Program


09.00 - 9.10 Opening remarks
09.10 - 10.00 Understanding the Duplex and Its Security Bart Mennink
10.00 - 10.30 Security of keyed hashing based on a public permutation Jonathan Fuchs
10.30 - 11.00 Coffee Break
11.00 - 11.30 Algebraic Attacks on Round-Reduced Keccak Fukang Liu
11.30 - 12.00 How to Find and Prove the Inverse of \chi? Fukang Liu
12.00 - 14.00 Lunch
14.00 - 14.40 Permutation-based APIs: a framework for future-proof cryptographic APIs Frank Denis
14.40 - 15.25 The Ascon Family for Lightweight Cryptography Maria Eichlseder
15.25 - 16.10 The past, present, and futures of Ascon parameterisation Arne Padmos
16.10 - 16.30 Coffee Break
16.30 - 17.10 Differential analysis of the ternary hash function Troika Margot Funk
17.10 - 17.40 Maximum Nonlinearity of Permutations on Z_p & Z_2p Prachi Gupta
17.40 - 18.10 RC64: Fast Arithmetization-Friendly Hashing Roman Walch
18.10 - 18.20 Closing remarks