Invited Speakers

 

Claus Diem - University of Leipzig, Germany

Title: On the (im-)possibility of algebraic attacks on the elliptic curve discrete logarithm problem

The elliptic curve discrete logarithm problem is one of the key primitives of state-of-the-art cryptography. This problem is prefered over the classical discrete logarithm problem because for carefully chosen curves, it seems to be very difficult to mount an index calculus attack. In recent years, the possibility of so-called algebraic attacks has been discussed. In the talk, a sceptical view on the relevance of such attacks is presented.

Biography: Claus_Diem.pdf

 

Carles Padró - Universitat Politècnica de Catalunya, Spain

Title: Non-Perfect Secret Sharing

In a non-perfect secret sharing scheme, some non-authorized sets of participants can obtain partial information on the secret value. A new formalization, based on the concept of access function has been proposed recently. The access function of a non-perfect secret sharing scheme measures the amount of information on the secret value that is derived from every set of shares. In this talk, we survey the results that have been obtained by using this new framework.

Biography:  Carles_Padro.pdf

 

Krzysztof Szczypiorski - Warsaw University of Technology, Poland


Title: Network steganography: smuggling secrets through the net

Network steganography is the youngest branch of information hiding. It is a fast-developing field: recent years have resulted in multiple new information hiding methods, which can be exploited in various types of networks. The exploitation of protocols belonging to the Open Systems Interconnection (OSI) reference model is the essence of network steganography. This family of methods may utilize one or more protocols simultaneously or the relationships between them — relying on the modification of their intrinsic properties for the embedding of steganograms. The talk will give a quick overview of this field with three case studies based on the following algorithms: StegIbiza, StegHash and SkyDe.

Biography:  Krzysztof_Szczypiorski.pdf

Powered by Joomla 1.7 Templates