Agenda

Tuesday, February 28, 2012

  • Invited Talk I

    • 1:10pm – 2:20pm | Room 300 | CRYP-106

    The impact of cryptography on platform security. Read More →

    Conference Track:
    Participant:
    Ernie Brickell - Security CPT Architecture, Intel
  • Side Channel Attacks I

    • 2:40pm – 3:30pm | Room 300 | CRYP-107

    Cryptographic algorithms today are designed to withstand a great deal of cryptanalytic efforts. Side channel attacks, as the ones discussed in this session, are methods to attack insecure… Read More →

    Conference Track:
    Participants:
    Benedikt Gierlichs - Postdoctoral researcher, KU Leuven, COSIC
    Josep Balasch - Ph.D. Student, K.U.Leuven ESAT/COSIC
  • Digital Signatures I

    • 3:50pm – 5:00pm | Room 300 | CRYP-108

    Digital signatures with various properties including intricate privacy and key management characteristics are some of the most useful cryptographic primitives. This season is dedicated to advances in… Read More →

    Conference Track:
    Participants:
    Carla Ràfols - Postdoc at the Ruhr-Universität Bochum, Universitat Rovira i Virgili and Unesco Chair in Data Privacy
    Philippe Camacho - Ph.D. Student, University of Chile

Wednesday, February 29, 2012

  • Public-Key Encryption I

    • 8:00am – 9:10am | Room 300 | CRYP-201

    Public key encryption, being one of the cornerstones of modern cryptography, is a very active research topic with continuous need for improvements in terms of efficiency and security. In this session, … Read More →

    Conference Track:
    Participants:
    Colin Walter - Director of Distance Learning, Royal Holloway University of London
    Nicolas Estibals - Ph.D. Student, University of Lorraine
    Takanori Yasuda - Researcher, Institute of Systems, Information Technologies and Nanotechnologies
  • Cryptographic Protocols I

    • 9:30am – 10:20am | Room 300 | CRYP-202

    Cryptographic protocols are a composition of several primitives, offering various functionalities and capabilities. There is a constant need to answer new challenges, improve the efficiency of… Read More →

    Conference Track:
    Participants:
    Eiichiro Fujisaki - Senior Research Scientist, NTT Corporation
    Jean Paul Degabriele - Ph.D. Student, Royal Holloway University of London
  • Invited Talk II

    • 10:40am – 11:30am | Room 300 | CRYP-203

    Attacks on Advanced Encryption Standard: Results and Perspectives Read More →

    Conference Track:
    Participant:
    Dmitry Khovratovich - Research Assistant, University of Luxembourg, Luxembourg
  • Secure Implementation Methods

    • 1:00pm – 1:50pm | Room 300 | CRYP-204

    Security is a complex thing to achieve. One has to use secure algorithms, but at the same time, one has to implement the algorithm such that no security breaches will be introduced in the… Read More →

    Conference Track:
    Participants:
    Dan Page - Lecturer, University of Bristol
    Houssem Maghrebi - Ph.D. Student, Telecom ParisTech

Thursday, March 1, 2012

  • Symmetric Key Primitives

    • 8:00am – 9:10am | Room 300 | CRYP-301

    Symmetric key primitives such as hash functions and message authentication codes are fast algorithms that are widely used and deployed. This session is concerned with new symmetric-key constructions… Read More →

    Conference Track:
    Participants:
    Gaetan Leurent - Postdoctoral Researcher, University of Luxembourg
    Takanori Yasuda - Researcher, Institute of Systems, Information Technologies and Nanotechnologies
    Virendra Kumar - Graduate Research Assistant, Georgia Institute of Technology
  • Side Channel Attacks II

    • 9:30am – 10:20am | Room 300 | CRYP-302

    Cryptographic algorithms today are designed to withstand a great deal of cryptanalytic efforts. Side channel attacks, as the ones discussed in this session, are methods to attack insecure… Read More →

    Conference Track:
    Participants:
    Johann Heyszl - Scientific Employee, Fraunhofer Research Institution AISEC
    Shivam Bhasin - Research Engineer, Telecom ParisTech
  • Digital Signatures II

    • 10:40am – 11:30am | Room 300 | CRYP-303

    Digital signatures with various properties including intricate privacy and key management characteristics are some of the most useful cryptographic primitives. This session is dedicated to advances in… Read More →

    Conference Track:
    Participants:
    Jonas Kölker - Ph.D. Student, Aarhus University
    Shota Yamada - Doctor Course Student, University of Tokyo
  • Cryptographic Protocols II

    • 1:00pm – 1:50pm | Room 300 | CRYP-304

    Cryptographic protocols are a composition of several primitives, offering various functionalities and capabilities. There is a constant need to answer new challenges, improve the efficiency of… Read More →

    Conference Track:
    Participants:
    Gert Mikkelsen - Research & Innovation Scientist, The Alexandra Institute Inc.
    Pooya Farshim - Postdoctoral Research Assistant, Darmstadt University of Technology

Friday, March 2, 2012

  • Public-Key Encryption II

    • 9:00am – 9:50am | Room 300 | CRYP-401

    Public key encryption being one of the cornerstones of modern cryptography is a very active research topic with continuous need for improvements in terms of efficiency and security. In this session, … Read More →

    Conference Track:
    Participants:
    Sébastien Canard - Research Engineer, Orange Labs
    Yutaka Kawai - Ph.D. Student, University of Tokyo
  • Side Channel Attacks III

    • 10:10am – 11:00am | Room 300 | CRYP-402

    Cryptographic algorithms today are designed to withstand a great deal of cryptanalytic efforts. Side channel attacks, as the ones discussed in this session, are methods to attack insecure… Read More →

    Conference Track:
    Participants:
    Annelie Heuser - Ph.D. Student, Darmstadt University of Technology
    Lejla Batina - Assistant Professor, Radboud University Nijmegen
  • Secure Multiparty Computation

    • 11:20am – 12:10pm | Room 300 | CRYP-403

    This session is dedicated to advances in secure multiparty computation. Such protocols enable the computation of specific or general classes of functions between multiple parties in such a manner that… Read More →

    Conference Track:
    Participants:
    Saeed Sadeghian - Ph.D. Student, University of Calgary
    Seung Geol Choi - Postdoctoral Researcher, University of Maryland

This document was retrieved from http://www.rsaconference.com/events/us12/agenda on Wed, 22 Oct 2014 17:40:39 -0400.
© 2014 EMC Corporation. All rights reserved.