CryptoBG*2015

Red <> Blue teams 2015

For more photos from the summer school, you can visit the CryptoBG*2015 Photo Gallery.
 

From theory to WhiteHat: Cryptology and Cyber Resilience

19 -26 July 2015 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria (view map)

Registration closed. Travel and logistics for the participants – find here

Registration form >>> download from here. Deadline for registration: 15 May 2015

Limited scholarship fund is available. Full funding will be provided to a limited number of  students and researchers from Bulgaria. Partial funding of 200 Euro/person is allocated for students and researchers from outside Bulgaria. Selection will be based on applicant background (CV) and a motivation letter/email. Deadline for application for scholarship: 10 May 2015

First Announcement >>> download from here

Sponsorship package >>> download from here

Queries and interest >>> info (at) cryptoBG (dot) org


One intensive week of theory, practice and discussions: 4-hour lectures and tutorials by international experts extended with practical workshops, labs and seminars, simulations, round-table discussions and working groups on hot topics


Topics of the year – the specific focus areas for 2015 edition will be:

  • Crypto for cloud – Searchable encryption and Homomorphic encryption (with practical simulations and demo-kit)
  • Crypto and security for smart devices – Internet of Things, the emerging standard of “industrial Internet”, theory and practice (semi-autonomous, robots) – specific aspect: Side channel attacks

    Dimitar Jetchev's lecture on searchable encryption, tele-presented by VGo

    Dimitar Jetchev tele-presented by VGo

Theory

  • elliptic curve cryptography (ECC), symmetric key, lattice-based cryptography
  • efficient arithmetic and integer factorization
  • functional encryption – identity-based encryption (IBE) and attribute-based encryption (ABE)
  • curve-based cryptography – theoretical and practical aspects
  • pairing-based cryptography
  • blind signatures and e-voting schemes
  • secure communications

Practice

  • personal secure devices, mobile security
  • secure architectures, “security by design” aspects
  • biometrics for security, multi-factor security (incl. “intuitive” methods)
  • e-Voting – practical realization
  • security in the cloud – searchable encryption lab
  • side-channel resistance – practical labs and simulation

Special TEASER FOR INDUSTRY

  • Challenge CryptoBG*2015 participants >>> Define a problem, put it on the table on day 1 and get a short and simple solution by the end of the summer school!

Lectures and Tutorials – final program:

Dr. Nicolas Gama (Universite de Versailles, France) – 1) Crypto fundamentals; 2) Basics of quantum algorithms against factorization, discrete logs, Grover algorithm; 3) Implementation design and simulation of Homomorphic Encryption (with Ilaria Chillotti)
Dr. Guillaume Bouffard (ANSSI, France) – JavaCard Security
Dr. Elizabeth Quaglia (Huawei Technologies, France) – Provably Secure, Public-Key Broadcast еncryption
Dr. Elena Andreeva (KU Leuven, Belgium) – Authenticated encryption and CAESAR competition
Dr. Mariya Georgieva (Gemalto, France) – Code Based Cryptography and Secure Implementation of McEliece Decryption
Dr. Iosif Androulidakis (Greece) – Security of telecommunication systems (focus on data channels)
Dr. Dimitar Jetchev (EPFL, Switzerland) – Cryptology in the cloud: Searchable encryption (tele-presented by VGo)
Konstantin Delchev (FMI, Bulgaria) – Crypto fundamentals (2)
Yavor Papazov (ESI CEE, Bulgaria) – Active Security – Overview of buffer overflow exploitation
Amir Tabatabaei (University of Siegen, Germany) – Fuzzy message authentication

Short talks:

Eleonora Cagli (CEA Grenoble, France) – Points of interest research for differential side channel attacks
Siemen Dgooghe (KU Leuven, Belgium) – CTF: breaking a symmetric encryption scheme
Romeo Ayemele Djeujo (University of Siegen, Germany) – Key Generation for Compressive Sensing Based Communication Security

And your favorite CTF*BG round (Capture The Flag) by CyResLab (of ESI CEE) RED <>BLUE teams in 3 sessions:

  • CTF “warm up” & challenges explained
  • active security – MITM demos, Аpplication security and exploitation, Secure Coding digest
  • CTF*BG Ultimate

Program

To view or download the presentations, please follow this link  (for participants only, password required)

CryptoBG*2015 Program

Round table discussions:

  • e-voting and e-Government (Bulgaria, Europe)
  • collective Cyber Resilience – stakeholders engagements and commitments
  • What’s next – threats and challenges

Organized by:

In Cooperation with IACR

iacrlogo

Supported by: