Third NESSIE Workshop
Programme of the talks


Wednesday 6 November - Thursday 7 November 2002

Main auditory, Siemens AG in Neuperlach-Süd, Munich, Germany.
Wednesday 6 November
09:00-10:00Registration
10:00-10:20Welcome and Introduction
Analysis of some block ciphers (Chair: Steve Babbage)
10:20-10:40 Essential Algebraic Structure within the AES Murphy and Robshaw
10:40-11:00 Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia Shirai
11:00-11:20 Observations on Khazad Biryukov and Preneel
11:20-11:40Coffee break
Hardware implementations
11:40-12:10 Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1 Standaert, Rouvroy, Quisquater, and Legat
12:10-12:30 Compact Hardware Architecture for 128-bit Block Cipher Camellia Satoh and Morioka
12:30-12:50 On Hardware Implementation of Block Ciphers Selected at the NESSIE Project Phase 1 Ichikawa, Sorimachi, and Kasuya
13:00-14:20Lunch
Analysis of components of block ciphers
14:20-14:40 Observations on the Relations Between the Bit-Functions of Many S Boxes Biham
14:40-15:00 Block Ciphers and Systems of Quadratic Equations Biryukov and De Canniere
Analysis of some block ciphers (Chair: Helena Handschuh)
15:00-15:20 New-Weak Key Classes of IDEA Biryukov, Nakahara, Preneel, and Vandewalle
15:20-15:40 In How Many Ways Can You Write Rijndael? Barkan and Biham
15:40-16:00 Amplified Boomerang Attack Against Reduced-Round SHACAL Kim, Moon, Lee, Hong, Lee, and Jung
16:00-16:20Coffee break
16:20-17:00Informal presentations (Well-behaved rump session)
18:00Sightseeing tour in Munich
Meeting point "Feldherrnhalle" at Odeonsplatz (stop of subway line U5)
The tour will end at Augustiner Restaurant for dinner.
20:00 (evening)Dinner (Augustiner Restaurant)
Thursday 7 November
Analysis of stream ciphers
09:00-09:20 Probabilistic Factors in the SOBER-t Stream Ciphers Babbage and Lano
09:20-09:40 Distinguishing Attacks on Sober-t32 De Cannière, Lano, Preneel, and Vandewalle
09:40-09:50 On the Applicability of Distinguishing Attacks Against Stream Ciphers Rose and Hawkes
09:50-10:00Break
Analysis of asymmetric primitives
10:00-10:20 On the Security of HFE, HFEv- and Quartz Courtois, Daum, and Felke
10:20-10:40 Revealing 441 Key Bits of SFLASH^v2 Geiselmann, Steinwandt, and Beth
10:40-11:00 How to repair ESIGN Granboulan
11:00-11:20 Some modes of use of the GPS identification scheme Girault, Poupard, and Stern
11:20-11:40Coffee break
Software implementations
11:40-12:00 Implementing Quartz in Java Wolf
12:00-12:20 Optimization of IDEA Biham
12:20-12:40 A Fast and Secure Implementation of Sflash Akkar, Courtois, Duteuil, and Goubin
12:40-12:50Closing Remarks
13:00-14:20Lunch
Project Industry Board
14:20-15:40Board meeting, open to the public
15:40-16:00Coffee break
16:00-17:00Board meeting, PIB only