Program
| Thursday | |
| Session 1 | |
|
Ruba Abu-Salma, University College London Misconceptions of Secure Messaging |
|
|
Fatma Ahmed, German University in Cairo SAFE – Security Attribute Functional Encryption |
|
| Session 2 | |
|
Aishwarya Thirunvengadam, University of Maryland 10-Round Feistel is Indifferential from an Ideal Cipher |
|
|
Evgeniya Ishchukova, SfedU Taganrog Research GOST R 34.12-2015: high-speed implementation and approaches to its analysis |
|
|
Ekaterina Maro, SfedU Taganrog Algebraic Analysis of the Magma cipher in SageMath |
|
| Session 3 | |
|
Blerina Celiku, Fan S. Noli University Cryptographic algorithms: current trends and security primitives |
|
|
Nuzhat Naqvi, Iqra University Islamabad Multi-layer partial homomorphic encryption text steganography |
|
| Friday | |
| Session 4 | |
|
Mariam Wessam, German University in Cairo Adaptive IoT Security Systems |
|
|
Chitchanok Chuengsatiansup, TU Eindhoven Fast and secure DH implementations |
|
|
Carina Böttcher, Escrypt Introduction to Automotive Security |
|
| Session 5 | |
|
Denise Demirel, TU Darmstadt: LTSec The research field of long-term security |
|
|
Giulia Traverso, TU Darmstadt Secret Sharing and Distributed Storage Systems |
|
| Session 6 | |
|
Daniela Pöhn, Leibniz Supercomputing Centre Architecture and Tools for Dynamic Identity Management in Federations |
|
|
Jacqueline Brendel, TU Darmstadt Zero Round-Trip Time for the Extended Access Control Protocol |
|
|
Helene Haagh, Aarhus University Access Control Encryption: Enforcing Information Flow with Cryptography |
|
Please note that there is also a welcome reception on Wednesday, July 20, 2016, at 6.30 pm at Schlossgarten Café.