Most of the presentations are online:
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
16:45 | Daniel J. Bernstein (chair) | Daniel J. Bernstein | Welcome | |
16:48 | Erik Zenner | Erik Zenner | Optimised Rabbit code | slides |
16:50 | Marina Pudovkina | Marina Pudovkina | Linear structures of permutation groups over vector spaces | slides |
16:55 | Eli Biham | Eli Biham | Tpy is fast and secure (as it has always been) | |
16:59 | Yaakov Hoch and Adi Shamir | Adi Shamir | Hash Function Combiners Can Be Secure Even When All The Hash Functions Are Weak | slides |
17:04 | Tom Berson, Nigel Smart, Raphael Phan, Orr Dunkelman, Dan Page | Orr Dunkelman | CFP: The leading Journal in its Fields | |
17:06 | Orhun Kara | Orhun Kara | Some Nice Landscape Pictures | slides |
17:09 | John Kelsey | John Kelsey | NIST Hash Update | slides |
17:16 | Daniel J. Bernstein | Daniel J. Bernstein | SHARCS vs. SWIFFT | slides |
17:20 | Florian Mendel, Christian Rechberger, Martin Schläffer | Florian Mendel | Update on Lake | slides |
17:25 | Florian Mendel and Christian Rechberger | Christian Rechberger | GOSTbusting Reloaded | slides |
17:26 | Florian Mendel and Christian Rechberger | Christian Rechberger | Bug Attacks on Symmetric Crypto - Or: When Strong Animals get ill | |
17:29 | Sean O’Neil, Nicolas Courtois | Sean O’Neil | Reverse-engineered Philips/NXP Hitag2 Cipher | slides |
17:30 | Orr dunkelman | orr dunkelman | The cryptanalytic steps of SALSA | |
17:34 | Danilo Gligoroski, Suzana Andova, Svein Johan Knapskog | Danilo Gligoroski | How to extract the plaintext while following NIST or ISO/IEC recommendations | slides |
17:39 | Alexander Maximov, Dmitry Khovratovich | Alexander Maximov | New State Recovering Attack on RC4 | slides |
17:44 | Fin! |