RISC Seminars (Research on Information Security and Cryptology)
Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers](To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
Workshop Hash Functions in Cryptology: Theory and Practice
International workshop organized by Ronald Cramer (CWI and Leiden University), Lars Knudsen (Technical University of Denmark), Benne de Weger (TU Eindhoven), and Martijn Stam (EPFL Lausanne).
Program available here.
Date: | June 2 - 6 |
Location: | Lorentz Center, Leiden |
Schedule: | |
Monday, June 2 | |
9:00 | Welcome |
9:50 | Xiaoyun Wang: Survey of recent research on hash functions |
11:20 | Tea break |
11:35 | Florian Mendel: Cryptanalysis of GOST |
12:15 | Lunch |
14:00 | Stefano Tessaro: Domain Extension of Public Random Functions |
14:40 | Christophe Petit: Cryptographic hash functions from expander graphs: State of the art |
15:20 | Tea break & Discussion |
17:00 | Wine and cheese welcome party |
Tuesday, June 3 | |
9:30 | Marc Fischlin: Perfectly Crafted Swiss Army Knives - in Theory |
11:00 | Tea break |
11:20 | Krzysztof Pietrzak: On the Generic Insecurity of the Full Domain Hash |
12:00 | Lunch |
14:00 | Eike Kiltz: Programmable Hash Functions and Their Applications |
14:40 | Problem Session |
15:40 | Tea break |
16:00 | Orr Dunkelman: Re-visiting HAIFA (and why you should visit too) |
Wednesday, June 4 | |
9:30 | Thomas Peyrin: Security Analysis of Generalized Sponge Functions |
11:20 | Anja Lehmann: Robust Multi-Property Combiners for Hash Functions |
12:00 | Lunch |
14:00 | Thomas Ristenpart: Design Paradigms for Building Multi-Property Hash Functions |
14:40 | Problem Session |
15:40 | Tea break |
16:00 | Martijn Stam: Efficient collision-resistant hashing from public random functions |
17:15 | Boat tour with dinner |
Thursday, June 5 | |
9:30 | Dan Bernstein: How fast are hash functions? |
11:20 | Bart Preneel: Hash functions based on block ciphers and modular arithmetic |
12:00 | Lunch |
14:00 | Markku-Juhani O. Saarinen: Boxer - A Hash Function |
14:20 | Jean-Philippe Aumasson: Preimages of HAVAL and MD5 |
14:50 | Problem Session |
15:40 | Tea break |
16:00 | Christian Rechberger: Preimages of SHA-0 and SHA-1 |
Friday, June 6 | |
10:00 | John Kelsey: How to choose SHA-3 |
10:40 | Tea break |
11:00 | Panel discussion |
12:00 | Lunch |
14:00 | Stefan Lucks: Is there a model for hash functions without structural flaws? |
Dmitry Khovratovich | Cryptoanalysis of hash functions with structures |
15:20 | Tea break |
15:50 | Elena Andreeva: A new multi-property-preserving iterative hash function |
16:30 | Closing remarks |
0.04106s