BalkanCryptSec 2014 Program

 

16 October 2014


 

08:30 Registration Open
09:20 - 9:30 Opening

 

(Chair: Berna Ors)
Session 1: Invited Talk I
09:30 - 10:30 Authentication in Constrained Settings
Katerina Mitrokotsa, Chalmers University of Technology, Sweden

 

10:30 - 11:00 Coffee Break

 

(Chair: Svetla Nikova)
Session 2: Symmetric Cryptography 
11:00 - 11:30
Optimizing the placement of tap positions
Enes Pasalic, Samir Hodzic, Samed Bajric and Yongzhuang Wei
11:30 - 12:00
Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure
Oğuz Yayla
12:00 – 12:30
Algebraic Attacks Using Binary Decision Diagrams
Håvard Raddum and Oleksandr Kazymyrov

 

12:30 - 14:00 Lunch

 

(Chair: Bart Preneel)
Session 3: Invited Talk II
14:00 - 15:00 Cryptocurrencies: Bitcoin and Beyond
Aggelos Kiayias, University of Connecticut, USA

 

15:00 - 15:30 Coffee Break

 

(Chair: Ferucio Laurentiu Tiplea)
Session 4: Cryptographic Hardware
15:30 – 16:00
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach, Jochen Rill and Joern Mueller-Quade
16:00 – 16:30
Higher-order Glitch Resistant Implementation of the PRESENT         S-Box
Thomas De Cnudde, Begül Bilgin, Oscar Repáraz and Svetla Nikova
16:30 – 17:00
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform
Nele Mentens, Lejla Batina and Selcuk Baktir
17:00 – 17:30
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms

Christian T. Zenger, Abhijit Ambekar, Fredrik Winzer,

Thomas Pöppelmann, Hans D. Schotten and Christof Paar

17:30 – 18:30
Steering Committee Meeting

 

19:00 - 22:00 Conference Dinner

 


17 October 2014


 

(Chair: Berna Ors)
Session 5: Invited Talk III and Invited Talk IV
09:00-10:00 Embedded Security
Benedikt Gierlichs, KU Leuven, Belgium
10:00-10:30 Crypto Module Standardization (ISO/IEC 1970 and 24759) and Common Criteria
Mariye Umay Akkaya, Turkish Standards Institution, Turkey

 

10:30 - 11:00 Coffee Break

 

(Chair: Tsonka Baicheva)
Session 7: Cryptographic Protocols I
11:00 – 11:30
A Secure and Efficient Protocol for Electronic Treasury Auctions
Atilla Bektaş, Mehmet Sabır Kiraz and Osmanbey Uzunkol
11:30 - 12:00
Anonymous Data Collection System with Mediators
Hiromi Arai, Keita Emura and Takahiro Matsuda
12:00 – 12:30
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations
Özgür Dagdelen and Daniele Venturi

 

12:30 - 14:00 Lunch

 

(Chair: Sedat Akleylek)
Session 8: Public Key Cryptography
14:00 – 14:30
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
14:30 - 15:00
On the Anonymization of Cocks IBE Scheme
Gheorghe A. Schipor
15:00 – 15:30
Nearest Planes in Practice

Johannes Buchmann, Christian Bischof, Özgür Dagdelen,

Robert Fritzpatrick, Florian Göpfert and Artur Mariano

 

15:30 - 16:00 Coffee Break

 

(Chair: Erkay Savas)
Session 9: Cryptographic Protocols II
16:00 - 16:30
Timed-Release Secret Sharing Schemes with Information Theoretic Security
Yohei Watanabe and Junji Shikata
16:30 - 17:00
VSSDB: A Verifiable Secret-Sharing and Distance-Bounding Protocol

Sebastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux,

Cristina Onete, Matthieu Roy and Moussa Traoré

17:00 - 17:30
A Signature Scheme for a Dynamic Coalition Defence Environment without Trusted Third Parties
J.C.A van der Lubbe, M.J. de Boers and Zekeriya Erkin

 

17:30 - 17:40 Closing