ECRYPT's virtual labs
SymLab and
VAMPIRE
organize DIAC -- Directions in Authenticated Ciphers.
Workshop venue:
DIAC takes place July
05-06, 2012, in the Clarion Sign Hotel Stockholm, Sweden. The hotel is
within walking distance from the train station.
For accommodation see the separate site here.
DIAC will start Thursday morning. The workshop will end around 5pm
on Friday. There will be a 4 invited talks along 13 contributed
talks and lots of time for discussions and panels. The contributed
papers were selected based on submitted papers and a refereeing
process. (As for all ECRYPT conferences, there will be no formal
proceedings for DIAC but a workshop record with all accepted
papers.)
Topic:
Users, starting with a shared secret key, need to protect messages
against espionage and against forgery. Dissatisfaction with the
security and performance of current approaches has led to calls for a
new competition for authenticated ciphers. The purpose of this workshop
is to evaluate the state of the art in authenticated encryption and
gather community input regarding desired future directions.
We hope that the DIAC workshop will shape a future competition in the
same way that SASC 2004 and the ECRYPT Hash Workshop 2007 shaped the
ECRYPT Stream Cipher Project and the SHA-3 competition.
DIAC asks for submissions on the following topics:
- Components and combinations
- block ciphers
- dedicated stream ciphers
- stream ciphers based on block ciphers
- dedicated hash functions, sponges, etc.
- hash functions based on block ciphers
- dedicated MACs
- MACs based on hash functions
- MACs based on block ciphers
- authenticated encryption based on any of the above
- dedicated ciphers with built-in authentication
- Attacks
- cryptanalysis of symmetric systems
- side-channel attacks on symmetric systems
- real-world costs of attacks
- Implementations
- APIs
- software
- FPGAs
- ASICs
- comparisons
- Requirements
- quantitative security: e.g., is 80 bits enough?
- qualitative security: e.g., MAC vs. PRF, INT-PTXT vs. INT-CTXT
- robustness: e.g., security under nonce reuse, security against idiots
- side-channel resistance
- handling of limited randomness
- safety of using a key for many messages: 2^32? 2^64?
- key agility
- throughput in software, FPGA, ASIC
- parallelizability, incrementality, etc.
- ASIC area budgets, FPGA slice budgets, etc.
- power limits, energy limits, etc.
- bandwidth: short plaintexts, ciphertexts, authenticators
- flexibility: e.g., variable authenticator lengths
- convenience: e.g., one-pass, intermediate tags
- use cases
Invited Speaker:
Call for papers:
There will be no formal proceedings, but a handout with abstracts will
be provided to all participants. (This avoids submissions to DIAC
from conflicting with submissions to forthcoming conferences with
proceedings).
Call for contributions: DIAC_CFP.txt
Important dates:
May 07, 2012: | submission of papers |
|
June 04, 2012: | notification of acceptance or rejection | |
June 18, 2012: | revised version of accepted papers due | |
July 05-06, 2012: | DIAC workshop | |
Each submission should start with a title, a list of the authors
together with their affiliations and a short abstract describing the
content of the paper. This should be followed by either a full paper or
an extended abstract of at least 1 page. We also encourage submissions
of panel proposals, white papers, lists of desiderata, etc. Authors of
each submission must guarantee that they will present the submission at
the workshop if it is accepted.
The submission server is open at
http://hyperelliptic.org/conferences/diac/iChair/submit.php.
List of accepted papers for DIAC (in alphabetical order)
All accepted papers will be distributed during DIAC to the participants.
Note that DIAC does not have proceedings, inclusion in the
workshop records
does not constitute publication.
- Title: Stronger Security Guarantees for Authenticated Encryption Schemes
Authors: Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, and Martijn Stam
Affiliations: Georgia Institute of Technology; Royal Holloway, University of London; University of Bristol
-
Title: Lightweight AES-Based Authenticated Encryption
Authors: Andrey Bogdanov, Florian Mendel, Francesco Regazzoni and Vincent Rijmen
Affiliations: KU Leuven, Belgium, ALaRI - USI, Switzerland, TU Graz, Austria
-
Title: Hash-CFB
Authors: Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
Affiliations: Bauhaus-University Weimar and Cisco Systems, USA
-
Title: Suggestions for Hardware Evaluation of Cryptographic Algorithms
Authors: Frank K. Gurkaynak
Affiliations: Microelectronics Design Center, ETH Zurich, Switzerland
-
Title: Permutation-based encryption, authentication and authenticated encryption
Authors: Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche
Affiliations: STMicroelectronics and NXP Semiconductors
-
Title: AEGIS: A Fast Authenticated Encryption Algorithm
Authors: Hongjun Wu, Bart Preneel
Affiliations: Nanyang Technological University, Katholieke Universiteit Leuven
-
Title: Authenticated encryption in civilian space missions: context and requirements
Authors: I. Aguilar Sanchez, D. Fischer
Affiliations: European Space Agency
-
Title: SipHash: a fast short-input PRF
Authors: Jean-Philippe Aumasson and Daniel J. Bernstein
Affiliations: NAGRA, Switzerland and University of Illinois at Chicago, IL, USA
-
Title: Heavy Quark for secure AEAD
Authors: Jean-Philippe Aumasson and Simon Knellwolf and Willi Meier
Affiliations: NAGRA, Switzerland and FHNW, Switzerland, and FHNW, Switzerland
-
Title: Cryptanalysis of EAX-Prime
Authors: Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata
Affiliations: NEC corporation (Minematsu), Bauhaus-Universitat Weimar (Lucks), Nagoya University (Morita and Iwata)
-
Title: How Fast Can a Two-Pass Mode Go? A Parallel Deterministic Authenticated Encryption Mode for AES-NI (Extended Abstract of Work in Progress)
Authors: Kazumaro Aoki, Tetsu Iwata, Kan Yasuda
Affiliations: NTT, Nagoya University
-
Title: A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Authors: Markku-Juhani O. Saarinen and Daniel Engels
Affiliations: Revere Security, United States of America
-
Title: An Improved Hardware Implementation of the Grain-128a Stream Cipher
Authors: Shohreh Sharif Mansouri and Elena Dubrova
Affiliations: KTH
Program Committee:
- Daniel J. Bernstein (University of Illinois at Chicago, USA)
- Carlos Cid (Royal Holloway, University of London, UK)
- Tetsu Iwata (Nagoya University, Japan)
-
Thomas Johansson (Lund University, Sweden)
- Tanja Lange (Technical University of Eindhoven, The Netherlands)
- Stefan Lucks
(University of Weimar, Germany)
- Kaisa Nyberg (Aalto University, Finnland)
- Elisabeth Oswald (University of Bristol, UK)
- Bart Preneel (Katholieke Universiteit Leuven, Belgium)
- Vincent Rijmen (Katholieke Universiteit Leuven, Belgium)
- Phillip Rogaway (University of California, Davis, USA)
- Martijn Stam (University of Bristol, UK)
- François-Xavier Standaert (Universite catholique de Louvain, Belgium)
- Ingrid Verbauwhede (Katholieke Universiteit Leuven, Belgium)
Acknowledgments:
The list of topics above draws on discussions at the January 2012
Dagstuhl workshop on Symmetric Cryptography. We gratefully acknowledge
suggestions from Jean-Philippe Aumasson, Eli Biham, Joan Daemen, Orr
Dunkelman, Lars Knudsen, Bart Preneel, and Greg Rose.
Organization:
The workshop is organized by the European Network of Excellence
(ECRYPT). The workshop is an activity of ECRYPT's
SymLab - Symmetric Techniques Virtual Lab and
VAMPIRE -
Virtual Application and Implementation Research Lab.
Contact:
For further information please contact
diac (at) hyperelliptic (dot) org
Organization:
Disclaimer: The information on this web site is provided as is,
and no guarantee or warranty is given or implied that the information
is fit for any particular purpose. The user thereof uses the
information at its sole risk and liability.