• Submission Deadline

    January 19, 2015

  • Authors Notification

    March 2, 2015

  • Final Extended Abstract

    March 13, 2015


Monday April 13

09:05 - 10:45 Symmetric cryptography I

Anne Canteaut

Redefining the Transparency Order

Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff

Security Proof of the Canonical Form of Self-Synchronizing Stream Cipher

Brandon Dravie, Philippe Guillot, Gilles Millérioux

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers

Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar

Revisiting Roos Bias in RC4 Key Scheduling Algorithm

Santanu Sarkar, Ayineedi Venkateswarlu

11:15 - 12:05 Invited talk (Daniel Katz)

Tor Helleseth

Finite Field Power Permutations and Three-Valued Weil Sums of Binomials

Daniel Katz

14:00 - 15:40 Discrete mathematics and cryptography

Sihem Mesnager

Antiderivative Functions over 𝔽2n

Valentin Suder

Improved Elliptic Curve Hashing and Point Representation

Taechan Kim, Mehdi Tibouchi

Optimal software-implemented Itoh--Tsujii inversion for GF(2m)

Jeremy Maitin-Shepard

Vectorial quadratic bent functions as a product of two linearized polynomials

Alexander Pott, Enes Pasalic, Amela Muratovic-Ribic, Samed Bajric

16:10 - 18:15 Coding theory

Gregory Kabatiansky

Hasse-Weil Bound for Additive Cyclic Codes

Cem Güneri, Ferruh Özbudak, Funda Özdemir

Fast decoding of dual multipoint codes from algebraic curves up to the Kirfel-Pellikaan bound

Masaya Fujisawa, Shojiro Sakata

On asymptotically good ramp secret sharing schemes

Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Ryutaroh Matsumoto, Diego Ruano

Two Algebraic Manipulation Detection Codes Based on a Scalar Product

Maksim Alekseev

MacWilliams Extension Theorem for MDS additive codes

Serhii Dyshko

Tuesday April 14

09:00 - 10:40 Finite fields

Alexander Pott

On one class of permutation polynomials over finite fields of characteristic two

Leonid A. Bassalygo, Victor A. Zinoviev

On Some Permutation Binomials and Trinomials Over 𝔽2n

Srimanta Bhattacharya, Sumanta Sarkar

Artin-Schreier extensions of normal bases

David Thomson, Colin Weir

Explicit Maximal and Minimal Curves over Finite Fields of Odd Characteristics

Zulfukar Saygi, Ferruh Ozbudak

11:10 - 12:00 Invited talk (Swastik Kopparty)

Jean-Pierre Tillich

High rate locally decodable and locally testable codes: theory and applications

Swastik Kopparty

14:00 - 15:40 Decoding

Daniel Augot

Symmetric Disjunctive List-Decoding Codes

Arkady Georgievich D'yachkov, Ilya Viktorovich Vorobyev, Nikita Andreevich Polyanskii, Vladislav Yuryevich Shchukin

Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation

Wenhui Li, Johan S. R. Nielsen, Sven Puchinger, Vladimir Sidorenko

Asymptotic Strategies for GMD Decoding with Arbitrary Error-Erasure Tradeoff

Joschi Brauchle, Vladimir Sidorenko

List and Probabilistic Unique Decoding of High-Rate Folded Gabidulin Codes

Hannes Bartz

16:10 - 17:50 Bounds in coding theory

Vladimir Sidorenko

Critical pairs for the Product Singleton Bound

Diego Mirandola, Gilles Zémor

The Main Conjecture for Near-MDS Codes

Ivan Landjev, Assia Rousseva

Lower Bound of the Covering Radius of Binary Irreducible Goppa Codes

Sergey Bezzateev, Natalia Shekhunova

On the Griesmer bound for nonlinear codes

Emanuele Bellini, Alessio Meneghetti

Wednesday April 15

09:00 - 11:05 Codes and information theory

Joachim Rosenthal

On codes for multiple access adder channel with noise and feedback

Vladimir Gritsenko, Grigory Kabatiansky, Vladimir Lebedev, Alexey Maevskiy

Multicomponent Network Codes for Channel with Random Linear Transformations and Packet Errors

Alexander Shishkin

Upper bound on the performance of an order statistics-based decoder

Dmitry Osipov

Asymptotic Estimation of the Error Exponents of LDPC Code with Special Construction

Pavel Rybin, Victor Zyablov

On the typical values of the cross-correlation measure

László Mérai

11:35 - 12:50 Symmetric cryptography II

Willi Meier

Reflection Ciphers

Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander

Improving Impossible Differential Attacks against Rijndael-160 and Rijndael-224

Marine Minier

On Distinct Known Plaintext Attacks

Céline Blondeau, Kaisa Nyberg

Thursday April 16

09:00 - 10:40 Codes and cryptography

Ferruh Ozbudak

Proof of a Conjectured Three-Valued Family of Weil Sums of Binomials

Daniel Katz, Philippe Langevin

On the nonlinearity of idempotent quadratic functions and the weight distribution of subcodes of Reed-Muller codes

Nurdagül Anbar, Wilfried Meidl, Alev Topuzoglu

On the Direct Construction of Recursive MDS Matrices

Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu

Towards a General Construction of Recursive MDS Diffusion Layers

Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu

11:10 - 12:00 Invited talk (Emmanuel Thomé)

Nicolas Sendrier

Computing discrete logarithms in small characteristic finite fields in quasi-polynomial time

Emmanuel Thomé

14:00 - 15:40 Public key cryptography

Pierre Loidreau

Better Algorithms for MSB-side RSA Reconstruction

Pratibha Jagnere, Srijan Sanket, Anuj Chauhan, Ragesh Jaiswal

Hiding the carriers in the polynomial Naccache Stern knapsack cryptosystem

Giacomo Micheli, Joachim Rosenthal, Reto Schnyder

Cryptanalysis of an RSA variant with Moduli N=prql

Yao Lu, Liqiang Peng, Santanu Sarkar

A Code-Based Group Signature

Quentin Alamélou, Olivier Blazy, Stephane Cauchie, Philippe Gaborit

16:10 - 18:15 Combinatorics and coding

Alev Topuzoglu

Embedding Distances into the Hamming Cube

Rafael Gregorio Lucas D'Oliveira, Marcelo Firer

A new constellation for space-time coding

Gwezheneg Robert

The second and the third smallest arrangements of hyperplanes in finite projective spaces

Daniele Bartoli, Leo Storme

A Generalization of Montucla's Rectangle-to-Rectangle Dissection to Higher Dimensions

Antonio Campello, Vinay A. Vaishampayan

Energy bounds for codes and designs in H(n,q)

Peter Boyvalenkov, Peter Dragnev, Douglas Hardin, Edward Saff, Maya Stoyanova

Friday April 17

09:00 - 10:40 Symmetric cryptography III

Marine Minier

On algebraic cryptanalysis of ciphers with low multiplicative complexity

Pavol Zajac

Improving the Security and Efficiency of Block Ciphers based on LS-Designs

Anthony Journault, François-Xavier Standaert, Kerem Varıcı

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles

Subhamoy Maitra, Goutam Paul, Willi Meier

Related-Key Linear Hull Distinguishers for Key-Alternating Block Ciphers

Andrey Bogdanov, Vincent Rijmen, Elmar Tischhauser

11:10 - 12:25 Cover free codes

Ivan Landjev

Cover-Free Codes and Frequency Hopping Multiple Access

Mwawi Nyirenda, Siaw-Lynn Ng, Keith Martin

Almost Cover-Free Codes and Designs

Arkady Georgievich D'yachkov, Ilya Viktorovich Vorobyev, Nikita Andreevich Polyanskii, Vladislav Yuryevich Shchukin

Cover-Free Codes and Separating System Codes

Arkady Georgievich D'yachkov, Ilya Viktorovich Vorobyev, Nikita Andreevich Polyanskii, Vladislav Yuryevich Shchukin