RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Workshop Hash Functions in Cryptology: Theory and Practice

International workshop organized by Ronald Cramer (CWI and Leiden University), Lars Knudsen (Technical University of Denmark), Benne de Weger (TU Eindhoven), and Martijn Stam (EPFL Lausanne).
Program available here.

Date:June 2 - 6
Location:Lorentz Center, Leiden
Schedule: 
Monday, June 2
9:00Welcome
9:50Xiaoyun Wang:
Survey of recent research on hash functions
11:20Tea break
11:35Florian Mendel:
Cryptanalysis of GOST
12:15Lunch
14:00Stefano Tessaro:
Domain Extension of Public Random Functions
14:40Christophe Petit:
Cryptographic hash functions from expander graphs: State of the art
15:20Tea break & Discussion
17:00Wine and cheese welcome party
Tuesday, June 3
9:30Marc Fischlin:
Perfectly Crafted Swiss Army Knives - in Theory
11:00Tea break
11:20Krzysztof Pietrzak:
On the Generic Insecurity of the Full Domain Hash
12:00Lunch
14:00Eike Kiltz:
Programmable Hash Functions and Their Applications
14:40Problem Session
15:40Tea break
16:00Orr Dunkelman:
Re-visiting HAIFA (and why you should visit too)
Wednesday, June 4
9:30Thomas Peyrin:
Security Analysis of Generalized Sponge Functions
11:20Anja Lehmann:
Robust Multi-Property Combiners for Hash Functions
12:00Lunch
14:00Thomas Ristenpart:
Design Paradigms for Building Multi-Property Hash Functions
14:40Problem Session
15:40Tea break
16:00Martijn Stam:
Efficient collision-resistant hashing from public random functions
17:15Boat tour with dinner
Thursday, June 5
9:30Dan Bernstein:
How fast are hash functions?
11:20Bart Preneel:
Hash functions based on block ciphers and modular arithmetic
12:00Lunch
14:00Markku-Juhani O. Saarinen:
Boxer - A Hash Function
14:20Jean-Philippe Aumasson:
Preimages of HAVAL and MD5
14:50Problem Session
15:40Tea break
16:00Christian Rechberger:
Preimages of SHA-0 and SHA-1
Friday, June 6
10:00John Kelsey:
How to choose SHA-3
10:40Tea break
11:00Panel discussion
12:00Lunch
14:00Stefan Lucks:
Is there a model for hash functions without structural flaws?
Dmitry KhovratovichCryptoanalysis of hash functions with structures
15:20Tea break
15:50Elena Andreeva:
A new multi-property-preserving iterative hash function
16:30Closing remarks
0.04106s