MONDAY | TUESDAY | WEDNESDAY | THURSDAY | FRIDAY |
---|---|---|---|---|
09:30-10:30 M. Abdalla | 09:30-10:30 D. Galindo | 09:30-10:30 P. Liardet | 09:30-10:30 H. Niederreiter | 09:30-10:30 N. Sendrier |
An overview of provable security | Approaches for removing key escrow from identity based cryptography | Multi-dimensional random digital sequences and their spectral properties | The probabilistic theory of the join linear complexity of multisequences | True random numbers with software? |
coffee break 30' | ||||
11:00-11:30 H. Gilbert, M. Robshaw, H. Sibert | 11:00-11:30 P. Pailler | 11:00-11:30 O. Hansen, J.-F. Michon | 11:00-11:30 A. Grocholewska Czurylo | 11:00-11:30 C. Berbain, H. Gilbert, J. Patarin |
Recovering the Key of a Provably Secure Lightweight Authentication Algorithm | Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log | Boolean orders | Short ANF representation boolean functions achieving interesting cryptographic properties | QUAD: a Practical Stream Cipher with Provable Security |
11:30-12:00 G. Bard | 11:30-12:00 E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, M. Yung | 11:30-12:00 F. Levy-dit-Vehel, L. Perret | 11:30-12:00 G. Leander | 11:30-12:00 P. Lacharme |
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack | Output Privacy in Secure Multiparty Computation | Algebraic Decoding of Rank Metric Codes | Rabbit in the Hat Proofs or Finding Implicit Representations | Efficient construction of resilient functions for a random number generator |
12:00-12:30 G. Kabatianskii | ||||
Decoding and cryptography | ||||
12:30 lunch | ||||
15:00-16:00 F. Hess | 14:30-15:30 X. Boyen | Free afternoon or Montain bike or Boat excursion |
15:00-16:00 I. Shparlinski | 13:15 back to home |
Computational aspects of parings in cryptography | Provably secure cryptosystems from parings | Group structure of elliptic curves over finite fields | ||
coffee break 30' | coffee break 30' | |||
16:30-17:00 J. Estrada, W. Hernández, M. Petkova | 16:00-17:00 J.-J. Quisquater | 16:30-17:15 C. Wolf | ||
Computing in the Jacobian of C_{ab} Curves of Genus 3 | Graph theory and cryptography: an update |
Introduction to Multivariate Quadratic Public Key Systems and their Applications | ||
17:00-17:30 E. Férard, F. Rodier | 17:00-17:30 N. Nakagawa | 17:15-17:45 J. Bringer, H. Chabanne, Q. D. Do | ||
Nonlinarity of Boolean functions and hyperelliptic curves | On the behavior of the number of solutions of difference equations for functions over finite fields | A Fuzzy Sketch with Trapdoor | ||
19:00 cocktail | 17:45 Yacc Pétanque tournament |
19:00 aperitif | ||
19:30 dinner | 19:30 dinner | 19:30 dinner | 20:00 banquet |