09.00 - 9.10 | Opening remarks |
---|---|
09.10 - 10.00 | Understanding the Duplex and Its Security Bart Mennink |
10.00 - 10.30 | Security of keyed hashing based on a public permutation Jonathan Fuchs |
10.30 - 11.00 | Coffee Break |
11.00 - 11.30 | Algebraic Attacks on Round-Reduced Keccak Fukang Liu |
11.30 - 12.00 | How to Find and Prove the Inverse of \chi? Fukang Liu |
12.00 - 14.00 | Lunch |
14.00 - 14.40 | Permutation-based APIs: a framework for future-proof cryptographic APIs Frank Denis |
14.40 - 15.25 | The Ascon Family for Lightweight Cryptography Maria Eichlseder |
15.25 - 16.10 | The past, present, and futures of Ascon parameterisation Arne Padmos |
16.10 - 16.30 | Coffee Break |
16.30 - 17.10 | Differential analysis of the ternary hash function Troika Margot Funk |
17.10 - 17.40 | Maximum Nonlinearity of Permutations on Z_p & Z_2p Prachi Gupta |
17.40 - 18.10 | RC64: Fast Arithmetization-Friendly Hashing Roman Walch |
18.10 - 18.20 | Closing remarks |