Papers are provided here for fast dissemination of technical work on a noncommercial basis. Copyrights of publishers and/or authors pertain and it is understood that persons making copies of the papers adhere to these copyrights.
Thursday, 20th of September
| 10:30 - 10:55 | Coffee & registration |
| 10:55 - 11:00 | Welcome Sjouke Mauw |
| Session: Crypto Session chair: Saša Radomirović |
|
| 11:00 - 11:30 | Edon-R(256,384,512) -- an Efficient Implementation of
Edon-R Family of Cryptographic Hash Functions Danilo Gligoroski and Svein Johan Knapskog |
| 12:00 - 12:30 | Finite Field Multipliers for Ultra-Constrained Environments (slides) J. Guajardo, T. Kerins, S. S. Kumar and P. Tuyls |
| 12:30 - 13:45 | Lunch |
| Session: Detection Session chair: Yannick Chevalier |
|
| 13:45 - 14:15 | APHRODITE: an Anomaly-based Architecture for False Positive
Reduction Damiano Bolzoni, Sandro Etalle |
| 14:15 - 14:45 | Predicting Vulnerable Software Components Stephan Neuhaus, Thomas Zimmermann, Andreas Zeller |
| Session: RFID Session chair: Jorge Guajardo Merchan |
|
| 14:45 - 15:15 | Strenghtening the Tree-Based Hash Protocols against compromise
of some tags Julien Bringer, Hervé Chabanne and Thomas Icart |
| Session: Information theory Session chair: Boris Skoric |
|
| 15:15 - 15:45 | Mutual Information Analysis
-- A Universal Differential Side-Channel Attack Benedikt Gierlichs, Lejla Batina and Pim Tuyls |
| 15:45 - 16:00 | Coffee break |
| 16:00 - 16:30 | The Best of Both Worlds: Applying Secure Sketches to Cancelable
Biometrics Julien Bringer, Hervé Chabanne and Bruno Kindarji |
| Session: Content protection technologies Session chair: Sandro Etalle |
|
| 16:30 - 17:00 | Symmetric Tardos fingerprinting codes for arbitrary alphabet
sizes (slides) B. Skoric, S. Katzenbeisser and M.U. Celik |
| 17:00 - 17:30 | FPGA Intrinsic PUFs and Their Use for IP Protection (slides) Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen and Pim Tuyls |
| 17:45 - 18:15 | PC MEETING parallel with Unofficial tour of Luxembourg by Mrs. D. Priemuth-Schmid |
| 19:30 - ... | WORKSHOP DINNER |
Friday 21st of September
| 8:30 - 9:30 | Keynote address: Products of small primes in various scientific fields David Naccache |
| 9:30 - 9:45 | Coffee break |
| Session: Formal Methods Session chair: Danilo Gligoroski |
|
| 9:45 - 10:15 | Towards an Automatic Analysis of Web Service
Security Yannick Chevalier, Denis Lugiez, Michael Rusinowitch |
| 10:15 - 10:45 | Towards mechanized correctness proofs for
cryptographic algorithms (tbp in Science of Computer
Programming) J.I. den Hartog |
| 10:45 - 11:15 | Model-based Mitigation of Availability Risks Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle and Marco Salvato |
| 11:15 - 11:30 | Coffee break |
| Session: Access control Session chair: Michael Rusinowitch |
|
| 11:30 - 12:00 | On
Administration of RBAC in Distributed Systems (slides) M.A.C. Dekker, J. Crampton and S. Etalle |
| 12:00 - 12:30 | Provably Secure RFID authentication protocol; EC-RAC (ECDLP
Based Randomized Access Control) Yong Ki Lee, Lejla Batina and Ingrid Verbauwhede |
| 12:30 - 14:00 | Lunch |
| 14:00 - 15:00 | Invited lecture: Security of popular hash functions Christian Rechberger |
| 15:00 - 15:15 | Coffee break |
| Session: Architectures Session chair: Stephan Neuhaus |
|
| 15:15 - 15:45 | Enterprise Network Node Discovery and Topology Analysis: An
Experience Report Johan Sigholm and Simin Nadjm-Tehrani |
| Session: Privacy Session chair: Jerry den Hartog |
|
| 15:45 - 16:15 | Vote buying revisited: implications for receipt-freeness Wolter Pieters and Hugo Jonker |
| 16:15 - 16:45 | Privacy Friendly SybilGuard Stefan Schiffner, Markulf Kohlweiss and Bart Preneel |
| 16:45 | Closing |
The follow paper was accepted, but due to circumstances unfortunaly not presented at the workshop:
- Space Efficient Computation of Scalar
Multiplication with Applications to Hand-held Devices (tbp in SCP)
S. Ramesh Raju and C. Pandu Rangan