ECRYPT logo





January 31 - February 1, 2007, Ruhr University Bochum, Germany

Workshop Program (preliminary) [pdf]

08:30
Tuesday, January 30th
TimeEvent
19:00 - 22:00Registration and Reception at the Park Inn Hotel
Wednesday, January 31th
TimeEvent
08:15Registration
Cryptanalysis I 
09:10-9:30Two Trivial Attacks on Trivium
Alexander Maximov and Alex Biryukov
09:30Some Thoughts on Trivium
Steve Babbage
09:45-10:00Linear Approximations for 2-round Trivium
Meltem Sönmez Turan and Orhun Kara
10:00-10:20Cryptanalysis of Hermes8F
Steve Babbage, Carlos Cid, Norbert Pramstaller and Havard Raddum
10:20-10:40Differential Cryptanalysis of Salsa20/8
Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki and Hiroki Nakashima
 Coffee Break
Cryptanalysis II 
11:00-11:20Attacking the Filter Generator over GF(2^m)
Sondre Rønjom and Tor Helleseth
11:20-11:35Assessing the Security of Key Length
Iain Devlin and Alan Purvis
11:35-11:50A Note on Distinguishing Attacks
Håkan Englund, Martin Hell and Thomas Johansson
11:50-12:10Differential Power Analysis of Stream Ciphers
Wieland Fischer, Berndt M. Gammel, Oliver Kniffler and Joachim Velten
 Lunch
Software performance 
14:00-14:15eSTREAM update on software performance
Christophe De Cannière
14:15:14:30Cycle counts for authenticated encryption
Daniel J. Bernstein
14:30-14:45Studying hardware/software codesign for stream ciphers
Patrick Schaumont and Ingrid Verbauwhede
14:45-15:05Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust and Christof Paar
15:05-15:20Throughput/code size tradeoff for stream ciphers
Cédric Lauradoux
 Coffee Break
Cryptanalysis III 
15:45-16:05Cryptanalysis of Achterbahn-128/80
Marķa Naya Plasencia
16:05-16:20Achterbahn-128/80: Design and Analysis
Berndt M. Gammel, Rainer Goettfert and Oliver Kniffler
16:20-16:40Overtaking VEST
Antoine Joux and Jean-René Reinhard
16:40-16:55On the security of FCSR-based pseudorandom generators
François Arnault and Thierry P. Berger and Marine Minier
 
19:30Dinner at the Livingroom
 
Thursday, February 1st
TimeEvent
Hardware performance 
Registration desk opens
09:00-09:20Hardware results for selected stream cipher candidates
T. Good and M. Benaissa
09:20-09:40FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile
Philippe Bulens, Kassem Kalach, François-Xavier Standaert and Jean-Jacques Quisquater
09:40-10:00Hardware evaluation of eSTREAM Candidates: Grain, Lex, Mickey128, Salsa20 and Trivium
Marcin Rogawski
10:00-10:20Comparison of hardware performance of selected Phase II eSTREAM candidates
Kris Gaj, Gabriel Southern and Ramakrishna Bachimanchi
10:20-10:40Comparison of Low-Power Implementations of Trivium and Grain
Martin Feldhofer
 Coffee Break
Designs and theory 
11:00-11:15CryptMT Stream Cipher Version 3
Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura and Mariko Hagita
11:15-11:35A Word-Oriented Stream Cipher Using Clock Control
Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai
11:35-11:55MV3: A new word based stream cipher using rapid mixing and revolving buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov and Ramarathnam Venkatesan
11:55-12:10Adding MAC functionality to Edon80
Danilo Gligoroski and Svein Johan Knapskog
12:10-12:25A Note on Algebraic Properties of Quasigroups in Edon80
Milan Vojvoda, Marek Sýs and Matúš Jókay
Lunch
Cryptanalysis IV 
14:00-14:20On a bias of Rabbit
Jean-Philippe Aumasson
14:20-14:40Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Hongjun Wu and Bart Preneel
14:40-14:55How to Break Py and Pypy by a Chosen-IV Attack
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado and Masakatu Morii
Rump session 
14:55-15:20Rump session
 Coffee Break
Discussion 
15:45-17:00Discussion on IP, performance, security requirements, eSTREAM process, others
17:00-17:05Closing remarks