Conference program

Tuesday, May 20

17:00 - 18:00	Registration desk open

Wednesday, May 21

08:30 - 09:15	Registration desk open
09:15 - 09:30	Conference opening
09:30 - 10:30	Invited talk: Krzysztof Pietrzak

10:30 - 11:00	Coffee break

11:00 - 11:30	Nicolas Courtois, Theodosis Mourouzis, 
                  Anna Grocholewska-Czurylo and Jean-Jacques Quisquater:
                  On Optimal Size in Truncated Differential Attacks
11:30 - 12:00	Pavol Zajac:
                  On 8x8 S-boxes with low multiplicative complexity
12:00 - 12:30	Mateusz Buczek and Marcin Kontak:
                  Cryptanalysis of the HaF Family of Hash Functions

12:30 - 14:00	Lunch

14:00 - 14:30	Damian Vizár and Serge Vaudenay:
                   Cryptanalysis of Chosen Symmetric Homomorphic Schemes
14:30 - 15:00	Oleksandr Kazymyrov, Valentyna Kazymyrova, 
                  Anna Maria Eilertsen and Maksim Storetvedt:
                  A Sage Library For Analysis Of Nonlinear Binary Mapping

15:00 - 15:30	Coffee break

15:30 - 15:50	Victor I. Ruzhentsev:
                  Conditions of provable security of block ciphers against
                  truncated differential attack
15:50 - 16:10	Marina Pudovkina:
                  Attacks on SPN block ciphers based on meet-in-the-middle
                  technique and derivatives
16:10 - 16:30	Marek Sýs, Zdeněk Říha and Vashek Matyáš:
                  Faster randomness testing with the NIST Statistical Test
                  Suite

16:30 - 16:50	Coffee break

16:50 - 17:10	Viliam Hromada and Juraj Varga:
                  Phase-shift Fault Analysis of Trivium
17:10 - 17:30	László Mérai:
                  Pseudorandomness of binary threshold sequences derived
                  from linear recursion
17:30 - 17:50	Peter Ligeti and Viktoria Villanyi:
                  Some Multi-Authority Attribute-Based Encryption Schemes
                  for Small Message Space

18:00 - 19:00   Wine and cheese party

Thursday, May 22

08:30 - 09:30	Registration desk open
09:30 - 10:30	Invited talk: Helger Lipmaa

10:30 - 11:00	Coffee break

11:00 - 11:30	Vasyl Ustimenko:
                   Explicit constructions of extremal graphs and new
                   multivariate cryptosystems
11:30 - 12:00	Maciej Grzeskowiak:
                   Pairing-Friendly Primes for Abelian Varieties
12:00 - 12:30	Clemens Heuberger and Michela Mazzoli:
                   Symmetric Digit Sets for Elliptic Curve Scalar
                   Multiplication

12:30 - 14:00	Lunch

14:00 - 14:30	Andrea Huszti and Zita Kovács:
                   Bilinear Pairing-based Hybrid Mix with Anonymity
                   Revocation
14:30 - 14:50	Eduardo Ruíz Duarte and Octavio Páez Osuna:
                   Explicit endomorphism of the Jacobian of a hyperelliptic
                   function field of genus 2 using base field operations
14:50 - 15:10	Pál Dömösi and Géza Horváth:
                   A novel cryptosystem based on abstract automata and Latin
                   cubes
15:10 - 15:30	Bence Bakondi, Péter Burcsi, Péter Györgyi, 
                   Dávid Herskovics, Péter Ligeti, László Mérai, 
                   Dániel A. Nagy and Viktória Villányi:
                   A P2P Based Storage System with Reputation Points and
                   Simulation Results
15:30 - 15:50	Norbert Tihanyi:
                  Side-channel Kleptography in Pseudo Random Number
                  Generators


18:00 Conference dinner (venue: CEU, Central Bistro, Nador utca 13)

Friday, May 23

08:30 - 09:00	Registration desk open
09:00 - 10:00	Invited talk: David Naccache

10:00 - 10:30	Tommi Meskanen, Valtteri Niemi and Noora Nieminen:
                   Hierarchy for Classes of Garbling schemes
10:30 - 11:00	Renata Kawa:
                   A hierarchy in tripartite access structures
11:00 - 11:30	G.O.H. Katona:
                   Very weak versions of secret sharing

11:30 - 12:00	Coffee break

12:00 - 12:20	Peter Burcsi, Peter Marton, Daniel Nagy and 
                   Viktoria Villanyi:
                   I want you to know, I am on my way
12:20 - 12:40	Péter Marton:
                   On Miller-Rabin primality test

End of conference