|
|
|
|
|
09:30-10:30 J. STERN | 09:15-10:15 P. STEVENHAGEN | 09:30-10:30 E. BAYER | 09:30-10:15 H. DOBBERTIN | 09:30-10:30 A. CANTEAUT |
Public Key Encryption and Provable Security | Elliptic Curves and Modular Functions | Lattices of Euclidean Space | Analysis of HFE Schemes Based on Power Functions | Cryptanalysis of Block Ciphers and Related Properties of the Walsh Spectra of S-Boxes |
|
||||
11:00-11:30 L. GUILLOU | 10:45-11:45 J.M. COUVEIGNES | 11:00-11:30 C. MAIRE | 10:45-11:30 M. DAUM & P. FELKE | 11:00-11:30 M. MINIER |
Authentification and Signature | Discrete Dynamical Systems and the Construction of Cryptosystems | Automorphisms of Unimodular Lattices | Some New Aspects Concerning teh Analysis of HFE Cryptosystem | Cryptanalysis of Round-Reduced Versions of Rijndael |
11:30-12:00 J.J. QUISQUATER | 11:45-12:15 T. LANGE | 11:30-12:00 O. ORCIERE | 11:30-12:00 J.M. FAUGERE | 11:30-12:00 S. LEVEILLER |
Alice, Bob, GQ, GPS and the Other Ones... | Trace-Zero Subvariety for Cryptosystems | Cryptography and Lattices | Grobner Basis in GF(2) and Applications to HFE! | Joint Cryptanalysis of PN-Generators Filtered by a Boolean Function |
|
||||
15:00-16:00 B. PRENEEL | 15:00-15:45 M. ZIEVE |
|
14:45-15:45 R. CRAMER |
|
The NESSIE Project and the Cryptography Challenge | Permutation Polynomials and Applications to Cryptography | Security Public Key Encryptions Against Active Attacks | ||
|
|
|||
16:30-17:00 B. PEIRANI | 16:15-16:45 X.D. HOU | 16:15-16:45 M. QUISQUATER | ||
Electronic Signature Standardization in Europe | Group Action on Binary Resilient Functions | On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem | ||
17:00-17:30 Y. LOISEL | 16:45-17:15 C. CARLET | 16:45-17:15 P. LANGEVIN | ||
Multimedia Copy Protection: Issues and Solutions | Upper Bounds on the Numbers of Resilient Functions and of Bent Functions | On the Non-Linearity of Power Functions | ||
17:15-17:45 F. RODIER | ||||
On the Non-Linearity of Boolean Functions | ||||
|
|
|
||
|
|
|
|