|
Accepted talks
The following submitted talks have been accepted
for presentation at DIAC 2013:
- AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR
Shay Gueron, University of Haifa, Israel; Intel, Israel
- APE(X): authenticated permutation-based encryption with extended security features
Elena Andreeva, COSIC, KU Leuven, Belgium; iMinds, Belgium
Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
Atul Luykx, COSIC, KU Leuven, Belgium; iMinds, Belgium
Bart Mennink, COSIC, KU Leuven, Belgium; iMinds, Belgium
Nicky Mouha, COSIC, KU Leuven, Belgium; iMinds, Belgium
Kan Yasuda, COSIC, KU Leuven, Belgium; NTT Secure Platform Laboratories, Japan
- A key management scheme for DPA-protected authenticated encryption
Mostafa Taha, Virginia Tech, USA
Patrick Schaumont, Virginia Tech, USA
- A proposal of a confusion and diffusion layer for lightweight symmetric crypto algorithms
Özgül Küçük
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
Begül Bilgin, COSIC, KU Leuven, Belgium; iMinds, Belgium
Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
Miroslav Knežević, NXP Semiconductors, Belgium
Florian Mendel, Graz University of Technology, Austria
Qingju Wang, COSIC, KU Leuven, Belgium; Shanghai Jiao Tong University, China
- Generating a fixed number of masks with word permutations and XORs
Tetsu Iwata, Nagoya University, Japan
Kazuhiko Minematsu, NEC Corporation, Japan
- Investigating the security properties of MACs based on stream ciphers
Leonie Simpson, Queensland University of Technology, Australia
Mufeed Al Mashrafi, Queensland University of Technology, Australia
Harry Bartlett, Queensland University of Technology, Australia
Ed Dawson, Queensland University of Technology, Australia
Kenneth Wong, Queensland University of Technology, Australia
- McMambo V1: a new kind of Latin dance
Watson Ladd
- OWCM: One-Way Counter Mode
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Hristina Mihajloska, Ss Cyril and Methodius University, Macedonia
Håkon Jacobsen, Norwegian University of Science and Technology, Norway
- Parallelizable (authenticated) online ciphers
Elena Andreeva, COSIC, KU Leuven, Belgium; iMinds, Belgium
Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
Atul Luykx, COSIC, KU Leuven, Belgium; iMinds, Belgium
Bart Mennink, COSIC, KU Leuven, Belgium; iMinds, Belgium
Elmar W. Tischhauser, COSIC, KU Leuven, Belgium; iMinds, Belgium
Kan Yasuda, COSIC, KU Leuven, Belgium; NTT Secure Platform Laboratories, Japan
- PPAE: parallelizable permutation-based authenticated encryption
Dmitry Khovratovich, University of Luxembourg, Luxembourg
Alex Biryukov, University of Luxembourg, Luxembourg
- Revisiting counter mode to repair Galois/Counter Mode
Bo Zhu, University of Waterloo, Canada
Yin Tan, University of Waterloo, Canada
Guang Gong, University of Waterloo, Canada
- Revisiting design criteria for AEAD ciphers targeting highly constrained networks
Rene Struik, Struik Security Consultancy, Canada
Version:
This is version 2013.08.12 of the accepted.html web page.
|