Papers are provided here for fast dissemination of technical work on a noncommercial basis. Copyrights of publishers and/or authors pertain and it is understood that persons making copies of the papers adhere to these copyrights.
Thursday, 20th of September
10:30 - 10:55 | Coffee & registration |
10:55 - 11:00 | Welcome Sjouke Mauw |
Session: Crypto Session chair: Saša Radomirović |
|
11:00 - 11:30 | Edon-R(256,384,512) -- an Efficient Implementation of
Edon-R Family of Cryptographic Hash Functions Danilo Gligoroski and Svein Johan Knapskog |
12:00 - 12:30 | Finite Field Multipliers for Ultra-Constrained Environments (slides) J. Guajardo, T. Kerins, S. S. Kumar and P. Tuyls |
12:30 - 13:45 | Lunch |
Session: Detection Session chair: Yannick Chevalier |
|
13:45 - 14:15 | APHRODITE: an Anomaly-based Architecture for False Positive
Reduction Damiano Bolzoni, Sandro Etalle |
14:15 - 14:45 | Predicting Vulnerable Software Components Stephan Neuhaus, Thomas Zimmermann, Andreas Zeller |
Session: RFID Session chair: Jorge Guajardo Merchan |
|
14:45 - 15:15 | Strenghtening the Tree-Based Hash Protocols against compromise
of some tags Julien Bringer, Hervé Chabanne and Thomas Icart |
Session: Information theory Session chair: Boris Skoric |
|
15:15 - 15:45 | Mutual Information Analysis
-- A Universal Differential Side-Channel Attack Benedikt Gierlichs, Lejla Batina and Pim Tuyls |
15:45 - 16:00 | Coffee break |
16:00 - 16:30 | The Best of Both Worlds: Applying Secure Sketches to Cancelable
Biometrics Julien Bringer, Hervé Chabanne and Bruno Kindarji |
Session: Content protection technologies Session chair: Sandro Etalle |
|
16:30 - 17:00 | Symmetric Tardos fingerprinting codes for arbitrary alphabet
sizes (slides) B. Skoric, S. Katzenbeisser and M.U. Celik |
17:00 - 17:30 | FPGA Intrinsic PUFs and Their Use for IP Protection (slides) Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen and Pim Tuyls |
17:45 - 18:15 | PC MEETING parallel with Unofficial tour of Luxembourg by Mrs. D. Priemuth-Schmid |
19:30 - ... | WORKSHOP DINNER |
Friday 21st of September
8:30 - 9:30 | Keynote address: Products of small primes in various scientific fields David Naccache |
9:30 - 9:45 | Coffee break |
Session: Formal Methods Session chair: Danilo Gligoroski |
|
9:45 - 10:15 | Towards an Automatic Analysis of Web Service
Security Yannick Chevalier, Denis Lugiez, Michael Rusinowitch |
10:15 - 10:45 | Towards mechanized correctness proofs for
cryptographic algorithms (tbp in Science of Computer
Programming) J.I. den Hartog |
10:45 - 11:15 | Model-based Mitigation of Availability Risks Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle and Marco Salvato |
11:15 - 11:30 | Coffee break |
Session: Access control Session chair: Michael Rusinowitch |
|
11:30 - 12:00 | On
Administration of RBAC in Distributed Systems (slides) M.A.C. Dekker, J. Crampton and S. Etalle |
12:00 - 12:30 | Provably Secure RFID authentication protocol; EC-RAC (ECDLP
Based Randomized Access Control) Yong Ki Lee, Lejla Batina and Ingrid Verbauwhede |
12:30 - 14:00 | Lunch |
14:00 - 15:00 | Invited lecture: Security of popular hash functions Christian Rechberger |
15:00 - 15:15 | Coffee break |
Session: Architectures Session chair: Stephan Neuhaus |
|
15:15 - 15:45 | Enterprise Network Node Discovery and Topology Analysis: An
Experience Report Johan Sigholm and Simin Nadjm-Tehrani |
Session: Privacy Session chair: Jerry den Hartog |
|
15:45 - 16:15 | Vote buying revisited: implications for receipt-freeness Wolter Pieters and Hugo Jonker |
16:15 - 16:45 | Privacy Friendly SybilGuard Stefan Schiffner, Markulf Kohlweiss and Bart Preneel |
16:45 | Closing |
The follow paper was accepted, but due to circumstances unfortunaly not presented at the workshop:
- Space Efficient Computation of Scalar
Multiplication with Applications to Hand-held Devices (tbp in SCP)
S. Ramesh Raju and C. Pandu Rangan