Program
All technical sessions take place in the Oticon-salen at DTU in Lyngby.
There will be no printed proceedings. Instead, all papers are available online below.
Wednesday 16 February 2011
- (Oticon-salen) 13:30 - 14:00: Registration
Session I — Stream Ciphers
- 14:00 - 14:20: A New Version of Grain-128 with Authentication [slides]
Lund University and FHNW - 14:20 - 14:40: Extending the Salsa20 nonce [slides]
University of Illinois at Chicago - 14:40 - 15:00: A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers [slides]
- (Oticon-salen) 15:00 - 15:30: Coffee Break
Invited Talk I
- 15:30 - 16:30: Leakage-Resilient Cryptography: a Practical Overview [slides]
UCL Crypto Group, Belgium
- (Oticon-salen) 17:00 Buses to Hotel Kong Arthur
Social Event: A night out in Copenhagen
- (City Hall Copenhagen) 19:00 - 21:00: Reception at the City Hall Copenhagen, joint with FSE 2011
- (Ice Bar Copenhagen) 20:30 - 21:15: Vist to the ICE BAR
Depending on the number of people there will be a second tour from 21:15 - 22:00
- (Bar 7) 21:30-?? Warm-up again at Bar7
Thursday 17 February 2011
- (Hotel Kong Arthur) 9:00: Buses to Conference Venue
Session II — Theory
- 9:45 - 10:05: On the security of the keyed sponge construction [slides]
STMicroelectronics and NXP Semiconductors - 10:05 - 10:25: Further More on Key Wrapping [slides]
Nagoya University - 10:25 - 10:40: Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem [slides]
Math. Inst. Serb. Academy Sci. and Arts, Belgrade and RCIS-AIST, Tokyo and Chuo University, Tokyo
- (Oticon-salen) 10:45 - 11:15: Coffee Break
Invited Talk II
- 11:15 - 12:15: New mobile phone algorithms - a real world story [slides]
Vodafone
- (Glassalen) 12:15 - 13:30: Lunch Break
Session III — Block Ciphers
- 13:30 - 13:50: Improved Linear Cryptanalysis of SMS4 Block Cipher [slides]
Nokia and Aalto University - 13:50 - 14:10: Cryptanalysis of TWIS Block Cipher [slides]
Institute of Applied Mathematics, Middle East Technical University, Turkey
- (Oticon-salen) 14:10 - 14:40: Coffee Break
Session VI — Implementation
- 14:40 - 15:00: Finding Optimal Bitsliced Implementations of 4 x 4-bit S-boxes [slides]
K.U. Leuven, Belgium - 15:00 - 15:20: A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers [slides]
KTH, Sweden - 15:20 - 15:40: Software speed of stream ciphers [website]
University of Illinois at Chicago and Technische Universiteit Eindhoven
- (Oticon-salen) 16:00 Buses to Hotel Kong Arthur