CryptoBG*2016

Dates for CryptoBG*2016 announced: 10-17 July 2016 !

Red <> Blue teams 2015

10 -17 July 2016 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria (view map)

Book your calendar and express interest to participate as a speaker or student to CryptoBG Summer School Committee at info (at) cryptoBG (dot) org!

Theme: From Crypto to White Hat

10 -17 July 2016 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria (view map)

Registration will open soon.

Limited scholarship fund is available. Full funding will be provided to a limited number of  students and researchers from Bulgaria. Partial funding of 200 Euro/person is allocated for students and researchers from outside Bulgaria. Selection will be based on applicant background (CV) and a motivation letter/e-mail. Deadline for application for scholarship: 1 May 2016

Queries and interest >>> info (at) cryptoBG (dot) org


One intensive week of theory, practice and discussions: 4-hour lectures and tutorials by international experts extended with practical workshops, labs and seminars, simulations, round-table discussions and working groups on hot topics


Topics of the year (some continuation of the 2015):

  • Crypto for cloud – Searchable encryption and Homomorphic encryption
  • Crypto and security for smart devices – Internet of Things, standards for “Industrial Internet”, robots, smart homes, wearables and gadgets
  • Security for ICS/SCADA systems and Cyber Defense

Theory

  • elliptic curve cryptography (ECC), symmetric key, lattice-based cryptography
  • efficient arithmetic and integer factorization
  • functional encryption – identity-based encryption (IBE) and attribute-based encryption (ABE)
  • curve-based cryptography – theoretical and practical aspects
  • pairing-based cryptography
  • blind signatures and e-voting schemes
  • secure communications

Practice

  • personal secure devices, mobile security
  • secure architectures, “security by design” aspects
  • biometrics for security, multi-factor security (incl. “intuitive” methods)
  • e-Voting – practical realization
  • security in the cloud – searchable encryption lab
  • side-channel resistance – practical labs and simulation

Organized by: