January 31 - February 1, 2007, Ruhr University Bochum, Germany
Workshop Program (preliminary) [pdf]
| Tuesday, January 30th | |
| Time | Event |
| 19:00 - 22:00 | Registration and Reception at the Park Inn Hotel |
| Wednesday, January 31th | |
| Time | Event |
| 08:15 | Registration |
| Cryptanalysis I | |
| 09:10-9:30 | Two Trivial Attacks on Trivium Alexander Maximov and Alex Biryukov |
| 09:30 | Some Thoughts on Trivium Steve Babbage |
| 09:45-10:00 | Linear Approximations for 2-round Trivium Meltem Sönmez Turan and Orhun Kara |
| 10:00-10:20 | Cryptanalysis of Hermes8F Steve Babbage, Carlos Cid, Norbert Pramstaller and Havard Raddum |
| 10:20-10:40 | Differential Cryptanalysis of Salsa20/8 Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki and Hiroki Nakashima |
| Coffee Break | |
| Cryptanalysis II | |
| 11:00-11:20 | Attacking the Filter Generator over GF(2^m) Sondre Rønjom and Tor Helleseth |
| 11:20-11:35 | Assessing the Security of Key Length Iain Devlin and Alan Purvis |
| 11:35-11:50 | A Note on Distinguishing Attacks Håkan Englund, Martin Hell and Thomas Johansson |
| 11:50-12:10 | Differential Power Analysis of Stream Ciphers Wieland Fischer, Berndt M. Gammel, Oliver Kniffler and Joachim Velten |
| Lunch | |
| Software performance | |
| 14:00-14:15 | eSTREAM update on software performance Christophe De Cannière |
| 14:15:14:30 | Cycle counts for authenticated encryption Daniel J. Bernstein |
| 14:30-14:45 | Studying hardware/software codesign for stream ciphers Patrick Schaumont and Ingrid Verbauwhede |
| 14:45-15:05 | Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust and Christof Paar |
| 15:05-15:20 | Throughput/code size tradeoff for stream ciphers Cédric Lauradoux |
| Coffee Break | |
| Cryptanalysis III | |
| 15:45-16:05 | Cryptanalysis of Achterbahn-128/80 Marķa Naya Plasencia |
| 16:05-16:20 | Achterbahn-128/80: Design and Analysis Berndt M. Gammel, Rainer Goettfert and Oliver Kniffler |
| 16:20-16:40 | Overtaking VEST Antoine Joux and Jean-René Reinhard |
| 16:40-16:55 | On the security of FCSR-based pseudorandom generators François Arnault and Thierry P. Berger and Marine Minier |
| 19:30 | Dinner at the Livingroom |
| Thursday, February 1st | |
| Time | Event |
| Hardware performance | |
| Registration desk opens | |
| 09:00-09:20 | Hardware results for selected stream cipher candidates T. Good and M. Benaissa |
| 09:20-09:40 | FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile Philippe Bulens, Kassem Kalach, François-Xavier Standaert and Jean-Jacques Quisquater |
| 09:40-10:00 | Hardware evaluation of eSTREAM Candidates: Grain, Lex, Mickey128, Salsa20 and Trivium Marcin Rogawski |
| 10:00-10:20 | Comparison of hardware performance of selected Phase II eSTREAM candidates Kris Gaj, Gabriel Southern and Ramakrishna Bachimanchi |
| 10:20-10:40 | Comparison of Low-Power Implementations of Trivium and Grain Martin Feldhofer |
| Coffee Break | |
| Designs and theory | |
| 11:00-11:15 | CryptMT Stream Cipher Version 3 Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura and Mariko Hagita |
| 11:15-11:35 | A Word-Oriented Stream Cipher Using Clock Control Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai |
| 11:35-11:55 | MV3: A new word based stream cipher using rapid mixing and revolving buffers Nathan Keller, Stephen D. Miller, Ilya Mironov and Ramarathnam Venkatesan |
| 11:55-12:10 | Adding MAC functionality to Edon80 Danilo Gligoroski and Svein Johan Knapskog |
| 12:10-12:25 | A Note on Algebraic Properties of Quasigroups in Edon80 Milan Vojvoda, Marek Sýs and Matúš Jókay |
| Lunch | |
| Cryptanalysis IV | |
| 14:00-14:20 | On a bias of Rabbit Jean-Philippe Aumasson |
| 14:20-14:40 | Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel |
| 14:40-14:55 | How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado and Masakatu Morii |
| Rump session | |
| 14:55-15:20 | Rump session |
| Coffee Break | |
| Discussion | |
| 15:45-17:00 | Discussion on IP, performance, security requirements, eSTREAM process, others |
| 17:00-17:05 | Closing remarks |
