MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY
09:30-10:30 M. Abdalla 09:30-10:30 D. Galindo 09:30-10:30 P. Liardet 09:30-10:30 H. Niederreiter 09:30-10:30 N. Sendrier
An overview of provable security Approaches for removing key escrow from identity based cryptography Multi-dimensional random digital sequences and their spectral properties The probabilistic theory of the join linear complexity of multisequences True random numbers with software?
coffee break 30'
11:00-11:30 H. Gilbert, M. Robshaw, H. Sibert 11:00-11:30 P. Pailler 11:00-11:30 O. Hansen, J.-F. Michon 11:00-11:30 A. Grocholewska Czurylo 11:00-11:30 C. Berbain, H. Gilbert, J. Patarin
Recovering the Key of a Provably Secure Lightweight Authentication Algorithm Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log Boolean orders Short ANF representation boolean functions achieving interesting cryptographic properties QUAD: a Practical Stream Cipher with Provable Security
11:30-12:00 G. Bard 11:30-12:00 E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, M. Yung 11:30-12:00 F. Levy-dit-Vehel, L. Perret 11:30-12:00 G. Leander 11:30-12:00 P. Lacharme
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Output Privacy in Secure Multiparty Computation Algebraic Decoding of Rank Metric Codes Rabbit in the Hat Proofs or Finding Implicit Representations Efficient construction of resilient functions for a random number generator
12:00-12:30 G. Kabatianskii
Decoding and cryptography
12:30 lunch
15:00-16:00 F. Hess 14:30-15:30 X. Boyen Free afternoon
or
Montain bike
or
Boat excursion
15:00-16:00 I. Shparlinski 13:15 back to home
Computational aspects of parings in cryptography Provably secure cryptosystems from parings Group structure of elliptic curves over finite fields
coffee break 30' coffee break 30'
16:30-17:00 J. Estrada, W. Hernández, M. Petkova 16:00-17:00 J.-J. Quisquater 16:30-17:15 C. Wolf
Computing in the Jacobian of C_{ab} Curves of Genus 3 Graph theory and cryptography: an update
Introduction to Multivariate Quadratic Public Key Systems and their Applications
17:00-17:30 E. Férard, F. Rodier 17:00-17:30 N. Nakagawa 17:15-17:45 J. Bringer, H. Chabanne, Q. D. Do
Nonlinarity of Boolean functions and hyperelliptic curves On the behavior of the number of solutions of difference equations for functions over finite fields A Fuzzy Sketch with Trapdoor
19:00 cocktail  17:45 Yacc Pétanque tournament
19:00 aperitif
19:30 dinner 19:30 dinner 19:30 dinner 20:00 banquet