8:50 - 9:00 | Welcome |
|||
Session 1: Towards SHA-3 |
||||
9:00 - 9:40 | Vincent Rijmen (KU Leuven, Belgium) The SHA-3 process [abstract & slides] |
|||
9:40 - 10:20 | Elena Andreeva (KU Leuven, Belgium) Security of SHA-3: the provable security perspective [abstract] |
|||
Session 2: Keccak |
||||
10:50 - 11:30 | Joan Daemen (STMicroelectronics, Belgium) Permutation-based cryptography [abstract & slides] |
|||
11:30 - 12:10 | Gilles Van Assche (STMicroelectronics, Belgium) Inside Keccak [abstract & slides] |
|||
Session 3: Cryptanalysis |
||||
13:30 - 14:10 | Maria Naya-Plasencia (INRIA, France) First practical results on reduced-round Keccak and Unaligned rebound attack [abstract & slides] |
|||
14:10 - 14:50 | Orr Dunkelman (University of Haifa, Israël) Four rounds are not enough [abstract & slides] |
|||
14:50 - 15:30 | Itai Dinur (Weizmann Institute, Israël) Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials [abstract & slides] |
|||
16:00 - 16:40 | Anne Canteaut (INRIA, France) On some algebraic properties of Keccak [abstract & slides] |
|||
Session 4: Implementation |
||||
16:40 - 17:20 | Christian Wenzel-Benner (ITK Engineering AG, Germany) SHA-3 optimization and benchmarking: an engineer's perspective [abstract & slides] |
|||
17:20 - 18:00 | Michaël Peeters (NXP Semiconductors, Belgium) Implementation aspects of Keccak [abstract & slides] |
|||
18:00 - 18:10 | Closing remarks |