Africacrypt2008
June 11-14, 2008, Casablanca, Morocco
Program and Slides
Tuesday, June 10, 2008
17:00 - 20:30 Registration
18:00 - 20:30 Welcome reception
Wednesday, June 11, 2008
08:00 – 09:00 Registration
09:00 – 09:10 Opening remarks
Session 1: AES Chair: Serge Vaudenay
09:10 – 09:40 Improving Integral Attacks against Rijndael-256 up to 9 Rounds PDF Slides
Samuel Galice, Marine Minier
09:40 – 10:10 Implementation of the AES-128 on Virtex-5 FPGAs PDF Slides
Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy
10:10 – 10:40 Coffee break
Session 2: ANALYSIS OF RFID PROTOCOLS Chair: Serge Vaudenay
10:40 – 11:10 Weaknesses in a Recent Ultralightweight RFID Authentication Protocol PDF Slides
Paolo D'Arco, Alfredo De Santis
11:10 – 11:40 Differential Cryptanalysis of Reduced-Round PRESENT
Meiqin Wang
11:40 – 12:40 Invited talk 1:
A Brief History of Provably-Secure Public-Key Encryption Power Point Slides
Alexander W. Dent
12:40 – 14:30 Lunch break
Session 3: CRYPTOGRAPHIC PROTOCOLS Chair: Tetsu Iwata
14:30 – 15:00 An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees PDF Slides
Fabien Coelho
15:00 – 15:30 Robust Threshold Schemes Based on the Chinese Remainder Theorem PDF Slides
Kamer Kaya, Ali Aydιn Seçuk
15:30 – 16:00 An Authentication Protocol with Encrypted Biometric Data Best Paper Award PDF Slides
Julien Bringer, Hervé Chabanne
16:30 – 17:00 Coffee break
Session 4: AUTHENTICATION Chair: Renate Scheidler
17:00 – 17:30 Authenticated Encryption Mode for Beyond the Birthday Bound Security PDF Slides
Tetsu Iwata
17:30 – 18:00 Cryptanalysis of the TRMS Signature Scheme of PKC'05 PDF Slides
Luk Bettale, Jean-Charles Faugère, Ludovic Perret
Thursday, June 12, 2008
Session 5: PUBLIC-KEY CRYPTOGRAPHY Chair: Alexander Dent
09:00 – 09:30 New Definition of Density on Knapsack Cryptosystems PDF Slides
Noboru Kunihiro
09:30 – 10:00 Another Generalization of Wiener's Attack on RSA PDF Slides
Abderrahmane Nitaj
10:00 – 10:30 An Adaptation of the NICE Cryptosystem to Real Quadratic Orders PDF Slides
Michael J. Jacobson, Jr, Renate Scheidler, Daniel Weimer
10:30 – 11:00 Coffee break
Session 6: PSEUDORANDOMNESS Chair: Abdelhak Azhari
11:00 – 11:30 A Proof of Security in O(2n) for the Benes Scheme PDF Slides
Jacques Patarin
11:30 – 12:30 Invited talk 2:
Modern Cryptography: a Historical Perspective
Jacques Stern
12:30 – 14:30 Lunch break
Session 7: ANALYSIS OF STREAM CIPHERS I Chair: Mitsuru Matsui
14:30 – 15:00 Yet Another Attack on Vest PDF Slides
Pascal Delaunay, Antoine Joux
15:00 – 15:30 Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers PDF Slides
Simon Fischer, Shahram Khazaei, Willi Meier
15:30 – 16:00 Correlated Keystreams in MOUSTIQUE PDF Slides
Emilia Käsper, Vincent Rijmen, Tor E. BjĜrstad, Christian Rechberger, Matt Robshaw, Gautham Sekar
16:00 – 16:30 Coffee break
Session 8: ANALYSIS OF STREAM CIPHERS II Chair: Julien Bringer
16:30 – 17:00 Stream Ciphers using a Random Update Function: Study of the Entropy of the Inner State PDF Slides
Andrea Röck
17:00 – 17:30 Analysis of Grain’s Initialization Algorithm PDF Slides
Christophe De Canniere, Özgül Küçük, Bart Preneel
17:30 – --:-- Rump Session Chair: Abderrahmane Nitaj
- Preimage attacks on HAVAL and MD5 PDF Slides
Jean-Philippe Aumasson, Willi Meier, Florian Mendel
- (Second) preimage attacks on Codefish PDF Slides
Jean-Philippe Aumasson
- Other Rijndael Properties
Marine Minier
- AFRICACRYPT2009, Tunisia
Sami Ghazali
21:00 – --:-- Gala dinner
Friday, June 13, 2008
Session 9: HASH FUNCTIONS Chair: Daniel Bernstein
09:00 – 09:30 Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function Power Point Slides
Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
09:30 – 10:00 How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? PDF Slides
Jean-Philippe Aumasson and Raphael C.-W. Phan
10:00 – 10:30 Coffee break
Session 10: BROADCAST ENCRYPTION Chair: Tanja Lange
10:30 – 11:00 Attribute-Based Broadcast Encryption Scheme Made Efficient PDF Slides
David Lubicz, Thomas Sirvent
11:00 – 11:30 Lower Bounds for Subset Cover Based Broadcast Encryption PDF Slides
Per Austrin, Gunnar Kreitz
11:30 – 12:30 Invited talk 3:
The Psychology of Security
Bruce Schneier
12:30 – 14:30 Lunch break
Session 11: IMPLEMENTATION Chair: Marc Joye
14:30 – 15:00 On Compressible Pairings and their Computation PDF Slides
Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
15:00 – 15:30 Twisted Edwards Curves PDF Slides
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
15:30 – 16:00 Efficient Multiplication in F3lm PDF Slides
Murat Cenk, Ferruh Özbudak
16:00 – 16:05 Closing remarks
Saturday - Sunday, June 14-15, 2008: Excursion to Marrakech
Departure for Marrakech : Saturday, June 14, 2008 at 09:00
Return to Casablanca : Sunday, June 15, 2008 at 10:00