The afternoon program for Sunday 11 August
is informal and intended to encourage research interactions.
This program will include an excursion and a dinner.
The formal lecture program will begin in the morning of Monday 12 August
at the University of Illinois at Chicago (UIC),
specifically Student Center East (also known as Chicago Circle Center)
at 750 S. Halsted Street, Chicago, IL 60607;
3rd floor (2 levels above ground), Cardinal Room.
The formal lecture program
will continue through Monday afternoon and half of Tuesday.
This program will include a dinner on Monday.
11 Aug | 17:00 | Meet at the First Lady Riverside Gardens Dock:
start from the southeast corner of the Michigan Avenue Bridge
at Michigan and Wacker Drive,
go east down the stairs to reach the dock.
Please bring an ID and a printout of your registration email.
|
| 17:30 | Chicago Architecture Foundation River Cruise departs dock.
You must be on the boat before 17:30.
The boat has a covered area in the unlikely event of rain.
We won't have the boat all to ourselves
but the boat has ample space for discussions.
|
| 19:00 | Boat returns to dock. |
| 19:15-22:00 | Dinner at Flat Top Grill, 30 S. Wabash. We will walk together from the dock to the restaurant. |
12 Aug | 09:30 | Registration and coffee |
| 10:00 | Accepted talks 1: Security goals |
| 10:00-10:30 | Luykx: APE(X): authenticated permutation-based encryption with extended security features (slides) |
| 10:35-11:05 | Gligoroski: OWCM: One-Way Counter Mode (slides) |
| 11:10-11:40 | Taha: A key management scheme for DPA-protected authenticated encryption (slides) |
| 11:45 | Lunch break (not included) |
| 13:30-14:30 | Invited talk: Paterson: Authenticated encryption in TLS (slides) |
| 14:30 | Coffee |
| 15:00 | Accepted talks 2: Linearity and nonlinearity |
| 15:00-15:30 | Zhu: Revisiting counter mode to repair Galois/Counter Mode (slides) |
| 15:35-16:05 | Simpson: Investigating the security properties of MACs based on stream ciphers (slides) |
| 16:10-16:40 | Iwata: Generating a fixed number of masks with word permutations and XORs (slides) |
| 16:45-17:15 | Ladd: McMambo V1: a new kind of Latin dance (slides) (software URL) |
| 17:20-17:50 | Bilgin: FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware (slides) |
| 17:55 | Break |
| 19:15 | Dinner at Greek Islands, 200 S. Halsted. |
13 Aug | 09:30 | Coffee |
| 10:00 | Accepted talks 3: Efficiency |
| 10:00-10:30 | Khovratovich: PPAE: parallelizable permutation-based authenticated encryption (slides) |
| 10:35-11:05 | Andreeva: Parallelizable (authenticated) online ciphers (slides) |
| 11:10-11:40 | Gueron: AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR (slides) |
| 11:45-12:15 | Struik: Revisiting design criteria for AEAD ciphers targeting highly constrained networks (slides) |
| 12:20-12:30 | Bonus talk: Rogaway: Reconsidering generic composition (slides) |
| 12:30 | End of lectures. Lecture room will remain available for informal discussions for the afternoon. |