Saturday 29 April 2017 |
08:00 |
Registration
|
08:00 |
|
|
|
|
08:30 |
Registration
|
08:30 |
Registration
|
08:30 |
|
|
09:00 |
Halpin, Piekarska: "Overview of Security and Privacy on Blockchain Workshop"
|
09:00 |
09:00 |
Barthe: "Programming language methods for cryptography"
|
09:00 |
Quisquater: "Introduction to cataCRYPT (opening remarks)"
|
09:00 |
|
09:05 |
Quisquater: "Blueprints for a real quantum computer"
|
09:05 |
|
09:10 |
Back: "Research Challenges and Directions of Development for Future Bitcoin Solutions"
|
09:10 |
|
09:15 |
Cremers: "Tamarin Prover Tutorial: initial lecture"
|
09:15 |
09:30 |
Mosca: "The urgency of quantum-safe cryptography"
|
09:30 |
09:45 |
Cortier: "Models and Tools for Electronic Voting protocols"
|
09:45 |
Lange: "Quantum cryptanalysis – the catastrophe we know and don't know"
|
09:45 |
10:15 |
Lyubashevsky: "Standardizing Lattice Cryptography"
|
10:15 |
10:30 |
Coffee break
|
10:30 |
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
11:00 |
Khovratovich, Law: "BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace"
|
11:00 |
Ducas: "Short Stickelberger Class Relations and application to Ideal-SVP"
|
11:00 |
Schwabe: "Two approaches to verifiying high-speed ECC software"
|
11:00 |
Cremers: "Tamarin Prover Tutorial: hands-on"
|
11:00 |
Geneste: "Are quantum computers more powerful than traditional ones?"
|
11:00 |
11:30 |
Borge, Kokoris-Kogias, Jovanovic, Gasser, Gailly, Ford: "Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies"
|
11:30 |
11:45 |
|
11:45 |
12:00 |
Bunz, Goldfeder, Bonneau: "Proofs-of-delay and randomness beacons in Ethereum"
|
12:00 |
|
12:00 |
|
12:00 |
|
12:00 |
|
12:00 |
12:30 |
|
12:30 |
|
|
|
|
14:00 |
Miller, Bentov: "Zero-Collateral Lotteries in Bitcoin and Ethereum"
|
14:00 |
Schaffner: "Quantum Cryptography Beyond Quantum Key Distribution"
|
14:00 |
Barghavan: "HACL*: Writing and verifying a cryptographic library in F*"
|
14:00 |
Cremers: "Tamarin Prover Tutorial: advanced lecture"
|
14:00 |
Panel with Desmedt, Courtois, Kim, Quisquater: "How to promote funding for cryptanalysis?"
|
14:00 |
14:30 |
Kopp, Mödinger, Hauck, Kargl, Bösch: "Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives"
|
14:30 |
14:30 |
Protzenko: "KreMLin, a secure compiler from F* to C"
|
14:30 |
14:45 |
Leurent: "Breaking Symmetric Cryptosystems Using Quantum Algorithms"
|
14:45 |
15:00 |
Möser, Boehme: "Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques"
|
15:00 |
15:00 |
Fournet: "Type-based cryptographic verification in F*"
|
15:00 |
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
16:00 |
Sato, Matsuo: "Long-term public blockchain: Resilience against Compromise of Underlying Cryptography"
|
16:00 |
Unruh: "Post-quantum security of hash functions"
|
16:00 |
Blanchet: "CryptoVerif:state of the art, perspectives, and relations to other tools"
|
16:00 |
Cremers: "Tamarin Prover Tutorial: hands-on"
|
16:00 |
Geneste: "A first catagorithm"
|
16:00 |
16:24 |
Naganuma, Yoshino, Sato, Suzuki: "Auditable Zerocoin"
|
16:24 |
16:30 |
Guillou: "Smart cards against cataCRYPT and more"
|
16:30 |
16:45 |
Jeffery: "Quantum algorithms for the subset-sum problem"
|
16:45 |
Guttman: "Measuring protocol strength with security goals"
|
16:45 |
16:48 |
English, Nezhadian: "Conditions of Full Disclosure: The Blockchain Remuneration Model"
|
16:48 |
17:00 |
Short talks
|
17:00 |
17:12 |
Boudguiga, Bouzerna, Granboulan, Olivereau, Quesnel, Roger, Sirdey: "Towards Better Availability and Accountability for IoT Updates by means of a Blockchain"
|
17:12 |
17:30 |
|
17:30 |
|
17:30 |
17:30 |
|
17:30 |
17:36 |
Lundbaek, Huth: "Oligarchic Control of Business-To-Business Blockchains"
|
17:36 |
|
|
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
Sunday 30 April 2017 |
08:30 |
Coffee
|
08:30 |
|
|
|
|
|
|
08:50 |
Introduction
|
08:50 |
|
|
|
|
|
09:00 |
Heninger: "Random Number Generator Done Wrong"
|
09:00 |
Rescorla: "Status update on the TLS 1.3 Standard"
|
09:00 |
Preneel: "Security and privacy challenges for the IoT"
|
09:00 |
Chorti: "A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems"
|
09:00 |
|
|
09:15 |
Lütkenhaus: "How secure are Quantum Key Distribution protocols and their implementations?"
|
09:15 |
|
|
09:23 |
Pfennig, Engelmann, Franz, Wolf: "Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks"
|
09:23 |
|
|
09:30 |
Fournet: "Implementing and Proving the TLS 1.3 Record Layer"
|
09:30 |
09:30 |
Rechberger: Introduction
|
09:30 |
|
09:45 |
Pierrot: "Malleability of the Blockchain's Entropy"
|
09:45 |
09:45 |
Bilgin: "FewMul-FewDepth-FewLength Triangle"
|
09:45 |
Bunin, Goldfeld, Permuter, Shamai, Cu, Piantanida: "Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters"
|
09:45 |
|
10:00 |
Tibouchi: "Physical attacks against lattice-based schemes"
|
10:00 |
10:00 |
Hale: "Secure Channels"
|
10:00 |
Witteman: "How to secure Over-The-Air software updates?"
|
10:00 |
|
10:08 |
Sharifian, Lin, Safavi-Naini: "Hash-then-Encode: A Modular Semantically Secure Wiretap Code"
|
10:08 |
|
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
Coffee break
|
10:30 |
|
10:45 |
Coffee break
|
10:45 |
|
11:00 |
Paterson: "Backdoors in Random Number"
|
11:00 |
Duong: "Project Wycheproof"
|
11:00 |
Fournaris, Papachristodoulou, Sklavos: "Secure and Efficient RNS software implementation for Elliptic Curve Cryptography"
|
11:00 |
Peralta: "Functions with known multiplicative complexity"
|
11:00 |
Belfiore: "Finite-Length Lattice Coding for Gaussian Wiretap Channels: A theta series perspective"
|
11:00 |
|
11:15 |
Wehner: TBA
|
11:15 |
|
11:20 |
Kawai, Ueno, Homma, Aoki, Fukushima, Kiyomoto: "Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers"
|
11:20 |
|
11:30 |
Günther: "A Cryptographic Analysis of the TLS 1.3 Handshake Protocol"
|
11:30 |
|
11:40 |
Veshchikov, Guilley: "Use of simulators for side-channel analysis"
|
11:40 |
|
11:45 |
Courtois: "False Backdoors in Historical Symmetric Ciphers"
|
11:45 |
|
12:00 |
Biasse: "Finding approximate short vectors in certain ideal lattices with a quantum computer"
|
12:00 |
12:00 |
Somorovsky: "TLS-Attacker: Future directions in testing and fuzzing"
|
12:00 |
|
12:00 |
|
12:00 |
|
12:00 |
|
12:30 |
|
12:30 |
|
12:30 |
|
|
|
|
12:45 |
|
12:45 |
|
|
|
|
|
|
13:30 |
Guilley: "RISQ & Quantum-Safe Crypto for Industry"
|
13:30 |
|
|
|
|
|
|
14:00 |
Fischer: "Design of Secure TRNGs for Cryptography - Past, Present, and Future"
|
14:00 |
Perret, Prest: "Overview of Quantum-Safe Cryptography"
|
14:00 |
Blanchet: "Mechanized Computational Proof of the TLS 1.3 Standard Candidate"
|
14:00 |
Capkun: "Secure positioning: From GPS to IoT"
|
14:00 |
Orsini: "Evaluating suitable cryptographic primitives within MPC engine"
|
14:00 |
Tessaro: "A Cryptographic Perspective on Information-theoretic Secrecy"
|
14:00 |
|
14:30 |
MacCarthaigh: "Mitigating cryptographic and application security attacks against TLS1.3 0-RTT data"
|
14:30 |
|
14:45 |
Skorski: "Evaluating Entropy for True Random Number Generators"
|
14:45 |
14:45 |
TBA: "Homomorphic encryption"
|
14:45 |
|
15:00 |
Faugère: "Real-life deployment of MQ"
|
15:00 |
Hawblitzel: "Verified Assembly Language for Fast Cryptography"
|
15:00 |
Van Assche: "Permutation-based cryptography for embedded and mobile systems"
|
15:00 |
15:00 |
Dean, Goldsmith: "A CCA-Secure Cryptosystem Using Massive MIMO Channels"
|
15:00 |
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
Coffee break
|
15:30 |
|
16:00 |
Vergnaud: "Security of Pseudo-Random Number Generators With Input"
|
16:00 |
Gilbert: "Security of Cryptographic Algorithms & Recommendations"
|
16:00 |
Scott: "Tamarin analysis of TLS 1.3: What did we prove?"
|
16:00 |
Glick, Oren, Puzis, Shabtai: "The Curious Case of the Curious Case: Detecting touchscreen events using a smartphone case"
|
16:00 |
Zajac: "Multiplicative complexity in block cipher design and analysis"
|
16:00 |
Baesso, Capuozzo, Conti, Gamberini, Monaro, Sartori, Spolaor: "You are how you play: authenticating mobile users via game playing"
|
16:00 |
Paterson: "CFRG status update from CFRG chairs"
|
16:00 |
16:10 |
Khovratovich: "Argon 2 update"
|
16:10 |
16:20 |
Etemad, Beato, Preneel: "Are You Really My Friend? Efficient and Secure Friend-matching in Mobile Social Networks"
|
16:20 |
16:23 |
Neri, Rosenthal, Schipani: "Fuzzy Authentication using Rank Distance"
|
16:23 |
16:30 |
Gouget: "PQ-Crypto Standardization"
|
16:30 |
Iyengar: "Deployment and implementation of TLS 1.3 at Facebook"
|
16:30 |
16:35 |
Harkins: "PKEX: A Password-Authenticated Public Key Exchange"
|
16:35 |
16:40 |
Shwartz, Shitrit, Shabtai, Oren: "From Smashed Screens to Smashed Stacks: Attacking Mobile Phones using Malicious Aftermarket Parts"
|
16:40 |
16:45 |
Tessaro: "Provably-robust Sponge-based PRNGs"
|
16:45 |
16:45 |
Tiessen: "Update on LowMC v3"
|
16:45 |
Cho, Griesser, Rafique: "A McEliece-based Key Exchange Protocol for Optical Communication Systems"
|
16:45 |
16:50 |
Farshim: "Caesar's Role in the Fall of AE Security"
|
16:50 |
17:00 |
Panel (speakers + Lütkenhaus)
|
17:00 |
Stebila: "Preparing for post-quantum cryptography in TLS"
|
17:00 |
Capkun, Guilley, Prouff, Wyseur panel: "Security issues for IoT systems including standardization, malware and other attacks"
|
17:00 |
17:08 |
Compagno, Conti, Khan: "An ICN-based Authentication Protocol for a Simplified LTE Architecture"
|
17:08 |
17:15 |
Khovratovich: "BIP32-Ed25519"
|
17:15 |
17:30 |
Concluding discussions
|
17:30 |
|
17:30 |
|
17:30 |
17:30 |
|
17:30 |
|
17:30 |
17:40 |
Open discussion
|
17:40 |
|
|
|
17:40 |
|
17:40 |
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |
|
18:00 |