BalkanCryptSec 2014 Program
16 October 2014
| 08:30 | Registration Open |
| 09:20 - 9:30 | Opening |
(Chair: Berna Ors) |
|
| Session 1: Invited Talk I | |
| 09:30 - 10:30 | Authentication in Constrained Settings |
| Katerina Mitrokotsa, Chalmers University of Technology, Sweden | |
| 10:30 - 11:00 | Coffee Break |
(Chair: Svetla Nikova) |
|
| Session 2: Symmetric Cryptography | |
11:00 - 11:30 |
Optimizing the placement of tap positions |
| Enes Pasalic, Samir Hodzic, Samed Bajric and Yongzhuang Wei | |
11:30 - 12:00 |
Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure |
| Oğuz Yayla | |
12:00 – 12:30 |
Algebraic Attacks Using Binary Decision Diagrams |
| Håvard Raddum and Oleksandr Kazymyrov | |
| 12:30 - 14:00 | Lunch |
(Chair: Bart Preneel) |
|
| Session 3: Invited Talk II | |
| 14:00 - 15:00 | Cryptocurrencies: Bitcoin and Beyond |
| Aggelos Kiayias, University of Connecticut, USA | |
| 15:00 - 15:30 | Coffee Break |
(Chair: Ferucio Laurentiu Tiplea)
|
|
| Session 4: Cryptographic Hardware | |
15:30 – 16:00 |
Universally Composable Firewall Architectures using Trusted Hardware |
| Dirk Achenbach, Jochen Rill and Joern Mueller-Quade | |
16:00 – 16:30 |
Higher-order Glitch Resistant Implementation of the PRESENT S-Box |
| Thomas De Cnudde, Begül Bilgin, Oscar Repáraz and Svetla Nikova | |
16:30 – 17:00 |
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform |
| Nele Mentens, Lejla Batina and Selcuk Baktir | |
17:00 – 17:30 |
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms |
Christian T. Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten and Christof Paar |
|
17:30 – 18:30 |
Steering Committee Meeting |
| 19:00 - 22:00 | Conference Dinner |
17 October 2014
(Chair: Berna Ors) |
|
| Session 5: Invited Talk III and Invited Talk IV | |
| 09:00-10:00 | Embedded Security |
| Benedikt Gierlichs, KU Leuven, Belgium | |
| 10:00-10:30 | Crypto Module Standardization (ISO/IEC 1970 and 24759) and Common Criteria |
| Mariye Umay Akkaya, Turkish Standards Institution, Turkey | |
| 10:30 - 11:00 | Coffee Break |
(Chair: Tsonka Baicheva) |
|
| Session 7: Cryptographic Protocols I | |
11:00 – 11:30 |
A Secure and Efficient Protocol for Electronic Treasury Auctions |
| Atilla Bektaş, Mehmet Sabır Kiraz and Osmanbey Uzunkol | |
11:30 - 12:00 |
Anonymous Data Collection System with Mediators |
| Hiromi Arai, Keita Emura and Takahiro Matsuda | |
12:00 – 12:30 |
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations |
| Özgür Dagdelen and Daniele Venturi | |
| 12:30 - 14:00 | Lunch |
(Chair: Sedat Akleylek) |
|
| Session 8: Public Key Cryptography | |
14:00 – 14:30 |
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps |
| Ferucio Laurentiu Tiplea and Constantin Catalin Dragan | |
14:30 - 15:00 |
On the Anonymization of Cocks IBE Scheme |
| Gheorghe A. Schipor | |
15:00 – 15:30 |
Nearest Planes in Practice |
Johannes Buchmann, Christian Bischof, Özgür Dagdelen, Robert Fritzpatrick, Florian Göpfert and Artur Mariano |
|
| 15:30 - 16:00 | Coffee Break |
(Chair: Erkay Savas) |
|
| Session 9: Cryptographic Protocols II | |
16:00 - 16:30 |
Timed-Release Secret Sharing Schemes with Information Theoretic Security |
| Yohei Watanabe and Junji Shikata | |
16:30 - 17:00 |
VSSDB: A Verifiable Secret-Sharing and Distance-Bounding Protocol |
Sebastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux, Cristina Onete, Matthieu Roy and Moussa Traoré |
|
17:00 - 17:30 |
A Signature Scheme for a Dynamic Coalition Defence Environment without Trusted Third Parties |
| J.C.A van der Lubbe, M.J. de Boers and Zekeriya Erkin | |
| 17:30 - 17:40 | Closing |




