Escudo de la República de Colombia

 

 

Monday

Tuesday

Wednesday

Thursday

Friday

 09:00-10:30

 Keynote Ding (slides)

 Keynote Rodríguez

(slides) (24-307)

 Rodríguez

(11-208)

slides

 Zhou

(11-208)

Slides

 Tibouchi

(11-208)

slides

 Bernstein

(11-208)

slides

 10:30-11:00

 Break

Break  

Break  

Break  

Break  

 11:00-12:30

 Keynote Lange

 Keynote Bernstein

(24-307) slides

 Bernstein

(11-208)

slides

 Ding

(11-208)

 Ding

(11-208)

slides

 Rodríguez

(11-208)

slides

 12:30-13:30

 Lunch

(43-329)

 Lunch

(43-329)

 Poster / Lunch

(43-329)

 Lunch

(43-329)

 Lunch

(43-329)

 13:30-15:00

 Yung

(25-301) slides

 Deng

(25-301)

slides

 Free

 Lange

(25-301)

slides

 Lange

(25-301)

slides

 15:00-15:30

 Break

 Break

 Free

 Break

 Break

 15:30-17:00

 Tibouchi

(25-301) slides

 Lange

(25-301)

slides

 Free

 Bernstein

(25-301)

slides

 Rodríguez

(25-301)

slides

 

See Lecture topics below under each lecturer

We will hold a poster session. If you are interested in presenting a poster, please send us an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with a preliminary title. The deadline for poster registration is June 3. Printing expenses will not be covered by the school, yet we can recommend a convenient printing location near the venue.

Monday Morning we will have a general audience keynote session. Admission is free, but regustration is required (register now).

Keynote session low

Invited Speakers

 Bernstein

Daniel Bernstein

Ph.D. from University of California at Berkeley, and currently Professor at the Technische Universiteit Eindhoven, and a Research Professor of Computer Science at the University of Illinois at Chicago. Professor Bernstein is well known for his prolific research career, with important contributions to secure email and DNS services, stream ciphers, elliptic curves, coding theory, internet protocols, among others. He is also known for suing the United States Government in 1995 (Bernstein v. United States), challenging restrictions on the export of cryptography from the United States.

Keynote: Post-quantum cryptography
Lecture 1: What do quantum computers do?
Lectures 2,3: Cryptographic software engineering

 
Ding

Jintai Ding

Ph.D. in mathematics from Yale University, currently Professor at the University of Cincinnati and adjunct professor at several universities in other countries. Professor Ding’s research areas are Information Security, Computational Algebra, Classical Cryptography, Postquantum Cryptography, Hardware implementation, Number Theory, Representation Theory, and Mathematical Physics. He is the principal submitter of two of the proposals in the NIST postquantum competition. Professor Ding is also recognized for his famous key exchange protocol based on LWE.

Keynote: Public key cryptography and its applications, including blockchain.
Lecture 1: Multivariate Public Key Cryptography.
Lecture 2: Post-quantum Key Exchange

Lange

Tanja Lange

Ph.D. from Universität Duisburg-Essen, Germany, and currently chair of the Coding Theory and Cryptology group at the Technische Universiteit Eindhoven, scientific director of the Eindhoven Institute for the Protection of Systems and Information, and one of the coordinators of PQCRYPTO, a European research consortium that has been charged with the development of postquantum cryptography. Professor Lange performs research in theoretical and applied areas of coding theory and cryptology. She is also interested in elliptic curve, hyperelliptic curve and postquantum cryptography.

Keynote: Post-quantum cryptography
Lectures 1,2,3: Discrete-log attacks and factorization

Rodriguez   

Francisco Rodriguez

Ph.D. in Electrical and Computer Engineering from Oregon State Uni versity, and currently a research professor at Departamento de Computación CINVESTAV-IPN, México. His research areas are public and symmetric key cryptography, computer arithmetic, finite fields, algorithm implementation in reconfigurable hardware, information security and mobile computing. Professor Rodríguez has developed a variety of cores that implement cryptographic algorithms and finite-field arithmetic algorithms in reconfigurable hardware platforms.

Keynote: History of the Diffie-Hellman problem (different variants)
Lecture 1: Electronic voting
Lecture 2: Cryptocurrencies
Lecture 3: Crypto based on isogenies

 Tibouchi  

Mehdi Tibouchi

Ph.D. in computer science from University Paris VII and the University of Luxembourg. He is a distinguished researcher in the Okamoto Research Laboratory, at the NTT Secure Platform Laboratories in Tokyo, Japan. His research focuses on public-key cryptology, including various mathematical aspects of algebraic curve cryptography, RSA cryptanalysis, and provable protocol constructions. He was a Ph.D. candidate under David Naccache and Jean-Sébastien Coron, working in the Crypto Team of the ENS Computer Science Lab.

Lectures 1: Lattice-based crypto, with an emphasis on implementation attacks
Lecture 2: Secure implementation of signatures

 

Robert Deng

Professor Robert Deng is AXA Chair Professor of Cybersecurity and Director of the Secure Mobile Centre, School of Information Systems, Singapore Management University (SMU). His research interests are in the areas of data security and privacy, cloud security and Internet of Things security. He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He serves/served on many editorial boards and conference committees. Including the editorial boards of IEEE Security & Privacy Magazine, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is an IEEE Fellow.

Lecture 1: Access Control and Computation of Encrypted Data in the Cloud

 

Jianying Zhou

Jianying Zhou is a professor at Singapore University of Technology and Design (SUTD), and Co-Center Director for iTrust. He received PhD in Information Security from Royal Holloway, University of London. His research interests are in applied cryptography and network security, cyber-physical system security, mobile and wireless security. He has published 200+ referred papers with 8000+ citations, and received ESORICS'15 best paper award. He has 2 technologies being standardized in ISO/IEC 29192-4 and ISO/IEC 20009-4, respectively. He is a co-founder & steering committee co-chair of ACNS, steering committee chair of ACM AsiaCCS, and steering committee member of Asiacrypt. He has served 200+ times in international cyber security conference committees as general chair, program chair, and PC member. He has also been in the editorial board of top cyber security journals including IEEE Security & Privacy, IEEE TDSC, IEEE TIFS, Computers & Security.

Lecture 1: Authentication in Mobile, IoT and Cyber-Physical Systems

 

Moti Yung

Moti Yung is a Security and Privacy Research Scientist with Google. He got his PhD from Columbia University in 1988. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He has also been an adjunct senior research faculty at Columbia. Yung is a fellow of the IEEE, the Association for Computing Machinery (ACM), the International Association for Cryptologic Research (IACR), and the European Association for Theoretical Computer Science (EATCS). In 2010 he gave the IACR Distinguished Lecture. He is the recipient of the 2014 ACM’s SIGSAC Outstanding Innovation award, the 2014 ESORICS (European Symposium on Research in Computer Security) Outstanding Research award, an IBM Outstanding Innovation award, a Google OC award, and a Google founders’ award. Yung’s main professional interests are in Security, Privacy, and Cryptography. His contributions to research and development treat science and technology holistically: from the theoretical mathematical foundations, via conceptual mechanisms which typify computer science, to participation in design and development of industrial products.

Lecture 1: Kleptography