Program
| Thursday | |
| Session 1 | |
| Ruba Abu-Salma, University College London Misconceptions of Secure Messaging | |
| Fatma Ahmed, German University in Cairo SAFE – Security Attribute Functional Encryption | |
| Session 2 | |
| Aishwarya Thirunvengadam, University of Maryland 10-Round Feistel is Indifferential from an Ideal Cipher | |
| Evgeniya Ishchukova, SfedU Taganrog Research GOST R 34.12-2015: high-speed implementation and approaches to its analysis | |
| Ekaterina Maro, SfedU Taganrog Algebraic Analysis of the Magma cipher in SageMath | |
| Session 3 | |
| Blerina Celiku, Fan S. Noli University Cryptographic algorithms: current trends and security primitives | |
| Nuzhat Naqvi, Iqra University Islamabad Multi-layer partial homomorphic encryption text steganography | |
| Friday | |
| Session 4 | |
| Mariam Wessam, German University in Cairo Adaptive IoT Security Systems | |
| Chitchanok Chuengsatiansup, TU Eindhoven Fast and secure DH implementations | |
| Carina Böttcher, Escrypt Introduction to Automotive Security | |
| Session 5 | |
| Denise Demirel, TU Darmstadt: LTSec The research field of long-term security | |
| Giulia Traverso, TU Darmstadt Secret Sharing and Distributed Storage Systems | |
| Session 6 | |
| Daniela Pöhn, Leibniz Supercomputing Centre Architecture and Tools for Dynamic Identity Management in Federations | |
| Jacqueline Brendel, TU Darmstadt Zero Round-Trip Time for the Extended Access Control Protocol | |
| Helene Haagh, Aarhus University Access Control Encryption: Enforcing Information Flow with Cryptography | |
Please note that there is also a welcome reception on Wednesday, July 20, 2016, at 6.30 pm at Schlossgarten Café.
