Program
Thursday | |
Session 1 | |
Ruba Abu-Salma, University College London Misconceptions of Secure Messaging |
|
Fatma Ahmed, German University in Cairo SAFE – Security Attribute Functional Encryption |
|
Session 2 | |
Aishwarya Thirunvengadam, University of Maryland 10-Round Feistel is Indifferential from an Ideal Cipher |
|
Evgeniya Ishchukova, SfedU Taganrog Research GOST R 34.12-2015: high-speed implementation and approaches to its analysis |
|
Ekaterina Maro, SfedU Taganrog Algebraic Analysis of the Magma cipher in SageMath |
|
Session 3 | |
Blerina Celiku, Fan S. Noli University Cryptographic algorithms: current trends and security primitives |
|
Nuzhat Naqvi, Iqra University Islamabad Multi-layer partial homomorphic encryption text steganography |
|
Friday | |
Session 4 | |
Mariam Wessam, German University in Cairo Adaptive IoT Security Systems |
|
Chitchanok Chuengsatiansup, TU Eindhoven Fast and secure DH implementations |
|
Carina Böttcher, Escrypt Introduction to Automotive Security |
|
Session 5 | |
Denise Demirel, TU Darmstadt: LTSec The research field of long-term security |
|
Giulia Traverso, TU Darmstadt Secret Sharing and Distributed Storage Systems |
|
Session 6 | |
Daniela Pöhn, Leibniz Supercomputing Centre Architecture and Tools for Dynamic Identity Management in Federations |
|
Jacqueline Brendel, TU Darmstadt Zero Round-Trip Time for the Extended Access Control Protocol |
|
Helene Haagh, Aarhus University Access Control Encryption: Enforcing Information Flow with Cryptography |