Secret Sharing from Expander Graphs

 11:00 – 11:30 Coffee Break

Session 16: Block ciphers (chair: Joan Daemen)

  • 11:30 – 12:30 Gregor Leander (Invited Talk). Structural Attacks on Block Ciphers

12:30 – 14:00 Lunch