- magyar
- english
- Русский
CECC 2021 21st Central European Conference on Cryptology
How can we connect to an online session via browser?
How can we connect to an online session via desktop application?
Test meeting
- Date: 2021.06.21. (9 am - 4 pm)
- Password: cecc2021test
- WEBEX: https://unideb.webex.com/unideb/j.php?MTID=m3a6ce0dc16065bd1c8892d7eb955c401
2021.06.23, WEDNESDAY, CEST
Chair |
9.10 - 10.00
|
Keynote: Maria Eichlseder
|
Lightweight Cryptography
|
---|---|---|---|
9.10 - 10.00 Tamás Herendi
10.10 – 11.30 Tamás Herendi
11.50 – 12. 50 Péter Ligeti
14.00 - 15.20 Maria Eichlseder |
|
Coffee Break
|
|
10.10 - 10.30
|
Shoichi Kamada
|
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemer\'{e}di-type statements
|
|
10.30 - 10.50
|
Eugen Antal | Cryptanalysis of a Special Polybius-Like Cipher | |
10.50 - 11.10
|
Serhii Yakovliev | On the Security of Iterated Block Ciphers with Dependent Round Keys Against Differential and Linear Cryptanalysis | |
11.10 - 11.30
|
Yacheng Wang, Tsuyoshi Takagi and Takanori Yasuda | First Fall Degree and Weil Descent on the Multivariate Quadratic Problem | |
|
Coffee Break
|
||
11.50 - 12.10
|
Daniel Janči and Milan Vojvoda
|
Searching for row complete latin squares (a new benchmark for SAT solvers)
|
|
12.10 - 12.30
|
Oleh Kurinnyi
|
Combinatorial properties of the system of linear restrictions over a finite field
|
|
12.30 - 12.50
|
Reni Banov
|
Experimental Enumeration of Bent Functions with Binary Decision Diagrams
|
|
|
Lunch Break
|
||
14.00 - 14.20
|
Michał Wroński and Tomasz Kijko
|
Arithmetic on generalized Hessian curves using compression function and its applications to the isogeny-based cryptography
|
|
14.20 - 14.40
|
Vishnupriya Anupindi and László Mérai
|
Linear complexity of some sequences derived from hyperelliptic curves of genus 2
|
|
14.40 - 15.00
|
Michał Wroński
|
Application of Velusqrt algorithm to Huff's and general Huff's curves
|
2021.06.24, THURSDAY, CEST
Chair |
9.10 - 10.00
|
Keynote: Riccardo Focardi
|
Breaking and fixing cryptographic systems
|
---|---|---|---|
9.10 – 10.00 Andrea Huszti
10.10 – 11.30 Riccardo Focardi
11.50 – 12.40 Lyudmila Kovalchuk 14.00 – 15.20 László Csirmaz
|
|
Coffee Break
|
|
10.10 - 10.30
|
Mariusz Jurkiewicz
|
A Provable 2-Signatures Scheme Based on a Certain BDHI-type Assumption in the Random Oracle Model
|
|
10.30 - 10.50
|
Baasansuren Bat-Erdene, Yuping Yan, Mohammed B. M. Kamel and Peter Ligeti
|
Formal Verification of Confidentiality in Attribute-Based Encryption through ProVerif
|
|
10.50 - 11.10
|
Máté Gyarmati
|
On bipartite secret sharing
|
|
11.10 - 11.30
|
Marcella Takáts, Máté Gyarmati, Péter Ligeti and Péter Sziklai
|
Multilevel secret sharing by finite geometry
|
|
|
Coffee Break
|
||
11.50 - 12.10
|
Gregory Morse, Midya Alqaradaghi and Tamás Kozsik
|
Control Flow Obfuscation with Irreducible Loops and Self-Modifying Code
|
|
12.10 - 12.30
|
Vladimír Sedláček, Vojtěch Suchánek and Antonín Dufka
|
DiSSECT: Distinguisher of Standard \& Simulated Elliptic Curves via Traits
|
|
12.30 - 12.50
|
Roland Nagy and Zoltán L. Németh
|
Fortification of OSP, a payload-agnostic IoT protocol
|
|
|
Lunch Break
|
||
14.00 - 14.20
|
Szabolcs Kovács, Andrea Huszti and Norbert Oláh
|
Identity-based anonymous authentication for VANETs
|
|
14.20 - 14.40
|
Ádám Vécsi and Attila Pethő
|
Scalix mix network
|
|
14.40 - 15.00
|
Norbert Oláh, Szabolcs Kovács and Andrea Huszti
|
Scalable, password-based and threshold authentication for Smart Homes
|
|
15.00 - 15.20
|
Lyudmila Kovalchuk, Roman Oliynykov, Mariia Rodinko, Dmytro Kaidalov and Andrii Nastenko
|
Probability of double spend attack for network with non-zero synchronization time
|
2021.06.25, FRIDAY, CEST
Chair |
9.10 - 10.00
|
Keynote: Klaus Schmeh
|
Breaking Historical Ciphers with Modern Means
|
---|---|---|---|
9.10 - 10.00 Pavol Zajac
10.10 – 11. 30 Pavol Zajac
11.50 – 13.00 Stefan Porubsky
|
|
Coffee Break
|
|
10.10 - 10.30
|
Danilo Gligoroski
|
Entropoid Based Cryptography
|
|
10.30 - 10.50
|
Gábor Harangozó
|
Linear Algebraic Public Key Encryption Scheme
|
|
10.50 - 11.10
|
Gennady Khalimov, Yevgen Kotukh and Svitlana Khalimova
|
A new secure encryption scheme based on the automorphism group of the Ree function field
|
|
11.10 - 11.30
|
Viliam Hromada
|
Using GeMSS in a Multivariate Ring Signature Scheme
|
|
|
Coffee Break
|
||
11.50 - 12.10
|
Dariya Yadukha
|
The Modification of Quantum-resistant AJPS family primitives
|
|
12.10 - 12.30
|
Gábor Péter Nagy and Sabira El Khalfaoui
|
Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes
|
|
12.30 - 12.50
|
Peter Spacek
|
Benchmarking Post-Quantum KEMs for Group Key Establishment in TEE
|
|
12.50 - 13.10
|
Pavol Zajac
|
On the feasibility of algebraic cryptanalysis by bit flipping
|
|
13:10
|
Closing
|
Financially supported by EFOP-3.6.3-VEKOP-16-2017-00002, a project co-financed by the Hungarian Government and European Union through the European Regional Development Fund. |