[crypto] [seccc at tue.nl: WISSec 2009 -- Call for Participation]
R. Hirschfeld
ray at unipay.nl
Fri Nov 6 14:31:32 CET 2009
------- Start of forwarded message -------
From: Secretariaat CC <seccc at tue.nl>
To: Secretariaat CC <seccc at tue.nl>
Date: Fri, 6 Nov 2009 11:33:40 +0100
Subject: WISSec 2009 -- Call for Participation
=========================================================================
4th Benelux Workshop on
Information and System Security (WISSec 2009)
19-20 November 2009, Louvain-la-Neuve, Belgium
http://www.uclouvain.be/crypto/wissec2009/
Supported by the BCRYPT IAP PVI/26
REGISTRATION
<http://www.dice.ucl.ac.be/crypto/wissec2009/register>
RUMP SESSION
A rump session will be organized after the workshop dinner. Short
talks about work in progress and entertaining presentations are most
welcome!
PROGRAM
November 19, 2009
12:30: Welcome lunch
14:00: Session 1: Implementation
* Yves Edel and Andreas Klein. Computational aspects of fast
correlation attacks
* Anthony Van Herrewege, Miroslav Knezevic, Lejla Batina, Ingrid
Verbauwhede and Bart Preneel. Compact Implementations of
Pairings
* Boris Skoric. Quantum readout of Physical Unclonable Functions
15:30: Coffee break
16:00: Invited talk by Alex Biryukov
17:00: Session 2: Side Channels
* Jorge Guajardo and Bart Mennink. Towards Side-Channel Resistant
Block Cipher Usage or Can We Encrypt Without Side-Channel
Countermeasures?
* Jiqiang Lu, Jing Pan and Jerry den Hartog. Regarding the
Security of AES against First and Second-Order Differential
Power Analysis
18:00: Business meeting
18:30: Workshop dinner
20:00: Rump session
November 20, 2009
9:30: Session 3: Voting
* Feng Hao, Peter Ryan and Piotr Zielinski. Anonymous Voting by
2-Round Public Discussion
* Ben Smyth, Mark Ryan, Steve Kremer and Mounira
Kourjieh. Election verifiability in electronic voting protocols
* Ben Adida, Olivier de Marneffe, Olivier Pereira and Jean-Jacques
Quisquater. Electing a University President using Open-Audit
Voting: Analysis of real-world use of Helios
11:00: Coffee break
11:30: Invited talk by Marc Girault:
Cryptology and Elliptic Curves : a 25-year love (?) story
12:30: Lunch
13:30: Session 4: Protocols
* Jorge Guajardo, Bart Mennink and Berry Schoenmakers. Modulo
Reduction for Paillier Encryptions and Application to Secure
Statistical Analysis
* Gildas Avoine, Christian Floerkemeier and Benjamin Martin. RFID
Distance Bounding Multistate Enhancement (Short Version)
* Yasser Phoulady. Sharing A Labeled Tree
15:00: Coffee break
15:30: Session 5: Security
* Damiano Bolzoni, Sandro Etalle and Pieter Hartel. Panacea:
Automating Attack Classification for Anomaly-based Network
Intrusion Detection Systems
* Wojciech Mostowski and Jip Hogenboom. Full Memory Attack on a
Java Card
16:30: Closing
WORKSHOP GOAL AND TOPICS
The purpose of the workshop is to share ideas, experiences and
information on the following, or related, topics:
* Design and analysis of cryptographic algorithms
* Cryptographic and security protocols, formal verification
* Network security, Internet security, Wireless security
* Security for embedded systems, smart cards and RFID
* Security of software and hardware systems
* Privacy enhancing technologies
* E-voting, e-banking, e-governement
* Financial cryptography and security
* Content protection, DRM, watermarking
* Biometrics
* Standards for information security
* Legal and social aspect of information security
* Ethical hacking, protection against malware, spam
The workshop intends to give both experienced and young researchers
from the Benelux and surrounding areas an opportunity to present their
work and to get feedback. We would also like to encourage other
international researchers to contribute to the workshop.
=========================================================================
------- End of forwarded message -------
More information about the crypto
mailing list