|
ENSIMAG / Grenoble-INP - UJF MOSIG Master-1 SCCI
|
|
Four-weeks Intensive Projects in
Security, Cryptology and Coding of Information systems
Workshop day: Student presentations
19th June 2009
NEWS
- Slides should be in English; Talks may be given (by decreasing preference order) preferably in English,
or else in English-then-French or else in French.
- At 1 pm, all participants may meet for lunch with the jury at the Diderot restaurant...
(for a "universitaire" workshop lunch)
- At 5 pm, after the deliberation of the committee, students will participate to the evaluation.
SCHEDULE
- 8h30
Alexandre Anzala-Yamajako, Antoine Rojat :
Review of the Merkle-Hellman cryptosystem and the LLL attack
- 9h
Jérémie Boulanger, Bastien Bailly :
Performance analysis of two secure tunneling mechanisms
- 9H30
Simon Rousseau, Jérôme Javelle :
Parallelizing block Krylov iteration on multicore/manycore
- 10h
Martin Guest, Antoine Lefebvre :
Weaknesses in WEP and WPA
- 10h45
Raphael Laurent - Jeremie Tharaud:
Linear algebra over the field with two elements using GPUs
An attempt to add to M4RI a small core
using the NVIDIA CUDA library
- 11h15
Arnaud Bienner, Benoit Dequidt :
Implémentations parallèles de MD6, une fonction de hachage cryptographique
moderne
Parallel implementations of MD6, a modern
cryptographic hash function
- 11h45
Laura Medji, Terence Momo, Romain Ayala :
Protection on audio CDs
- 12h15
Julien Caron, Jeremie Stordeur :
Generation of strong primes for ssh keys
- 14h (2pm)
Eisa AL SHAMSI, Mohamed AL ALI : Block Ciphers on GPU: Integration and
Evaluation of the improvement
- 14h30
Hassan Alnoon, Shayma Alawadi : Executing
Parallelized Dictionary Attacks on CPUs and GPUs
- 15h
Mohammed ALMANSOORI, Eiman ALSHEBLI, Omar BANI HASHIM
Attack by Faults: DFA attacks on RSA
- 15h30
Amal AlDhaheri , Yousef Alboloushi :
Proprietary Cipher on TCP/IP vs IPsec
Performance Analysis for IPsec
- 16h
Mohamed Alnuaimi, Khuloud Mohamed
The index Calculus Method
- 16h30
Hamad Raeisi, Sultan AlTamimi :
ATTACK ON RSA BY BRANCH PREDICTION
Program chair: Jean-Louis Roch
Program committee:
Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Laurent Fousse,
Clement Pernet, Vincent Roca
List of proposed subjects in 2009
- Development and integration of a symmetric cipher in the protocol OpenSSLProject
- Extending block and key sizes of a symmetric cipher: the example of CS2
- Integration of a personal symmetric cipher with compression in PPP protocol
- From DES to AES (Rijndael) : attacks and evolutions of symmetric ciphers standards
- Cryptographically secure pseudo-random number generator; Application to stream cipher
- From Block ciphers to Hash functions
- Attacks on hash functions
- Cipher_modes_:_impact_on">Cipher modes : impact on performances and security
- Stable distributed storage based on Reed-Solomon/BCH codes
- Generation of strong prime numbers and attacks on basic SSH RSA keys
- Weakness on RSA-PKCS
- Attack on RSA by branch prediction
- Attacks by faults
- Certificates PGP and X509
- Secure hardware architecture
- Security of GSM protocols
- Weakness of WEP protocol
- Fault-tolerant distributed algorithms and application to certification of peer-to-peer computations.
- Block cipher on GPU: integration and evaluation of the improvement.
- One-way function on GPU: cryptographic hash functions. Integer and modular arithmetic: application to RSA.
- GPU-based for Linear algebar over F2 -Improving cryptographic algebraic attacks.
- Proprietary cipher on TCP/IP.
- List-decoding: correction of Reed-Solomon code beyond the correction rate.
- Parallelizing block Krylov iteration on multicore/manycore - Improving integer factorization performances.
- High performance finite precision arithmetic