Print

Kristin Lauter:
Microsoft Research, USA
Cinvestav, MEX
Francisco Rodríguez-Henríquez:
General Chair
Luis J. Dominguez Perez: CIMAT, MEX
Francisco Rodríguez-Henríquez: Cinvestav,
MEX
National organizing Committee
Nareli Cruz-Cortés: CIC-IPN, MEX
Luis J. Dominguez Perez: CIMAT, MEX
Jorge Enrique González-Díaz: Intel, MEX
Francisco Rodríguez-Henríquez: Cinvestav,
Av. del Bosque 1145, El Bajío, 45019 Zapopan, Jal.
MEX
Activities
the Advanced School on Cryptology
and Information Security in Latin America will consist
of four short courses. It will take place on August 22nd
and 23rd , and will be held at Cinvestav Guadalajara.
Free transportation from Hotel De Mendoza will be
available.
Social Activities
All the social activities are covered in the registration
fee.
ASCrypto 2015:
is the Fourth International Conference on Cryptology and Information Security in
Latin America and is organized by Cinvestav in cooperation with the International Association for Cryptologic Research (IACR). The conference will be held
at Hotel De Mendoza in Guadalajara city, Mexico.
LatinCrypt 2015:
Gala Dinner
We will take a tour to an ancient tequila factory, the
Hacienda San Jose del Refugio Casa Herradura. The
trip itinerary is:
18:00 Bus departure from Hotel De Mendoza.
19:15 Arrival at Hacienda San Jose del Refugio
Casa Herradura.
19:20 Tour to learn the tequila making process.
20:30 Mexican food buet.
20:50 Mariachi show.
22:45 Bus departure to Guadalajara.
23:45 Arrival to Hotel De Mendoza.
...........................................................................................................................................
Program Chair
Fourth International Conference on Cryptology and
Information Security in Latin America
August 23rd to August 26th
Invited Speakers
LatinCrypt 2015
Monday, August 24
Ecient RKA-Secure KEM and IBE
Schemes against Invertible Functions Eiichiro Fujisaki and Keita Xagawa
Simulation-Based Secure Functional Encryption in the Random Oracle Model Vincenzo Iovino and Karol Zebrowski
The Simplest Protocol for Oblivious Transfer Tung Chou and Claudio Orlandi
Coee break
10:30-11:00
Opening remarks
08:50-09:00
09:00-09:30
Yuriy Bulygin
Prof. Jung Hee Cheon
Prof. Adi Shamir
Prof. Tal Rabin
09:30-10:00
10:00-10:30
11:00-11:30
PROGRAM
Advanced School of Cryptography
08:30-10:15
10:15-10:45
10:45-12:30
12:30-14:30
14:30-16:30
16:30-17:00
17:00-19:00
19:00-20:00
08:30-10:15
10:15-10:45
10:45-12:30
12:30-14:30
14:30-16:30
16:30-17:00
17:00-18:00
Saturday, August 22
Sandra Díaz Santiago: A brief introduction to provable security
Coee break
Mehdi Tibuchi: An introduction to cryptographic multilinear maps
Lunch
Sandra Díaz Santiago: A brief introduction to provable security
Coee break
Mehdi Tibuchi: An introduction to cryptographic multilinear maps
Diego Aranha: Software Vulnerabilities in
the Brazilian voting machines
Sunday, August 23
Sorina Ionica: Introduction to elliptic
curve cryptography
Coee break
Diego Aranha: Software implementation of
bilinear pairings
Lunch
Sorina Ionica: Introduction to elliptic
curve cryptography
Coee break
Diego Aranha: Software implementation of
bilinear pairings
Session I: Protocols
Session II: Foundations
Faster sieving for shortest lattice vectors
using spherical locality-sensitive hashing
Thijs Laarhoven and Benne de Weger
FHEW with ecient multibit bootstrapping Jean-Francois Biasse and Luis Ruiz
Coee break
16:00-16:30
Depth Optimized Ecient Homomorphic
Sorting Gizem S. Çetin et al.
The Chain Rule for HILL Pseudoentropy,
Revisited Krzysztof Pietrzak and Maciej
Skorski
Invited Talk: Tal Rabin (A Fair Journey)
Lunch break
12:00-13:00
13:00-15:00
11:30-12:00
Session III: Post-Quantum crypto
15:00-15:30
15:30-16:00
Session IV: Cryptoanalysis on
symmetric crypto (1/2)
16:30-17:00
17:00-17:30
17:30-18:30
18:30-
09:00-09:30
09:30-10:00
Improved Top-Down Techniques in Dierential Cryptanalysis Itai Dinur et al.
Algebraic Analysis of the Simon Block Cipher Family Håvard Raddum
Student & Post-doc presentations I
Free time
Twisted Hessian curves Daniel J. Bernstein
16:30-17:00
Computing Optimal 2-3 Chains for Pairings Alex Capuñay and Nicolas Thériault
Subgroup security in pairing-based cryptography Paulo S. L. M. Barreto et al.
Invited Talk: Adi Shamir (Improved Attacks on Generic Block Ciphers)
Lunch break
Invited Talk: Jung Hee Cheon (Cryptanalysis of multilinear maps over the integers)
Coee break
16:00-16:30
State-recovery analysis of Spritz Ralph
Ankele et al.
Coee break
10:30-11:00
10:00-10:30
11:00-11:30
11:30-12:00
12:00-13:00
13:00-15:00
15:00-16:00
Session VI: Pairings
Session VII: Curves in Cryptography
17:00-17:30
17:30-18:00
18:00-18:30
18:30-24:00
09:30-10:30
10:30-11:00
et al.
Improved Sieving on Algebraic Curves
Vanessa Vitse and Alexandre Wallet
Attacking a binary GLS elliptic curve
with Magma Jesús-Javier Chi and Thomaz
Oliveira
Free time
Gala Dinner
Wednesday, August 26
Invited Talk: Yuriy Bulygin and Andrew
Furtak (ASN.1 parsing in crypto libraries:
what could go wrong?)
Coee break
Session VIII: Implementations
11:00-11:30
11:30-12:00
12:00-12:30
Tuesday, August 25
Session V: Cryptoanalysis on
symmetric crypto (2/2)
Cryptanalysis of the full 8.5-round
REESSE3+ block cipher Jorge Nakahara
Jr
Meet-in-the-Middle Attacks on Reduced
Round Hierocrypt-3 Ahmed Abdelkhalek
13:00-15:00
15:00-16:00
16:00-16:30
16:30-18:30
18:30-
Fast Implementation of Curve25519 using
AVX2 Armando Faz-Hernández and Julio
López
High-Performance Ideal Lattice-Based
Cryptography on 8-bit ATxmega Microcontrollers Thomas Pöppelmann et
al.
An ecient software implementation of the
hash-based signature scheme MSS and its
variants Ana Karina D. S. de Oliveira and
Julio López
Lunch break
Students & Post-doc presentations II
Coee break
Students & Post-doc presentations III
Adios
et al.