CECC 2021 21st Central European Conference on Cryptology

How can we connect to an online session via browser?

How can we connect to an online session via desktop application?


Test meeting


Book of Abstracts

2021.06.23, WEDNESDAY, CEST

Chair
9.10 - 10.00
Keynote: Maria Eichlseder
Lightweight Cryptography 

9.10 - 10.00

Tamás Herendi

 


10.10 – 11.30

Tamás Herendi

 


11.50 – 12. 50

Péter Ligeti

 


14.00 -  15.20

Maria Eichlseder

 
Coffee Break
10.10 - 10.30
Shoichi Kamada
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemer\'{e}di-type statements
10.30 - 10.50
Eugen Antal Cryptanalysis of a Special Polybius-Like Cipher
10.50 - 11.10
Serhii Yakovliev On the Security of Iterated Block Ciphers with Dependent Round Keys Against Differential and Linear Cryptanalysis
11.10 - 11.30
Yacheng Wang, Tsuyoshi Takagi and Takanori Yasuda First Fall Degree and Weil Descent on the Multivariate Quadratic Problem
 
Coffee Break
11.50 - 12.10
Daniel Janči and Milan Vojvoda
Searching for row complete latin squares (a new benchmark for SAT solvers)
12.10 - 12.30
Oleh Kurinnyi
Combinatorial properties of the system of linear restrictions over a finite field
12.30 - 12.50
Reni Banov
Experimental Enumeration of Bent Functions with Binary Decision Diagrams
 
Lunch Break
14.00 - 14.20
Michał Wroński and Tomasz Kijko
Arithmetic on generalized Hessian curves using compression function and its applications to the isogeny-based cryptography
14.20 - 14.40
Vishnupriya Anupindi and László Mérai
Linear complexity of some sequences derived from hyperelliptic curves of genus 2
14.40 - 15.00
Michał Wroński
Application of Velusqrt algorithm to Huff's and general Huff's curves

2021.06.24, THURSDAY, CEST

Chair
9.10 - 10.00
Keynote: Riccardo Focardi 
Breaking and fixing cryptographic systems

9.10 – 10.00

Andrea Huszti

 


10.10 – 11.30 

Riccardo Focardi

 


11.50 – 12.40

Lyudmila Kovalchuk


14.00 – 15.20

László Csirmaz

 

 
Coffee Break
10.10 - 10.30
Mariusz Jurkiewicz
A Provable 2-Signatures Scheme Based on a Certain BDHI-type Assumption in the Random Oracle Model
10.30 - 10.50
Baasansuren Bat-Erdene, Yuping Yan, Mohammed B. M. Kamel and Peter Ligeti
Formal Verification of Confidentiality in Attribute-Based Encryption through ProVerif
10.50 - 11.10
Máté Gyarmati
On bipartite secret sharing
11.10 - 11.30
Marcella Takáts, Máté Gyarmati, Péter Ligeti and Péter Sziklai
Multilevel secret sharing by finite geometry
 
Coffee Break
11.50 - 12.10
Gregory Morse, Midya Alqaradaghi and Tamás Kozsik
Control Flow Obfuscation with Irreducible Loops and Self-Modifying Code
12.10 - 12.30
Vladimír Sedláček, Vojtěch Suchánek and Antonín Dufka
DiSSECT: Distinguisher of Standard \& Simulated Elliptic Curves via Traits
12.30 - 12.50
Roland Nagy and Zoltán L. Németh
Fortification of OSP, a payload-agnostic IoT protocol
 
Lunch Break
14.00 - 14.20
Szabolcs Kovács, Andrea Huszti and Norbert Oláh
Identity-based anonymous authentication for VANETs
14.20 - 14.40
Ádám Vécsi and Attila Pethő
Scalix mix network
14.40 - 15.00
Norbert Oláh, Szabolcs Kovács and Andrea Huszti
Scalable, password-based and threshold authentication for Smart Homes
15.00 - 15.20
Lyudmila Kovalchuk, Roman Oliynykov, Mariia Rodinko, Dmytro Kaidalov and Andrii Nastenko
Probability of double spend attack for network with non-zero synchronization time

2021.06.25, FRIDAY, CEST

Chair
9.10 - 10.00
Keynote: Klaus Schmeh
Breaking Historical Ciphers with Modern Means

9.10 - 10.00

Pavol Zajac

 


10.10 – 11. 30

Pavol Zajac

 


11.50 – 13.00  

Stefan Porubsky

 

 

 
Coffee Break
10.10 - 10.30
Danilo Gligoroski
Entropoid Based Cryptography
10.30 - 10.50
Gábor Harangozó
Linear Algebraic Public Key Encryption Scheme
10.50 - 11.10
Gennady Khalimov, Yevgen Kotukh and Svitlana Khalimova
A new secure encryption scheme based on the automorphism group of the Ree function field
11.10 - 11.30
Viliam Hromada
Using GeMSS in a Multivariate Ring Signature Scheme
 
Coffee Break
11.50 - 12.10
Dariya Yadukha
The Modification of Quantum-resistant AJPS family primitives
12.10 - 12.30
Gábor Péter Nagy and Sabira El Khalfaoui
Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes
12.30 - 12.50
Peter Spacek
Benchmarking Post-Quantum KEMs for Group Key Establishment in TEE
12.50 - 13.10
Pavol Zajac
On the feasibility of algebraic cryptanalysis by bit flipping
13:10
Closing

Financially supported by EFOP-3.6.3-VEKOP-16-2017-00002, a project co-financed by the Hungarian Government and European Union through the European Regional Development Fund.

Dear User!

 

The University of Debrecen considers the protection of personal data and the information provided to be of paramount importance. We hereby inform you that the University of Debrecen has reviewed its processes and incorporated the requirements of GDPR into his own data management and data protection activities, which entered mandatory on may 25,2018. The personal data of the users has been carefully handled by the University of Debrecen, it complies with the applicable data management regulations.Following the requirements of GDPR, we updated our Privacy Statement, which you can access by clicking on the link below: Privacy Policy.

I have read, understand and agree to terms.