vampire
VAMPIRE

Workshop on Cryptography for the Internet of Things

November 20 - 21, 2012, Antwerp, Belgium




ECRYPT Logo
Network of Excellence in Cryptology
ICT-2007-216676

Program

The workshop will start in the morning of the 20th and end with the afternoon coffee break on Nov 21.

20 Nov09:00–09:25Coffee
09:25–09:30Opening
09:30–10:15Michael Ward (Mastercard, UK): Contactless Payments—a Card Payments Scheme perspective (abstract)
10:15–11:00Christof Paar (Ruhr-Universität Bochum, Germany): Anonymous Payment RFID Tokens (abstract)
11:00–11:30Coffee
11:30–12:15Jens Hermans (K.U. Leuven, Belgium): Privacy Preserving Protocols (abstract)
12:30–14:00Lunch
14:00–14:45Gildas Avoine (Université catholique de Louvain, Belgium): Relay Attacks and Distance Bounding Protocols (abstract)
14:45–15:30Tim Güneysu (Ruhr-Universität Bochum, Germany): Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices (abstract)
15:30–16:00Coffee
16:00–17:00Junfeng Fan and Ingrid Verbauwhede (K.U. Leuven, Belgium): Light weight, secure implementations of cryptographic algorithms (abstract)
17:00–17:45D. J. Bernstein (University of Illinois at Chicago, USA, and Technische Universiteit Eindhoven, the Netherlands): High-speed cryptography for mobile devices (abstract)
19:00–23:00Dinner
21 Nov09:00–09:30Coffee
09:30–10:15Paul Lukowicz (DFKI and Technical University of Kaiserslautern, Germany): Ubiquitous Computing (abstract)
10:15–11:00Serge Vaudenay (Swiss Federal Institute of Technologies (EPFL), Switzerland): On the need for provably secure distance-bounding protocols (abstract)
11:00–11:30Coffee
11:30–12:15Miroslav Knezevic (NXP, Belgium): Lightweight Cryptography–A Battle for a Single Gate (abstract)
12:30–14:00Lunch
14:00–14:45Christian Rechberger (DTU, Denmark): PRINCE–A Low-latency Block Cipher for Pervasive Computing Applications (abstract)
14:45–15:30Guido Bertoni (STMicroelectronics, Italy): Permutation based cryptography for IoT (abstract)
15:30–16:00Coffee



Last modified: 2013.01.10