Apologies if you receive multiple copies of this Call for Papers
=================================================================
The Fifth Workshop on
Security In Communications networKs
(SICK 2009)
http://www.sick-workshop.org
Zürich, Switzerland
Octobar, 2009
to be held in conjunction with
the 34th Annual IEEE Conference
on Local Computer Networks (LCN 2009),
October 20-23, 2009, Zürich, Switzerland
CALL FOR PAPERS
The proliferation of commercial activities over different networked systems has
brought security concerns on an unprecedented scale. From traditional
Internet-based applications to newly emerging ubiquitous services over 3G,
Wireless LAN, and mobile ad hoc and sensor networks, there is an increasing
demand of measures to guarantee the confidentiality, integrity, and availability
of system services.
The main purpose of this workshop is to promote further research interests and
activities on network security. It is also aimed at increasing the synergy
between academic and industrial researchers working in this area. We are
interested in experimental, systems-related, and work-in-progress papers in all
aspects of network security.
The topics of interest include (but are not limited to):
* Novel and emerging secure architecture
* Study of attack strategies, attack modeling
* Case studies and analysis of actual attacks
* Continuity of Operations during an attack
* Key management
* Trust management
* Intrusion detection techniques
* Intrusion response, alarm management, and correlation analysis
* Study of tradeoffs between security and system performance
* Intrusion tolerance systems
* Secure protocols
* Security in wireless networks (e.g. mesh networks, sensor networks, etc.)
Authors are invited to submit full papers for presentation at the workshop.
Papers (no more than 8 camera-ready pages, in IEEE TRANSACTION format) should
describe original, previously unpublished work, not currently under review by
another conference, workshop, or journal. All accepted papers will appear in the
IEEE LCN conference proceedings. All paper submissions will be handled
electronically via EDAS: http://edas.info/7231
Important Dates:
Paper submission deadline: May 8, 2009
Notification of acceptance: July 7, 2009
Camera-ready paper due: July 28, 2008
COMMITTEE:
General Chair:
Jens Tölle, FGAN-FKIE, Germany
Program Chairs:
Nils Aschenbruck, University of Bonn, Germany
Jeff Boleng, US Air Force Academy, USA
Technical Program Committee:
J. William Atwood, Concordia Univ., USA
Fernando Colon Osorio, Worchester Polytechnic Institute, USA
Christian Doerr, Delft Univ. of Technology, The Netherlands
Mohamed Eltoweissy, Virginia Tech, USA
Ulrich Flegel, SAP Research, Germany
Marco Gruteser, WINLAB/Rutgers University, USA
Jonas Hallberg, FOI, Sweden
Thorsten Holz, Univ. of Mannheim, Germany
Frank Kargl, Ulm University, Germany
Stefan Karsch, Cologne Univ. of Applied Science, Germany
Hartmut Koenig, BTU Cottbus, Germany
Michael Meier, Univ. of Dortmund, Germany
Ulrike Meyer, RWTH Aachen, Germany
Sebastian Schmerl, BTU Cottbus, Germany
Christoph Schuba, Sun Microsystems, Inc.
Minho Shin, Dartmouth College, USA
Tim Strayer, BBN Technologies, USA
Douglas Summerville, State University of New York at Binghamton, USA
Weichao Wang, University of North Carolina at Charlotte, USA
Cliff Wang, Army Research Office, USA
Ian Welch, Victoria University of Wellington, New Zealand
Moustafa Youssef, Nile University, Egypt
Pieter Mudge Zatko, BBN Technologies, USA
IN COOPERATION WITH:
GI FG SIDAR - http://www.gi-fg-sidar.de/
Hallo,
Just a gentle reminder: Early registration for Eurocrypt 2009 in Cologne
ends _today_. To save 100 USD on late registration fees, register now at
https://secure.iacr.org/conferences/ec2009/register/
The late registration deadline is midnight, Thursday, March 26th, 2009
(Mountain Standard Time).
At the moment, we have 277 registrations. Top five countries are Germany
(76), France (30), Switzerland (26), China (26), the United States (24).
To get updates on Eurocrypt 2009 (e.g. the full statistic on registered
participants), you can also subscribe to the Eurocrypt mailing list via
eMail or Web:
-----------
eurocrypt2009-request(a)lists.ruhr-uni-bochum.de
Subject: void (in particular no command...)
Body: subscribe
-----------
Via http: http://lists.ruhr-uni-bochum.de/mailman/listinfo/eurocrypt2009
Hope to see you in Cologne!
Christopher Wolf
Dear all,
Early bird registration for Eurocrypt 2009 closes on March 26 (Moutain
Standard Time). You can register at
http://www.iacr.org/conferences/eurocrypt2009/registration.html
Best regards,
Christopher
http://www.iacr.org/conferences/eurocrypt2009/program.html
April 26, 2009 Sunday
17:00 – 21:00 Welcome Reception and Registration
April 27, 2009 Monday
08:30 Registration Desk open
09:00 – 09:15 Welcome / Opening Remarks
Session 1
09:15 – 10:55 Security, Proofs and Models I
09:15 – 09:40 Possibility and Impossibility Results for Encryption and
Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, Scott Yilek
09:40 – 10:05 Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal, Ueli Maurer
10:05 – 10:30 Resettably Secure Computation
Vipul Goyal, Amit Sahai
10:30 – 10:55 On the Security Loss in Cryptographic Reductions
Chi-Jen Lu
10:55 – 11:25 Coffee Break
Invited Talk
11:25 – 12:25 Phillip Rogaway
12:45 – 13:45 Lunch
Session 2
13:45 – 15:25 Hash Cryptanalysis
13:45 – 14:10 On Randomizing Hash Functions to Strengthen the Security
of Digital Signatures
Praveen Gauravaram, Lars R. Knudsen
14:10 – 14:35 Cryptanalysis of MDC-2
Lars R. Knudsen, Florian Mendel, Christian Rechberger, Soeren S. Thomsen
14:35 – 15:00 Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
15:00 – 15:25 Finding Preimages in Full MD5 Faster than Exhaustive Search
Yu Sasaki, Kazumaro Aoki
15:25 – 16:25 Coffee Break + Poster Session Slot
Session 3
16:25 – 17:40 Group and Broadcast Encryption
16:25 – 16:50 Asymmetric Group Key Agreement
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
16:50 – 17:15 Adaptive Security in Broadcast Encryption Systems (with
Short Ciphertexts)
Craig Gentry, Brent Waters
17:15 – 17:40 Traitors Collaborating in Public: Pirates 2.0
Olivier Billet, Duong-Hieu Phan
April 28, 2009 Tuesday
08:30 Registration Desk open
Session 4
09:00 – 10:15 Cryptosystems I
09:00 – 09:25 Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi, Leonid Reyzin
09:25 – 09:50 Order-Preserving Symmetric Encryption
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill
09:50 – 10:15 A Double-Piped Mode of Operation for MACs, PRFs and PROs:
Security beyond the Birthday Barrier
Kan Yasuda
10:15 – 11:10 Coffee Break + Poster Session Slot
Session 5
11:10 – 12:25 Cryptanalysis
11:10 – 11:35 On the Security of Cryptosystems with Quadratic
Decryption: The Nicest Cryptanalysis
Guilhem Castagnos, Fabien Laguillaumie
11:35 – 12:00 Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur, Adi Shamir
12:00 – 12:25 Smashing SQUASH-0
Khaled Ouafi, Serge Vaudenay
12:25 – 13:45 Lunch
14 : 00 – 18:00 Social Program
* City Walking Tour (2,5 h)
* City Bike Tour (3h)
* Chocolate Museum (1h)
* Wallraf-Richartz Museum (1h)
* Boat Cruise (4h)
18:00 – 23:00 Rump Session
April 29, 2009 Wednesday
09:00 – 9:15 Best Paper Award Ceremony
Session 6
09:15 – 10:30 Cryptosystems II
09:15 – 09:40 Practical Chosen Ciphertext Secure Encryption from Factoring
Dennis Hofheinz, Eike Kiltz
09:40 – 10:05 Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger, Brent Waters
10:05 – 10:30 A Public Key Encryption Scheme Secure against Key
Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Jan Camenisch, Nishanth Chandran, Victor Shoup
10:30 – 11:25 Coffee Break + Poster Session Slot
Invited Talk
11:25 – 12:25 Cryptography without (Hardly any) Secrets ?
Shafi Goldwasser
12:25 – 13:45 Lunch
Session 7
13:45 – 15:25 Security, Proofs and Models II
13:45 – 14:10 Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
14:10 – 14:35 On the Security of Padding-Based Encryption Schemes (Or:
Why we cannot prove OAEP secure in the Standard Model)
Eike Kiltz, Krzysztof Pietrzak
14:35 – 15:00 Simulation without the Artifical Abort: Simplified Proof
and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare, Thomas Ristenpart
15:00 – 15:25 On the Portability of Generalized Schnorr Proofs
Jan Camenisch, Aggelos Kiayias, Moti Yung
15:25 – 15:45 Coffee Break
Session 8
15:45 – 16:35 Side Channels
15:45 – 16:10 A Unified Framework for the Analysis of Side-Channel Key
Recovery Attacks
Francoix-Xavier Standaert, Tal Malkin, Moti Yung
16:10 – 16:35 A Leakage-Resilient Mode of Operation
Krzysztof Pietrzak
16:45 – 18:00 IACR Business Meeting
April 30, 2009 Thursday
Session 9
09:00 – 10:40 Curves
09:00 – 09:25
ECM on Graphics Cards
Daniel Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
09:25 – 09:50 Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche, David Kohel, Francesco Sica
09:50 – 10:15 Endomorphisms for Faster Elliptic Curve Cryptography on a
Large Class of Curves
Steven Galbraith, Xibin Lin, Michael Scott
10:15 – 10:40 Generating Genus Two Hyperelliptic Curves over Large
Characteristic Finite Fields
Takakazu Satoh
10:40 – 11:10 Coffee Break + Poster Session Slot
Session 10
11:10 – 12:25 Randomness
11:10 – 11:35 Verifiable Random Functions from Identity-based Key
Encapsulation
Michel Abdalla, Dario Catalano, Dario Fiore
11:35 – 12:00 Optimal Randomness Extraction from a Diffie-Hellman Element
Pierre-Alain Fouque, Sebastien Zimmer, David Pointcheval, Celine Chevalier
12:00 – 12:25 A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
12:25 – 12:40 Closing Remarks
Liebe Mitglieder,
auf der gestrigen Fachgruppenversammlung wurden unter Wahlleitung von
Frau Prof. Ulrike Meyer folgende 4 Personen als Leitungsgremium der FG
NetSec gewählt:
Ammar Alkassar
Prof. Mark Manulis
Prof. Jörg Schwenk
Dr. Christopher Wolf
Die Amtszeit beträgt 3 Jahre. Sprecher & stv. Sprecher des
Leitungsgremiums müssen noch formal gewählt werden - derzeit sieht es
allerdings danach aus, als ob dies Prof. Schwenk (Sprecher) und Prof.
Manulis (stv. Spreche) übernehmen werden.
Da der gestrige Workshop mit rd. 35 Teilnehmern aus Industrie, Forschung
sowie Studierenden sehr erfolgreich war, wird es ihn (mit anderer
thematischer Ausrichtung) wohl auch kommendes Jahr wieder geben.
Beste Grüße,
Christopher Wolf