Real World Cryptography Workshop 2015

The RWC series of workshops aims to bring together cryptography researchers with developers implementing cryptography in real-world systems. The main goal of the workshop is to strengthen the dialogue between these two communities. Topics covered will focus on uses of cryptography in real-world environments such as the Internet, the cloud, and embedded devices. The 2015 edition of the workshop will be held in London, UK, 7-9 January 2015. The conference venue is the New Academic Building (NAB), London School of Economics, 54 Lincoln's Inn Fields, London WC2A 3LJ. This year the steering committee accepts submissions for presentation in the workshop. The deadline for full consideration is November 1st, 2014. For more information please visit:

http://www.realworldcrypto.com/rwc2015

Bar-Ilan Winter School on Cryptography - Secure Key Exchange

8th Bar-Ilan Winter School on Cryptography that will be held on February 11-15, 2018 at the Kfar Hamaccabiah conference center in Ramat-Gan, Israel. This year the school topic will be Secure Key Exchange. The speakers are:

• Karthik Bhargavan, INRIA, France
• Marc Fischlin, Darmstadt University of Technology, Germany
• Hugo Krawczyk, IBM T. J. Watson Research Center, US
• Kenny Paterson, Royal Holloway University of London, UK
• David Pointcheval, ENS Paris, France

The tentative schedule and other details can be found at http://cyber.biu.ac.il/event/8th-biu-winter-school/

The registration form is available at http://cyber.biu.ac.il/8th-biu-winter-school-registration-form/

Registration is free for all overseas participants (due to costs already incurred due to travel). Registration for Israeli (local) participants is 750 shekels for the entire school. Israeli participants who have difficulty paying the registration fee (especially students) can request a waiver; please include this in the special request box in the form. After registration has been confirmed, Israeli participants will receive a link to carry out the payment. Registration (for Israeli participants) will be considered complete only after payment.

Siber Güvenlik Platformu (Türkçe)

SİBER GÜVENLİK PLATFORMU VI etkinliği TOBB EKONOMİ VE TEKNOLOJİ ÜNİVERSİTESİ'nde 22-23 Kasım 2017'de Ankara'da.
Yapılacak etkinliğin ana teması “Bulut Bilişim Güvenliği” olup, etkinliğimizde “Dünya`da ve Türkiye`de Bulut Bilişimin kullanılabilirliği ve güvenliği konusunda şu anda mevcut teknolojik durum ve bu alanda kamu ve özel sektörde bulut bilişim alanında yapılacak çalışmalarda dikkat edilmesi gereken hususlar ve yaklaşımlar ” gibi birçok konu tartışılacaktır. Ayrıca siber güvenlik alanında en iyi doktora tezi ödülü verilecektir. Etkinliğin ikinci gününde bu yılın siber güvenlik ile ilgili eğitimler verilecektir.

http://siberguvenlikplatformu.org/sayfa/45/siber_guvenlik_doktorayuksek_...

Detaylı bilgi için: http://siberguvenlikplatformu.org/

Cryptographic Engineering Course: June 19-23, 2017

Cryptographic Engineering

June 19-23, 2017

EPFL, Lausanne

Switzerland



This is a course for hardware and software design engineers in industry, interested in embedding cryptography into their products. The course is also suitable for graduate students and researchers who would like to learn the state-of-art and cutting-edge research topics in cryptographic hardware and embedded systems.



Come to meet the top experts, scientists, and engineers who are at the forefront of cryptographic design: Christof Paar (Co-founder of the Cryptographic Hardware and Embedded Systems Workshop and Professor at Ruhr University Bochum), Cetin Kaya Koc (Co-founder of the Cryptographic Hardware and Embedded Systems Workshop and the Editor-in-Chief of Journal of Cryptographic Engineering), Ingrid Verbauwhede (University of Leuven, Belgium), Pankaj Rohatgi (Cryptography Research, USA), Marc Joye (Technicolor, USA), Francois-Xavier Standaert (Universite catholique de Lovain, Belgium), Werner Schindler (Technical University of Darmstadt & BSI, Germany), and Viktor Fischer (University of Saint-Etienne, France).



Additionally, every year we have an invited speaker who covers a recent hot topic in cryptographic engineering.



This course is offered every year since 2002, at the campus of EPFL (Ecole Polytechnique Federale de Lausanne) in Lausanne, Switzerland. Situated on the shores of Lake Geneva, Lausanne is a picturesque city, built on three hills, surrounded by vineyard-covered slopes. Rising impressively from the opposing French lakeshore are the Savoy Alps.



We have 4 lectures in a day, each lecture lasting 1.5 hours. There are coffee breaks between the lectures, and lunch breaks at noon, and also a banquet dinner, on TuesdayOn Friday, we have 3 lectures, and the course ends at 3pm.



To see the titles and abstracts of the lectures, please go to the website: 

http://mead.ch/MEADNEW/cryptographic-engineering



This year, the course is offered during the week of June 19-23, 2017. 

See the above website for registration and hotel reservation.



The program is below:



MONDAY, June 19

* Introduction to Block Ciphers; DES and AES - Christof Paar

* Lightweight Block Ciphers for RFIDs - Christof Paar

* Computational Requirements of Public-Key Cryptography - Cetin Kaya Koc

* Arithmetic in Integer Rings and Prime Fields - Cetin Kaya Koc



TUESDAY, June 20

* Specialized Hardware for Secret Key Algorithms - Ingrid Verbauwhede

* Introduction to PUFs (Physically Uncloneable Functions) - Ingrid Verbauwhede

* Arithmetic in Binary Fields - Cetin Kaya Koc

* PKC in Hardware and Embedded Software - Cetin Kaya Koc



WEDNESDAY, June 21

* Trusted Computing Architectures, SSL and IPSec - Pankaj Rohatgi

* Recent Hot Topics in Cryptographic Engineering - Invited Speaker

* Introduction to Side-Channel Analysis - Marc Joye

* Electromagnetic Analysis and Advance Side-Channel Analysis - Pankaj Rohatgi



THURSDAY, June 22

* RSA - Side Channel Attacks and Countermeasures - Marc Joye

* ECC - Side Channel Attacks and Countermeasures - Marc Joye

* Side Channel Attacks to Block Ciphers: DES and AES - Francois-Xavier Standaert

* Countermeasures for Block Ciphers - Francois-Xavier Standaert



FRIDAY, June 23

* Random Number Generators for Cryptographic Applications -  Werner Schindler

* Evaluation Criteria for Non-Deterministic Random Number Generators - Werner Schindler

* Random Number Generator Design Constraints and Challenges - Viktor Fischer

 

Privacy Enhancing Technologies Symposium (PETS / PoPETs 2018)

Important Dates for PETS 2018

All deadlines are 23:59:59 American Samoa time (UTC-11)

Issue 1:
Paper submission deadline: May 31, 2017

Issue 2:
Paper submission deadline: August 31, 2017

Issue 3
Paper submission deadline: November 30, 2017

Issue 4:
Paper submission deadline: February 28, 2018

 

Submission Guidelines

Full submission guidelines are at https://www.petsymposium.org/authors.php#submission-guidelines

 

As part of program committee and editorial board, I encourage submissions to this great venue.

https://petsymposium.org/cfp18.php

 

Cyber-Physical Security Education (CPS Ed) Workshop 2017

The CPS Ed Workshop website: 
  http://cpsed.org
The Steering Committee and Program Committee are listed here:
  http://koclab.cs.ucsb.edu/cpsed/committees.html
The list of invited speakers:
  http://koclab.cs.ucsb.edu/cpsed/speakers.html

We invite contributed presentations. At this time, only an abstract is needed; The deadline is May 15. Please see the Call for Papers here (which also includes the submission link): https://easychair.org/cfp/CPSEdWorkshop2017

Springer will publish the post-proceedings of CPS Ed Workshop 2017. The deadline for submission is December 31, 2017. However, you need to submit an abstract and attend the workshop first.

IEEE UBMK 2017

2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK 2017)

Akdeniz University, Antalya, Turkey, on 5-7 October 2017.

 

All presented papers will be included in IEEE Xplore Digital Library. Full paper submission deadline is 1 June 2017.

 

http://www.ubmk.org/

 

Main Issues

• Virtualization

• Cloud Computing, Applications and Security

• Information Theory

• Artificial Intelligence and Applications

• Web and Data Mining

• Data Science

• Big Data Analytics

• Web Technologies and Applications

• IoT, IoE, M2M

• Mobile Computing

• Computer Networks and Applications

• Algorithms and Algorithmic Designs

• Information and Computer Security

• Computer Architectures

• Microprocessor Based Application

• Data Structures

• Programming Languages

• Operating Systems and Applications

• Software Engineering

• Theories, Technologies, Applications and Security for Databases

Other and Current Issues

• Search Engines, Applications and Threats

• Forensics and Counter Forensics

• Cryptography and Cryptanalysis

• Semantic Web

• Natural Language Processing

• Green IT

• Software Defined Networks

• Copyright Protection Approaches

• Big Data Centers, Applications and Security

• Open Sources

• Next Generation Internet Technologies and Protocols

• Cyber Security, Defense and Laws

• Information Technologies

• Governance

• Information Systems Standards

• M2M and Industry 4.0

• Applications in Silicon

Education, Strategies and Policies

• Computer Science and Engineering Education

• New Trends in Computer Engineering

• Quality and Accreditation in Graduate Education

• Country Strategies and Policies

• Audit and Certification in Information Systems

• Engineering and Social Responsibility

Pages

Subscribe to Crypto RSS