FSE 2012 Schedule
The program is available as a pdf here.
Sunday 18 March 2012
- 17:30 - 19:00: Welcome reception
Monday 19 March 2012
- 9:00 - 9:55: Registration
- 9:55 - 10:00: General Chair's Opening Remarks
Session I — Block ciphers
- 10:00 - 10:25: Improved Attacks on Full GOST
The Weizmann Institute, Rehovot, Israel
University of Haifa, Israel - 10:25 - 10:50: Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
KU Leuven, Belgium
Shandong University, China
- 10:50 - 11:20: Coffee Break
Invited Talk I
- 11:20 - 12:20: "Provable" security against differential and linear cryptanalysis
Aalto University and Nokia, Finland
- 12:20 - 14:00: Lunch
Session II — Differential cryptanalysis
- 14:00 - 14:25: A Model for Structure Attacks, with Applications to PRESENT and Serpent
Shandong University, China
Tsinghua University, China
KU Leuven, Belgium - 14:25 - 14:50 A Methodology for Differential-Linear Cryptanalysis and Its Applications
Institute for Infocomm Research, Singapore - 14:50 - 15:15 New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
Shanghai Jiao Tong University, China
Shandong University, China
Tsinghua University, China
Donghua University, China
Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, China
- 15:15 - 15:45: Coffee Break
Session III — Hash functions I
- 15:45 - 16:10: Improved Rebound Attack on the Finalist Grøstl
Ecole Normale Supérieure, France
University of Versailles Saint-Quentin-en-Yvelines, France
Nanyang Technological University, Singapore - 16:10 - 16:35: (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences
Institute for Infocomm Research, Singapore - 16:35 - 17:00: Practical Cryptanalysis of ARMADILLO2
University of Versailles Saint-Quentin-en-Yvelines, France
Nanyang Technological University, Singapore - 17:00 - 17:25: On the (In)Security of IDEA in Various Hashing Modes
Nanyang Technological University, Singapore
Macquarie University, Australia
Tuesday 20 March 2012
(Chair: Gilles Van Assche)Session IV — Modes of operation
- 9:00 - 9:25: The Security of Ciphertext Stealing
UC Davis, USA
Thales e-Security Ltd, UK - 9:25 - 9:50: McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Bauhaus-University, Germany - 9:50 - 10:15: Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Revere Security, USA
- 10:15 - 10:45: Coffee Break
Session V — Hash functions II
- 10:45 - 11:10: Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
KU Leuven, Belgium
Graz University of Technology, Austria - 11:10 - 11:35: Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Microsoft Research Redmond, USA
DTU, Denmark
Higher School of Economics, Russia - 11:35 - 12:00: Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
Sony China Research Laboratory
Sony Corporation
- 12:00 - 14:00: Lunch Break
Session VI — New tools for cryptanalysis
- 14:00 - 14:25: UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
ESAT/SCD-COSIC, KU Leuven, Belgium
University of Luxembourg, Luxembourg
IBBT, Belgium - 14:25 - 14:50: ElimLin Algorithm Revisited
University College London, UK
EPFL, Switzerland
- 14:50 - 15:20: Coffee Break
Invited Talk II
- 15:20 - 16:20: The history of linear cryptanalysis
Mitsubishi Electric Corporation, Japan
- 16:30 - ...: Rump session (Chairs: Dan Bernstein and Tanja Lange)
- 18:00 - ...: Conference dinner
Wednesday 21 March 2012
(Chair: Serge Vaudenay)Session VII — New designs
- 9:00 - 9:25: Short-output universal hash functions and their use in fast and secure message authentication
Oxford University, UK - 9:25 - 9:50: Lapin: an Efficient Authentication Protocol Based on Ring-LPN
Ruhr-Universität Bochum, Germany
INRIA / ENS, France
IST, Austria - 9:50 - 10:15: Higher-Order Masking Schemes for S-Boxes
Université de Paris 8, France
Université de Versailles Saint-Quentin-en-Yvelines, France
Oberthur Technologies, France
CryptoExperts, France - 10:15 - 10:40: Recursive Diffusion Layers for Block Ciphers and Hash Functions
Isfahan University of Technology, Iran
University of Isfahan, Iran
EPFL, Switzerland
- 10:40 - 11:10: Coffee Break
Session VIII — Keccak
- 11:10 - 11:35: Unaligned Rebound Attack: Application to Keccak
EPFL, Switzerland
Institute for Infocomm Research, Singapore
Nanyang Technological University, Singapore - 11:35 - 12:00: Differential propagation analysis of Keccak
STMicroelectronics, Belgium - 12:00 - 12:25: New attacks on Keccak-224 and Keccak-256
The Weizmann Institute, Rehovot, Israel
University of Haifa, Israel