Sessions & Workshops

Tuesday, February 26, 2013

  • Invited Talk I

    • 1:10pm – 2:10pm | Room 122 | CRYP-T17

    Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Read More →

    Conference Track:
    Participant:
    Nadia Heninger - Visiting Researcher, Microsoft
  • Side Channel Attacks I

    • 2:30pm – 3:30pm | Room 122 | CRYP-T18

    Cryptographic algorithms today are designed to withstand a great deal of cryptanalytic efforts. Side channel attacks, discussed here, are methods to attack insecure implementations of secure… Read More →

    Conference Track:
    Participants:
    Justine Wild - Inspecteur ANSSI, Agence Nationale de la Securite des Systemes d'Information
    Pierre-Alain Fouque - Professor in Computer Science, University of Rennes 1
  • Digital Signatures I

    • 3:50pm – 4:50pm | Room 122 | CRYP-T19

    Digital signatures with various properties including intricate privacy and key management characteristics are some of the most useful cryptographic primitives. This session is dedicated to advances in… Read More →

    Conference Track:
    Participants:
    Cheng Chen - Student, The Institute of Software, Chinese Academy of Sciences
    Philippe Camacho - Ph.D. Student, University of Chile

Wednesday, February 27, 2013

Thursday, February 28, 2013

  • Symmetric Key Primitives I

    • 8:00am – 9:00am | Room 122 | CRYP-R31

    Symmetric key primitives such as block ciphers and hash functions are fast algorithms that are widely used and deployed. This session is concerned with attacks on symmetric-key constructions. Topic 1:… Read More →

    Conference Track:
    Participants:
    Kerem Varici - Researcher, KU Leuven - COSIC
    Martin Schläffer - Postdoctoral Research Assistant, Graz University of Technology
    Michael Walter - Ph.D. Student, UC San Diego
  • Side Channel Attacks II

    • 9:20am – 10:20am | Room 122 | CRYP-R32

    Cryptographic algorithms today are designed to withstand a great deal of cryptanalytic efforts. Side channel attacks are methods to attack insecure implementations of secure algorithms. This session… Read More →

    Conference Track:
    Participants:
    Thomas Korak - Researcher, IAIK TU Graz
    Yu Yu - Associate Professor, East China Normal University and Tsinghua University
  • Cryptographic Protocols II

    • 10:40am – 11:40am | Room 122 | CRYP-R33

    Cryptographic protocols are a composition of several primitives, offering various functionalities and capabilities. There is a constant need to answer new challenges and improve the efficiency of… Read More →

    Conference Track:
    Participants:
    Aniket Kate - Research Group Leader, Cluster of Excellence, Saarland University
    Jovan Golic - Senior Technical Leader, Telecom Italia IT – Security Lab
  • Public-Key Encryption II

    • 1:00pm – 2:00pm | Room 122 | CRYP-R35

    Public key encryption, one of the cornerstones of modern cryptography, is a very active research topic with continuous need for improvements in efficiency and security. In this session, new encryption… Read More →

    Conference Track:
    Participants:
    Manh Ha Nguyen - Doctor Course Student, Tokyo Institute of Technology
    Mingjie Liu - Post Doctoral Researcher, Beijing International Center for Mathematical Research, Peking University

Friday, March 1, 2013

  • Identity-Based Encryption

    • 9:00am – 10:00am | Room 122 | CRYP-F41

    Identity-based cryptography is a form of public key cryptography in which the public key is replaced by the identity of the key owner, or any string chosen at will. A huge number of identity-based… Read More →

    Conference Track:
    Participants:
    Jae Hong Seo - Researcher, Myongji University, Republic of Korea
    Karyn Benson - Ph.D. Student, UCSD
    Yunlei Zhao - Professor, Software School, Fudan University
  • Symmetric Key Primitives II

    • 10:20am – 11:20am | Room 122 | CRYP-F42

    Symmetric key primitives are fast algorithms that are widely used and deployed. This session is concerned with new symmetric-key constructions and analysis of algorithms. Topic 1: The Low-Call Diet:… Read More →

    Conference Track:
    Participants:
    Gaven Watson - Research Assistant, University of Bristol
    Jiqiang Lu - Scientist, Institute for Infocomm Research
    Michal Hojsik - Assistant Professor, Charles University in Prague

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions on Fri, 31 Oct 2014 03:40:48 -0400.
© 2014 EMC Corporation. All rights reserved.