Program
Framework schedule.
Wednesday, 28 June.
8:30 - 9:00 | Registration |
9:00 - 9:10 | Openning |
9:10 - 10:00 |
Keynote: Krzysztof Szczypiorski Network steganography: smuggling secrets through the net |
10:00 - 10:10 | Break |
10:10 - 10:30 |
Lucjan Hanzlik, Kamil Kluczniak and Mirosław Kutyłowski CTRL-PACE. Controlled Randomness for e-Passport Password Authentication |
10:30 - 10:50 |
Marcin Słowik and Marta Wszoła Improving Proof Efficiency for Pointcheval-Sanders Signatures |
10:50 - 11:20 | Coffee break |
11:20 - 11:40 |
Valerie Nachef and Jacques Patarin PKP with quadratic systems |
11:40 - 12:00 |
Pavol Zajac Hybrid encryption from McEliece cryptosystem |
12:00 - 12:10 | Break |
12:10 - 12:30 |
Jean-Francois Geneste A new "catalgorithm" |
12:30 - 12:50 |
Tomasz Adamski A Family of Modied AES like ciphers |
13:00 - 14:30 | Break |
14:30 - 15:20 | Keynote: Carles Padró
Non-Perfect Secret Sharing |
15:30 - 15:50 | Maciej Grześkowiak and Adrian Łydka
Genus two hyperelliptic curves over finite fields with order of the jacobian divisible by a large prime |
15:50 - 16:10 |
Gregory Morse Pure Infinitely Self-Modifying Code is Realizable and Turing-complete |
16:10 - 16:40 | Coffee break |
16:40 - 17:00 |
Andrea Huszti and Zita Kovács Proving Anonymity for BILMIX |
17:00 - 17:20 |
Éva Ádámkó, Gábor Jakabóczki and Péter Tamás Szemes Proposal of a Secure Modbus RTU communication with Adi Shamir's secret sharing method |
17:20 - 18:20 | Poster session |
Thursday, 29 June.
9:00 - 9:20 |
Paweł Morawiecki Malicious SHA-3 |
9:20 - 9:40 |
Serhii Onopa and Zbigniew Kotulski Improved security of SHA-3 against preimage attacks |
9:40 - 10:00 |
Ashutosh Dhar Dwivedi, Paweł Morawiecki and Sebastian Wójtowicz Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Tree Search |
10:00 - 10:10 | Break |
10:10 - 10:30 |
Nicolas Courtois and Maria-Bristena Oprisanu Correlation Attacks and Long Term Keys in T-310 |
10:30 - 10:50 |
Viliam Hromada and Tibor Petho Desynchronization Fault Analysis of Grain v1 |
10:50 - 11:20 | Coffee break |
11:20 - 12:10 |
Keynote: Claus Diem On the (im-)possibility of algebraic attacks on the elliptic curve discrete logarithm problem |
12:10 - 12:20 | Break |
12:20 - 12:40 |
Vasyl Ustimenko Wild and tame maps on free modules over commutative rings and multivariate cryptography |
12:40 - 13:00 |
Artur Jakubski, Joseph Pieprzyk and Marian Srebrny Primality Tests with No Trusted Party |
13:00 - 14:30 | Break |
14:30 - 14:50 |
Konrad Wrona Military applications of modern cryptography |
14:50 - 15:10 |
Vasyl Ustimenko and Aneta Wróblewska On multivariate cryptosystems of prescribed degree with hidden Eulerian equations |
15:10 - 15:30 |
Aleksandra Dolot, Daniel Waszkiewicz, Michał Andrzejczak and Piotr Sapiecha Block cipher based Public Key Encryption via Indistinguishability Obfuscation |
15:40 - ... | Sightseeing tour of Warsaw and conference dinner |
Friday, 30 June.
9:00 - 9:20 |
Robert Dryło, Tomasz Kijko and Michał Wroński Using endomorphisms for scalar multiplication after point compression on alternative models of elliptic curves |
9:20 - 9:40 |
Robert Dryło and Jacek Pomykała Reduction of factorization of integer n to determine the order of the Jacobian of genus 2 curves over Z^n |
9:40 - 10:00 |
Roman Oliynykov, Dmytro Kaidalov, Andrii Nastenko, Lyudmila Kovalchuk, Mariia Rodinko and Oleksiy Shevtsov Block Confirmation Time for the PoW and PoS Cryptocurrencies Consensus Protocols |
10:00 - 10:10 | Break |
10:10 - 10:30 |
Janusz Szmidt Nonlinear Feedback Shift Registers and Zech Logarithms |
10:30 - 10:50 |
Iwona Polak and Mariusz Boryczka Tabu search against permutation based stream ciphers |
10:50 - 11:20 | Coffee break |
11:20 - 11:40 |
Renata Kawa and Mieczysław Kula Access structures induced by uniform polymatroids |
11:40 - 12:00 |
Paweł Augustynowicz and Krzysztof Kanciak Scalable Method of searching for full-period Nonlinear Feedback Shift Registers with General Purpose Graphic Processing Unit. New List of Maximum Period NLFSRs. |
12:00 - 12:10 | Break |
12:10 - 12:30 |
Marek Janiszewski Soft Security Methods and Cryptography, the Real Relationship |
12:30 - 12:50 |
Marcin Alan Tunia Context data acquisition for evidence generation in adaptive context-aware network non-repudiation |
12:50 - 13:00 | Closing |
Poster session - Wednesday, 28 June, 17:20 - 18:20
17:20 - 18:20 |
Tomasz Adamski Simple True Random Number Generator for Light Cryptographic Applications |
17:20 - 18:20 | Jabbar Al- Gburi
Protect data from attacking by authenticate clients using Kerberos Protocol |
17:20 - 18:20 | Michał Apolinarski
Statistical evaluation of extended PP-1 and PP-2 key schedule algorithms |
17:20 - 18:20 | Erdem Bozdag and Filiz Kurtcebe Altin
The Federated Security Shield for Matitime Security (FedSS) |
17:20 - 18:20 | Iwona Polak and Mariusz Boryczka
Tabu search in stream ciphers cryptanalysis |
17:20 - 18:20 | Andrzej Pomykała
Remark about graph and security |
17:20 - 18:20 | Victor I. Ruzhentsev
On the approach to security estimation of hash functions based on Rijndael-like block ciphers to collision rebound attacks |
17:20 - 18:20 | Mykel Shumay and Gautam Srivastava
PixSel: Images as Book Cipher Keys |
17:20 - 18:20 | Daniel Waszkiewicz, Aleksandra Dolot, Michał Andrzejczak and Piotr Sapiecha
Confidential greedy graph algorithms |
17:20 - 18:20 | Zhu Jie and Xu Mao Zhi
A New Decomposition Method for the Jacobian of Hyperelliptic Curves over Finite Field with Characteristic 2 |