Kristin Lauter: Microsoft Research, USA Cinvestav, MEX Francisco Rodríguez-Henríquez: General Chair Luis J. Dominguez Perez: CIMAT, MEX Francisco Rodríguez-Henríquez: Cinvestav, MEX National organizing Committee Nareli Cruz-Cortés: CIC-IPN, MEX Luis J. Dominguez Perez: CIMAT, MEX Jorge Enrique González-Díaz: Intel, MEX Francisco Rodríguez-Henríquez: Cinvestav, Av. del Bosque 1145, El Bajío, 45019 Zapopan, Jal. MEX Activities the Advanced School on Cryptology and Information Security in Latin America will consist of four short courses. It will take place on August 22nd and 23rd , and will be held at Cinvestav Guadalajara. Free transportation from Hotel De Mendoza will be available. Social Activities All the social activities are covered in the registration fee. ASCrypto 2015: is the Fourth International Conference on Cryptology and Information Security in Latin America and is organized by Cinvestav in cooperation with the International Association for Cryptologic Research (IACR). The conference will be held at Hotel De Mendoza in Guadalajara city, Mexico. LatinCrypt 2015: Gala Dinner We will take a tour to an ancient tequila factory, the Hacienda San Jose del Refugio Casa Herradura. The trip itinerary is: 18:00 Bus departure from Hotel De Mendoza. 19:15 Arrival at Hacienda San Jose del Refugio Casa Herradura. 19:20 Tour to learn the tequila making process. 20:30 Mexican food buet. 20:50 Mariachi show. 22:45 Bus departure to Guadalajara. 23:45 Arrival to Hotel De Mendoza. ........................................................................................................................................... Program Chair Fourth International Conference on Cryptology and Information Security in Latin America August 23rd to August 26th Invited Speakers LatinCrypt 2015 Monday, August 24 Ecient RKA-Secure KEM and IBE Schemes against Invertible Functions Eiichiro Fujisaki and Keita Xagawa Simulation-Based Secure Functional Encryption in the Random Oracle Model Vincenzo Iovino and Karol Zebrowski The Simplest Protocol for Oblivious Transfer Tung Chou and Claudio Orlandi Coee break 10:30-11:00 Opening remarks 08:50-09:00 09:00-09:30 Yuriy Bulygin Prof. Jung Hee Cheon Prof. Adi Shamir Prof. Tal Rabin 09:30-10:00 10:00-10:30 11:00-11:30 PROGRAM Advanced School of Cryptography 08:30-10:15 10:15-10:45 10:45-12:30 12:30-14:30 14:30-16:30 16:30-17:00 17:00-19:00 19:00-20:00 08:30-10:15 10:15-10:45 10:45-12:30 12:30-14:30 14:30-16:30 16:30-17:00 17:00-18:00 Saturday, August 22 Sandra Díaz Santiago: A brief introduction to provable security Coee break Mehdi Tibuchi: An introduction to cryptographic multilinear maps Lunch Sandra Díaz Santiago: A brief introduction to provable security Coee break Mehdi Tibuchi: An introduction to cryptographic multilinear maps Diego Aranha: Software Vulnerabilities in the Brazilian voting machines Sunday, August 23 Sorina Ionica: Introduction to elliptic curve cryptography Coee break Diego Aranha: Software implementation of bilinear pairings Lunch Sorina Ionica: Introduction to elliptic curve cryptography Coee break Diego Aranha: Software implementation of bilinear pairings Session I: Protocols Session II: Foundations Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing Thijs Laarhoven and Benne de Weger FHEW with ecient multibit bootstrapping Jean-Francois Biasse and Luis Ruiz Coee break 16:00-16:30 Depth Optimized Ecient Homomorphic Sorting Gizem S. Çetin et al. The Chain Rule for HILL Pseudoentropy, Revisited Krzysztof Pietrzak and Maciej Skorski Invited Talk: Tal Rabin (A Fair Journey) Lunch break 12:00-13:00 13:00-15:00 11:30-12:00 Session III: Post-Quantum crypto 15:00-15:30 15:30-16:00 Session IV: Cryptoanalysis on symmetric crypto (1/2) 16:30-17:00 17:00-17:30 17:30-18:30 18:30- 09:00-09:30 09:30-10:00 Improved Top-Down Techniques in Dierential Cryptanalysis Itai Dinur et al. Algebraic Analysis of the Simon Block Cipher Family Håvard Raddum Student & Post-doc presentations I Free time Twisted Hessian curves Daniel J. Bernstein 16:30-17:00 Computing Optimal 2-3 Chains for Pairings Alex Capuñay and Nicolas Thériault Subgroup security in pairing-based cryptography Paulo S. L. M. Barreto et al. Invited Talk: Adi Shamir (Improved Attacks on Generic Block Ciphers) Lunch break Invited Talk: Jung Hee Cheon (Cryptanalysis of multilinear maps over the integers) Coee break 16:00-16:30 State-recovery analysis of Spritz Ralph Ankele et al. Coee break 10:30-11:00 10:00-10:30 11:00-11:30 11:30-12:00 12:00-13:00 13:00-15:00 15:00-16:00 Session VI: Pairings Session VII: Curves in Cryptography 17:00-17:30 17:30-18:00 18:00-18:30 18:30-24:00 09:30-10:30 10:30-11:00 et al. Improved Sieving on Algebraic Curves Vanessa Vitse and Alexandre Wallet Attacking a binary GLS elliptic curve with Magma Jesús-Javier Chi and Thomaz Oliveira Free time Gala Dinner Wednesday, August 26 Invited Talk: Yuriy Bulygin and Andrew Furtak (ASN.1 parsing in crypto libraries: what could go wrong?) Coee break Session VIII: Implementations 11:00-11:30 11:30-12:00 12:00-12:30 Tuesday, August 25 Session V: Cryptoanalysis on symmetric crypto (2/2) Cryptanalysis of the full 8.5-round REESSE3+ block cipher Jorge Nakahara Jr Meet-in-the-Middle Attacks on Reduced Round Hierocrypt-3 Ahmed Abdelkhalek 13:00-15:00 15:00-16:00 16:00-16:30 16:30-18:30 18:30- Fast Implementation of Curve25519 using AVX2 Armando Faz-Hernández and Julio López High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers Thomas Pöppelmann et al. An ecient software implementation of the hash-based signature scheme MSS and its variants Ana Karina D. S. de Oliveira and Julio López Lunch break Students & Post-doc presentations II Coee break Students & Post-doc presentations III Adios et al.
© Copyright 2024