DIAC 2013: Directions in Authenticated Ciphers

11–13 August 2013, Chicago, USA


Introduction
How to participate:
Schedule
Travel
Registration
Stipends
How to contribute:
Submission
Accepted talks

Accepted talks

The following submitted talks have been accepted for presentation at DIAC 2013:
  • AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR
    Shay Gueron, University of Haifa, Israel; Intel, Israel
  • APE(X): authenticated permutation-based encryption with extended security features
    Elena Andreeva, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
    Atul Luykx, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Bart Mennink, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Nicky Mouha, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Kan Yasuda, COSIC, KU Leuven, Belgium; NTT Secure Platform Laboratories, Japan
  • A key management scheme for DPA-protected authenticated encryption
    Mostafa Taha, Virginia Tech, USA
    Patrick Schaumont, Virginia Tech, USA
  • A proposal of a confusion and diffusion layer for lightweight symmetric crypto algorithms
    Özgül Küçük
  • FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
    Begül Bilgin, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
    Miroslav Knežević, NXP Semiconductors, Belgium
    Florian Mendel, Graz University of Technology, Austria
    Qingju Wang, COSIC, KU Leuven, Belgium; Shanghai Jiao Tong University, China
  • Generating a fixed number of masks with word permutations and XORs
    Tetsu Iwata, Nagoya University, Japan
    Kazuhiko Minematsu, NEC Corporation, Japan
  • Investigating the security properties of MACs based on stream ciphers
    Leonie Simpson, Queensland University of Technology, Australia
    Mufeed Al Mashrafi, Queensland University of Technology, Australia
    Harry Bartlett, Queensland University of Technology, Australia
    Ed Dawson, Queensland University of Technology, Australia
    Kenneth Wong, Queensland University of Technology, Australia
  • McMambo V1: a new kind of Latin dance
    Watson Ladd
  • OWCM: One-Way Counter Mode
    Danilo Gligoroski, Norwegian University of Science and Technology, Norway
    Hristina Mihajloska, Ss Cyril and Methodius University, Macedonia
    Håkon Jacobsen, Norwegian University of Science and Technology, Norway
  • Parallelizable (authenticated) online ciphers
    Elena Andreeva, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Andrey Bogdanov, Danmarks Tekniske Universitet, Denmark
    Atul Luykx, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Bart Mennink, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Elmar W. Tischhauser, COSIC, KU Leuven, Belgium; iMinds, Belgium
    Kan Yasuda, COSIC, KU Leuven, Belgium; NTT Secure Platform Laboratories, Japan
  • PPAE: parallelizable permutation-based authenticated encryption
    Dmitry Khovratovich, University of Luxembourg, Luxembourg
    Alex Biryukov, University of Luxembourg, Luxembourg
  • Revisiting counter mode to repair Galois/Counter Mode
    Bo Zhu, University of Waterloo, Canada
    Yin Tan, University of Waterloo, Canada
    Guang Gong, University of Waterloo, Canada
  • Revisiting design criteria for AEAD ciphers targeting highly constrained networks
    Rene Struik, Struik Security Consultancy, Canada

Version: This is version 2013.08.12 of the accepted.html web page.