Security of Symmetric Ciphers in Network Protocols

Home > Workshops > 2015 > Security of Symmetric Ciphers in Network Protocols

Security of Symmetric Ciphers in Network Protocols

 25 - 29 May 2015

ICMS, 15 South College Street Edinburgh

Scientific Organiser

  • Subhamoy Maitra, Indian Statistical Institute
  • Kenny Paterson, Royal Holloway

About:

As part of a collaborative venture between the Indian Statistical Institute and the Royal Holloway, this workshop focused on mathematics and its application to cryptology and information security.  The ultimate objective of this venture was to have a significant long-term impact in the relevant fields of research in both India and the UK.

A selection of group photos can be found on the ICMS Flickr account.

Speakers

  • Naomi Farley, Royal Holloway - Cryptographic Enforcement of Information Flow Policies Without Public Information

  • Sam Scott, Royal Holloway - Key Rotation in Symmetric Protocols

  • Rachel Player, Royal Holloway - On the Concrete Hardness of Learning With Errors 

  • Thyla Van Der Merwe, Royal Holloway - Attacking TLS: Exploiting Non-Randomness in RC4

  • Christian Janson, Royal Holloway - Verifiable Computation Schemes: Outsourcing Computation to Untrusted Servers

  • Martin Albrecht, Royal Holloway - Ciphers for MPC and FHE

  • Enrique Larraia, Royal Holloway - Efficient Multi-Party Computation from Oblivious Transfer

  • Chris Mitchell, Royal Holloway - Challenges in Standardising Cryptography 

  • James Alderman, Royal Holloway - Extensions to Publicly Verifiable Outsourced Computation

  • Kenny Paterson, Royal Holloway - Stream-Based Secure Channels

  • Theodosis Mourouzis, University College London - Multiplicative Complexity Reductions in Cryptography and Cryptanalysis

  • Nicolas Courtois, University College London - Survey of Recent Attacks on GOST Block Cipher

  • Christophe Petit, University College London - Rubik's for Cryptographers

  • Guy Barwell, University of Bristol - Turning Online Ciphers Off

  • Martijn Stam, University of Bristol - The Role of Key Wrapping in Cryptographic APIs

  • Luke Mather, University of Bristol - Side-Channel Analysis in a Networked Environment

  • Ana Salagean, Loughborough University - Combinatorial Results for Higher Order Differential Attacks

  • Matthew Dodd, Cryptocraft Ltd - On Kenny's Unicity Distance Problem

  • Mark Ryan, University of Birmingham - How to Detect Unauthorised Usage of a Key

  • Pooya Farshim, Queen's University Belfast - RKA Security Analysis of Blockciphers

  • Michael Ward and David Roberts, MasterCard - Symmetric Ciphers and International Retail Payments

  • Steve Babbage, Vodafone - Symmetric Ciphers in Mobile Phone Networks

  • Markulf Kohlweiss, Microsoft Research - The (mi)TLS Record Protocol

  • Bhupendra Singh, CAIR, DRDO - On Bent Function Affine In-Equivalence a Decisional Approaches

  • Sourav Sen Gupta, Indian Statistical Institute - RC4 - Non-Random Sequences From Non-Random Permutations 

  • Sushmita Ruj, Indian Statistical Institute - Combinatorial Key Management in Resource Constrained Devices 

  • Goutam Paul, Indian Statistical Institute - Non-Randomness of Reduced-Round Salsa20 and its Implications   

  • Bimal Roy, Indian Statistical Institute - Development of Cryptography in India