BalkanCryptSec 2014 Program
16 October 2014
08:30 | Registration Open |
09:20 - 9:30 | Opening |
(Chair: Berna Ors) |
|
Session 1: Invited Talk I | |
09:30 - 10:30 | Authentication in Constrained Settings |
Katerina Mitrokotsa, Chalmers University of Technology, Sweden |
10:30 - 11:00 | Coffee Break |
(Chair: Svetla Nikova) |
|
Session 2: Symmetric Cryptography | |
11:00 - 11:30 |
Optimizing the placement of tap positions |
Enes Pasalic, Samir Hodzic, Samed Bajric and Yongzhuang Wei | |
11:30 - 12:00 |
Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure |
Oğuz Yayla | |
12:00 – 12:30 |
Algebraic Attacks Using Binary Decision Diagrams |
Håvard Raddum and Oleksandr Kazymyrov |
12:30 - 14:00 | Lunch |
(Chair: Bart Preneel) |
|
Session 3: Invited Talk II | |
14:00 - 15:00 | Cryptocurrencies: Bitcoin and Beyond |
Aggelos Kiayias, University of Connecticut, USA |
15:00 - 15:30 | Coffee Break |
(Chair: Ferucio Laurentiu Tiplea)
|
|
Session 4: Cryptographic Hardware | |
15:30 – 16:00 |
Universally Composable Firewall Architectures using Trusted Hardware |
Dirk Achenbach, Jochen Rill and Joern Mueller-Quade | |
16:00 – 16:30 |
Higher-order Glitch Resistant Implementation of the PRESENT S-Box |
Thomas De Cnudde, Begül Bilgin, Oscar Repáraz and Svetla Nikova | |
16:30 – 17:00 |
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform |
Nele Mentens, Lejla Batina and Selcuk Baktir | |
17:00 – 17:30 |
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms |
Christian T. Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten and Christof Paar |
|
17:30 – 18:30 |
Steering Committee Meeting |
19:00 - 22:00 | Conference Dinner |
17 October 2014
(Chair: Berna Ors) |
|
Session 5: Invited Talk III and Invited Talk IV | |
09:00-10:00 | Embedded Security |
Benedikt Gierlichs, KU Leuven, Belgium | |
10:00-10:30 | Crypto Module Standardization (ISO/IEC 1970 and 24759) and Common Criteria |
Mariye Umay Akkaya, Turkish Standards Institution, Turkey |
10:30 - 11:00 | Coffee Break |
(Chair: Tsonka Baicheva) |
|
Session 7: Cryptographic Protocols I | |
11:00 – 11:30 |
A Secure and Efficient Protocol for Electronic Treasury Auctions |
Atilla Bektaş, Mehmet Sabır Kiraz and Osmanbey Uzunkol | |
11:30 - 12:00 |
Anonymous Data Collection System with Mediators |
Hiromi Arai, Keita Emura and Takahiro Matsuda | |
12:00 – 12:30 |
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations |
Özgür Dagdelen and Daniele Venturi |
12:30 - 14:00 | Lunch |
(Chair: Sedat Akleylek) |
|
Session 8: Public Key Cryptography | |
14:00 – 14:30 |
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps |
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan | |
14:30 - 15:00 |
On the Anonymization of Cocks IBE Scheme |
Gheorghe A. Schipor | |
15:00 – 15:30 |
Nearest Planes in Practice |
Johannes Buchmann, Christian Bischof, Özgür Dagdelen, Robert Fritzpatrick, Florian Göpfert and Artur Mariano |
15:30 - 16:00 | Coffee Break |
(Chair: Erkay Savas) |
|
Session 9: Cryptographic Protocols II | |
16:00 - 16:30 |
Timed-Release Secret Sharing Schemes with Information Theoretic Security |
Yohei Watanabe and Junji Shikata | |
16:30 - 17:00 |
VSSDB: A Verifiable Secret-Sharing and Distance-Bounding Protocol |
Sebastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux, Cristina Onete, Matthieu Roy and Moussa Traoré |
|
17:00 - 17:30 |
A Signature Scheme for a Dynamic Coalition Defence Environment without Trusted Third Parties |
J.C.A van der Lubbe, M.J. de Boers and Zekeriya Erkin |
17:30 - 17:40 | Closing |