Program

 

Framework schedule.

  

Wednesday, 28 June.

 

8:30 - 9:00 Registration
9:00 - 9:10 Openning
9:10 - 10:00

Keynote: Krzysztof Szczypiorski

Network steganography: smuggling secrets through the net

10:00 - 10:10 Break
10:10 - 10:30

Lucjan Hanzlik, Kamil Kluczniak and Mirosław Kutyłowski

CTRL-PACE. Controlled Randomness for e-Passport Password Authentication

10:30 - 10:50

Marcin Słowik and Marta Wszoła

Improving Proof Efficiency for Pointcheval-Sanders Signatures

10:50 - 11:20 Coffee break
11:20 - 11:40

Valerie Nachef and Jacques Patarin

PKP with quadratic systems

11:40 - 12:00

Pavol Zajac

Hybrid encryption from McEliece cryptosystem

12:00 - 12:10 Break
12:10 - 12:30

Jean-Francois Geneste

A new "catalgorithm"

12:30 - 12:50

Tomasz Adamski

A Family of Modied AES like ciphers

13:00 - 14:30 Break
14:30 - 15:20 Keynote: Carles Padró

Non-Perfect Secret Sharing

15:30 - 15:50 Maciej Grześkowiak and Adrian  Łydka

Genus two hyperelliptic curves over finite fields with order of the jacobian divisible by a large prime

15:50 - 16:10

Gregory Morse

Pure Infinitely Self-Modifying Code is Realizable and

Turing-complete

16:10 - 16:40  Coffee break
16:40 - 17:00

 Andrea Huszti and Zita Kovács

Proving Anonymity for BILMIX

17:00 - 17:20

Éva Ádámkó, Gábor Jakabóczki and Péter Tamás Szemes

Proposal of a Secure Modbus RTU communication with Adi Shamir's secret sharing method

17:20 - 18:20 Poster session 


 

Thursday, 29 June.

 

9:00 - 9:20

Paweł Morawiecki

Malicious SHA-3

9:20 - 9:40

Serhii Onopa and Zbigniew Kotulski

Improved security of SHA-3 against preimage attacks

9:40 - 10:00

Ashutosh Dhar Dwivedi, Paweł Morawiecki and Sebastian Wójtowicz

Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Tree Search

10:00 - 10:10 Break
10:10 - 10:30

Nicolas Courtois and Maria-Bristena Oprisanu

Correlation Attacks and Long Term Keys in T-310

10:30 - 10:50

Viliam Hromada and Tibor Petho

Desynchronization Fault Analysis of Grain v1

10:50 - 11:20 Coffee break
11:20 - 12:10

Keynote: Claus Diem

On the (im-)possibility of algebraic attacks on the elliptic curve discrete logarithm problem

12:10 - 12:20 Break
12:20 - 12:40

Vasyl Ustimenko

Wild and tame maps on free modules over commutative rings and multivariate cryptography

12:40 - 13:00

Artur Jakubski, Joseph Pieprzyk and Marian Srebrny

Primality Tests with No Trusted Party

13:00 - 14:30 Break
14:30 - 14:50

Konrad Wrona

Military applications of modern cryptography

14:50 - 15:10

Vasyl Ustimenko and Aneta Wróblewska

On multivariate cryptosystems of prescribed degree with hidden Eulerian equations

15:10 - 15:30

Aleksandra Dolot, Daniel Waszkiewicz, Michał Andrzejczak and Piotr Sapiecha

Block cipher based Public Key Encryption via Indistinguishability Obfuscation

15:40 - ... Sightseeing tour of Warsaw and conference dinner

  

Friday, 30 June.

 

9:00 - 9:20

Robert Dryło, Tomasz Kijko and Michał Wroński

Using endomorphisms for scalar multiplication after point compression on alternative models of elliptic curves

9:20 - 9:40

Robert Dryło and Jacek Pomykała

Reduction of factorization of integer n to determine the order of the Jacobian of genus 2 curves over Z^n

9:40 - 10:00 

Roman Oliynykov, Dmytro Kaidalov, Andrii Nastenko, Lyudmila Kovalchuk, Mariia Rodinko and Oleksiy Shevtsov

Block Confirmation Time for the PoW and PoS Cryptocurrencies Consensus Protocols

10:00 - 10:10 Break
10:10 - 10:30

Janusz Szmidt

Nonlinear Feedback Shift Registers and Zech Logarithms

10:30 - 10:50

Iwona Polak and Mariusz Boryczka

Tabu search against permutation based stream ciphers

10:50 - 11:20 Coffee break
11:20 - 11:40

Renata Kawa and Mieczysław Kula

Access structures induced by uniform polymatroids

11:40 - 12:00

Paweł Augustynowicz and Krzysztof Kanciak

Scalable Method of searching for full-period Nonlinear Feedback Shift Registers with General Purpose Graphic Processing Unit. New List of Maximum Period NLFSRs.

12:00 - 12:10 Break 
12:10 - 12:30

Marek Janiszewski

Soft Security Methods and Cryptography, the Real Relationship

12:30 - 12:50

Marcin Alan Tunia

Context data acquisition for evidence generation in adaptive context-aware network non-repudiation

12:50 - 13:00 Closing

 

 

Poster session -  Wednesday, 28 June, 17:20 - 18:20

 

17:20 - 18:20

Tomasz Adamski

Simple True Random Number Generator for Light Cryptographic Applications

17:20 - 18:20  Jabbar Al- Gburi

Protect data from attacking by authenticate clients using Kerberos Protocol

17:20 - 18:20  Michał Apolinarski

Statistical evaluation of extended PP-1 and PP-2 key schedule algorithms

17:20 - 18:20  Erdem Bozdag and Filiz Kurtcebe Altin

The Federated Security Shield for Matitime Security (FedSS)

17:20 - 18:20  Iwona Polak and Mariusz Boryczka

Tabu search in stream ciphers cryptanalysis

17:20 - 18:20  Andrzej Pomykała

Remark about graph and security

17:20 - 18:20  Victor I. Ruzhentsev

On the approach to security estimation of hash functions based on Rijndael-like block ciphers to collision rebound attacks

17:20 - 18:20  Mykel Shumay and Gautam Srivastava

PixSel: Images as Book Cipher Keys

17:20 - 18:20  Daniel Waszkiewicz, Aleksandra Dolot, Michał Andrzejczak and Piotr Sapiecha

Confidential greedy graph algorithms

17:20 - 18:20  Zhu Jie and Xu Mao Zhi

A New Decomposition Method for the Jacobian of Hyperelliptic Curves over Finite Field with Characteristic 2

 

Powered by Joomla 1.7 Templates