| Wednesday 6 November | ||
| 09:00-10:00 | Registration | |
| 10:00-10:20 | Welcome and Introduction | |
| Analysis of some block ciphers (Chair: Steve Babbage) | ||
| 10:20-10:40 | Essential Algebraic Structure within the AES | Murphy and Robshaw |
| 10:40-11:00 | Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia | Shirai |
| 11:00-11:20 | Observations on Khazad | Biryukov and Preneel |
| 11:20-11:40 | Coffee break | |
| Hardware implementations | ||
| 11:40-12:10 | Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1 | Standaert, Rouvroy, Quisquater, and Legat |
| 12:10-12:30 | Compact Hardware Architecture for 128-bit Block Cipher Camellia | Satoh and Morioka |
| 12:30-12:50 | On Hardware Implementation of Block Ciphers Selected at the NESSIE Project Phase 1 | Ichikawa, Sorimachi, and Kasuya |
| 13:00-14:20 | Lunch | |
| Analysis of components of block ciphers | ||
| 14:20-14:40 | Observations on the Relations Between the Bit-Functions of Many S Boxes | Biham |
| 14:40-15:00 | Block Ciphers and Systems of Quadratic Equations | Biryukov and De Canniere |
| Analysis of some block ciphers (Chair: Helena Handschuh) | ||
| 15:00-15:20 | New-Weak Key Classes of IDEA | Biryukov, Nakahara, Preneel, and Vandewalle |
| 15:20-15:40 | In How Many Ways Can You Write Rijndael? | Barkan and Biham |
| 15:40-16:00 | Amplified Boomerang Attack Against Reduced-Round SHACAL | Kim, Moon, Lee, Hong, Lee, and Jung |
| 16:00-16:20 | Coffee break | |
| 16:20-17:00 | Informal presentations (Well-behaved rump session) | |
| 18:00 | Sightseeing tour in Munich Meeting point "Feldherrnhalle" at Odeonsplatz (stop of subway line U5) The tour will end at Augustiner Restaurant for dinner. | |
| 20:00 (evening) | Dinner (Augustiner Restaurant) | |
| Thursday 7 November | ||
| Analysis of stream ciphers | ||
| 09:00-09:20 | Probabilistic Factors in the SOBER-t Stream Ciphers | Babbage and Lano |
| 09:20-09:40 | Distinguishing Attacks on Sober-t32 | De Cannière, Lano, Preneel, and Vandewalle |
| 09:40-09:50 | On the Applicability of Distinguishing Attacks Against Stream Ciphers | Rose and Hawkes |
| 09:50-10:00 | Break | |
| Analysis of asymmetric primitives | ||
| 10:00-10:20 | On the Security of HFE, HFEv- and Quartz | Courtois, Daum, and Felke |
| 10:20-10:40 | Revealing 441 Key Bits of SFLASH^v2 | Geiselmann, Steinwandt, and Beth |
| 10:40-11:00 | How to repair ESIGN | Granboulan |
| 11:00-11:20 | Some modes of use of the GPS identification scheme | Girault, Poupard, and Stern |
| 11:20-11:40 | Coffee break | |
| Software implementations | ||
| 11:40-12:00 | Implementing Quartz in Java | Wolf |
| 12:00-12:20 | Optimization of IDEA | Biham |
| 12:20-12:40 | A Fast and Secure Implementation of Sflash | Akkar, Courtois, Duteuil, and Goubin |
| 12:40-12:50 | Closing Remarks | |
| 13:00-14:20 | Lunch | |
| Project Industry Board | ||
| 14:20-15:40 | Board meeting, open to the public | |
| 15:40-16:00 | Coffee break | |
| 16:00-17:00 | Board meeting, PIB only | |