ECRYPT Logo

coordination & support action ECRYPT-CSA

research network ECRYPT-NET

ECRYPT-CSA Events organized in the past

Workshop on Ultra low energy/power/latency cryptography

9-10 November 2016, Cannes (France)

Organized by  KU Leuven Logo

Abstract: In the last decade the attention in symmetric cryptography has shifted away from design of symmetric algorithms towards lightweight cryptography. There have been some interesting approaches in lightweight block ciphers (PRESENT, Simon, Speck), stream ciphers (Grain, Trivium), and hash functions (Photon, Quark, Spongent), that result in a gate count reduction of a factor of 2-3 over established standards. However, the current insight is that we have not yet fully understood the fundamental tradeoffs in this area; major improvements would still be needed for devices that harvest power from the environment and for medical devices running on non-rechargeable batteries; moreover, in some environments energy consumption is much more important than power, resulting in completely new design tradeoffs (e.g. the block cipher PRINCE). For bus encryption in processors, low latency is required as well as zero overhead context switching. So far, substantial improvements in area, power, latency or energy are obtained by inserting mathematical structures; advanced cryptanalytic techniques and tools are required to evaluate the security of these novel primitives and to develop new designs that offer improved tradeoffs.
The workshop is composed of invited presentations and panel discussion in collaboration with the academic, industrial and government related scientific communities.

More >>>

SPEED-B – Software performance enhancement for encryption and decryption, and benchmarking

19-21 October 2016, Utrecht (The Netherlands)

Organized by  TUE Logo

Abstract: This conference addresses efficient and secure implemenation of secret-key and public-key cryptography and benchmarking. This conference follows the successes of the earlier SPEED and SPEED-CC conferences and extends the scope to benchmarking of software.

More >>>

School on Computer Aided Analysis of Cryptographic Protocols

11-14 September 2016, Bucharest (Romania)

Organized by  BRIS Logo

Abstract: The school aims to introduce the participants to the principles of computer aided analysis of cryptographic systems. The primary audience are PhD students working on topics closely related to the focus of the school. Since the school offers an alternative view to the one called “provable security” we encourage the participation of students that are familiar with this approach. While no specific prior knowledge on cryptography is required, familiarity with basic concepts from the theory of formal languages and theory of programming languages is recommended.
The school is about foundations of computer aided verification for cryptographic systems. The talks will introduce several existent methods (e.g. theorem proving, type inference), will introduce some of the existing tools (Proverif, Tamarin, F*, Easycrypt) and will consider a range of applications from the security of basic primitives to that of larger protocols like Transport Layer Security (TLS). Each topic will have allocated a couple of lectures and a problem class.

More >>>

Workshop on White-Box Cryptography and Obfuscation

14 August 2016, Santa-Barbara, California

Organized by  CrypoExperts Logo

Abstract: The program of the workshop intends to cover the following themes:

  • What are white-box cryptography and (indistinguishability) obfuscation? How are they related together?
  • Constructions and attacks on practical white-box implementations.
  • Constructions and attacks on indistinguishability obfuscation.
  • Use cases showing the growing interest of the industry towards white-box cryptography and obfuscation, in particular in mobile payments or DRMs.

The workshop will be composed of invited presentations, and of a discussion session aiming at building a vision of the issues faced by theoretical and practical obfuscation, and how to address them.

More >>>

Workshop on Strategic research challenges for privacy technologies

18 July 2016, Darmstadt (Germany)

Organized by  KU Leuven Logo

Abstract: In this workshop we will present and discuss the state of the art and the current open research challenges in the area of cryptography and privacy, particularly taking into consideration the new cybersecurity strategies as well as the Snowden revelations concerning Internet surveillance. The workshop will consists of presentations, discussion panel, and a preliminary report on the identified challenges.

More >>>

Workshop on Cryptocurrencies

3 June 2016, Athens (Greece)

Organized by  KU Leuven Logo

Abstract: Bitcoin started in 2009 and has witnessed an unexpected growth in the past years. Bitcoin has also introduced innovative technologies such as a distributed ledger that allow for distributed generation and verification of a virtual currency. In the wake of Bitcoin, hundreds of other cryptocurrencies have been launched with varying success. The emergence of this new approach towards currencies has raised challenging research questions on virtual currencies. A growing number of researchers is studying the algorithms and models behind Bitcoin using techniques from computer science, mathematics and economics. The financial sector is increasingly interested in the opportunities and risks presented by this new paradigm. This workshop aims to bring together experts from academia and industry who want to study these new ecosystems from a technical or socio-economic perspective and create a roadmap for further research.

More >>>

Workshop on Cryptographic protocols for small devices

13 May 2016, Vienna (Austria)

Organized by  RUB Logo

The workshop aims to define future directions for low energy/power/latency public-key cryptography. It is composed of invited presentations in collaboration with the academic, industrial and government related scientific communities. A white paper will be provided as the output of the workshop to strategically build the future European research roadmap in this area.

More >>>

A Workshop About Cryptographic Standards (AWACS)

8 May 2016, Vienna (Austria)

Organized by  CrypoExperts Logo

AWACS will be held on Sunday May 8, in the same venue as Eurocrypt. The program intends to cover the following themes:

  • Can we trust cryptography standards? What are the risks pertaining to standardization in our field?
  • Insights from within the crypto working groups in standardization bodies (ETSI, ISO, IETF, …),
  • Present and near-future trends in crypto standards (with an emphasis on the post-quantum rush),
  • Political and societal aspects of cryptography standards.

Trust in standardized cryptographic mechanisms is highly critical not only in Europe but across the globe, and has a direct impact on the security industry. This ECRYPT CSA workshop intends to provide a platform for the academic, industrial and gov-related cryptographers to foster discussion on standards within the cryptographic community.

The workshop will be composed of invited presentations as well as a discussion panel aiming at building a vision of the issues faced by standardization in cryptography and how to address them.

More >>>

School on symmetric crypto: design, cryptanalysis and implementations

17-19 March 2016, Bochum (Germany)

Organized by  RUB Logo

Abstract: Symmetric cryptography builds the backbone of our secure communication. This school will offer graduate students and young researchers the opportunity to learn more symmetric primitives, from block ciphers to hash-functions and authenticated encryption mechanisms. The school will cover design, security analysis and provable aspects in the area of symmetric cryptography, thus giving students a broad but profound introduction into the area. It will in particular cover subjects that are linked to interesting research topics as well as challenging problems from industry.

More >>>

Post-Snowden Cryptography

9-10 December 2015, Brussels (Belgium)

Organized by  TUE Logo

Abstract: Since June 2013 the world, and in particular the security world, has been shaken by the Snowden revelations. It is of high urgency to review all current standards (and procedures of how they are made) to weed out weak crypto intentionally (or unintentionally) inserted. The December 2014 revelations of targeted attacks, including targeted hardware manipulations, open interesting research questions about how to secure a system which contains malicious components and how to detect their use. This workshop is looking for an analysis of the situation after the Snowden revelations, and solutions for the future of cryptography and security.

More >>>

Future Directions in Computing on Encrypted Data

10-11 November 2015, Bristol (UK)

Organized by  BRIS Logo

Abstract: In this workshop we will be discussing various open problems and opportunities arising from the recent advances in techniques to compute on encrypted data. The workshop will consist of a number of presentations, as well as a discussion of a preliminary report on the topic from the ECRYPT-CSA project.

More >>>

Workshop on Tools for Asymmetric Cryptanalysis

8 October 2015, Bochum (Germany)

Organized by  RUB Logo

Abstract: The workshop provides an overview of the state of art for tools in asymmetric crypt-analysis. This covers software packages (e.g. Magma) as well as dedicated hardware for cryptanalysis (e.g. FPGAs). The workshop's major goal is to identify the current needs and open problems for cryptanalytic tools by the scientific community, governmental institutions and the industry.

More >>>

WISE 2015 - Workshop on Implementation: Security and Evaluation

11 September 2015, Paris (France)

Organized by  CrypoExperts Logo

Abstract: The security level of common cryptosystems in the black-box setting (i.e. where crypto-graphic implementations are modeled as oracles) is well understood. Assessing the security of an actual cryptographic implementation that may leak additional information by side channels or that may be tampered with is still an unsolved issue. This workshop has a scientific program centered around the following themes:

  • attack models and evaluation methodologies,
  • present and future certification schemes and standardization,
  • implementation security proofs and their automatization.

The workshop will be composed of invited presentations as well as a discussion panel aiming at building a vision of the current trends in the field and their expected evolutions in the future. The security of cryptographic implementations is a key topic in Europe, with both scientific and economic impacts. The purpose of this ECRYPT CSA workshop is to consult the academic, industrial and gov-related scientific communities to build the future european research roadmap in this strategic area.

Registration is free, but mandatory. Please register before August 31.

More >>>

Workshop on Challenges in Authenticated Encryption

17 July 2015, Utrecht (The Netherlands)

Organized by  TUE Logo

Abstract: How can we use secret keys to protect the confidentiality, integrity, and availability of communication? This workshop will look beyond the CAESAR competition to identify continuing real-world needs, failure areas, open problems, and research opportunities.

More >>>

This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 645421.

H2020

Project reference: 645421
Start date: 01-03-2015
End date: 28-02-2018
Duration: 36 months

Project funding: € 1.000.000
Programme: H2020
Call: H2020-ICT-2014-1
Action: Coordination & support action