CryptoBG*2017

CryptoBG*2017

International Summer School with Scientific Symposium:
From Cryptology to a Cyber Resilient Industry

9 – 16 July 2017 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria
(view map)

Registration is closed! >>> to download the registration form, click here

This year’s edition of the Summer School is DIFFERENT – we will put stronger focus on the practical aspects of cryptography and cryptographic uses in commercial software. We believe that theory is better exercised through practice and this year’s Summer School is all about connecting the theoretical topics with their practical implementation. More practical labs and sophisticated challenges and scenarios for your favorite round of CTF (Capture the Flag).

A limited scholarship fund is available. Full funding will be provided to a limited number of students and researchers from Bulgaria. Selection will be based on applicant background (CV) and a motivation letter/e-mail. Deadline for application for scholarship: May 1, 2017

CALL FOR PRESENTATIONS AND PAPERS

Selected papers (research reports, lectures and lab courses) will be published in CryptoBG International Summer School with Symposium Proceedings as a special issue of the  Information and Security: An International Journal (ISSN 0861-5160, e-ISSN 1314-2119) (link: http://procon.bg/view-volumes).

Call for Presentations and Papers >>> download from here
Template for Presentations and Papers >>> download from here

CryptoBG*2017 First announcement >>> download from here
CryptoBG*2017 Sponsorship package >>> download from here
Queries and interest >>> info (at) cryptoBG (dot) org


One intensive week of theory, practice and discussions: 4-hour lectures and tutorials by international experts extended with practical workshops, labs and seminars, simulations, round-table discussions and working groups on hot topics


Topics of the year

  • Cryptographic uses in commercial software
  • IoT – crypto and security for smart devices – Internet of Things, Industrial Internet standardization, smart robots, homes, clothes and gadgets
  • Security for Industrial Systems – ICS/SCADA systems and Cyber Defense

Theory

  • Elliptic Curve Cryptography (ECC), Symmetric Key, Lattice-Based Cryptography
  • Homomorphic Encryption
  • Personal Secure Devices, Mobile Security
  • Functional Encryption – Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE)
  • Curve-Based Cryptography and Pairing-Based Cryptography
  • Secure Communications

Practice

  • Secure Architectures, “Security by Design” Aspects
  • Security in the Cloud
  • Web Crypto – JWT, OAuth, OAuth Connect, TLS/SSL
  • Client-Side Web Cryptography and SJCL
  • Lower-level cryptographic software primitives – OpenSSL, Libsodium, etc.
  • Side-Channel Resistance

Especially for the Industry and Sponsors: Challenge the CryptoBG*2017 team – define a problem/challenge, bring it on day 1 and get a solution in a week

Lectures and Tutorials

Martin Georgiev (CyResLab of ESI CEE, Bulgaria) – Introduction to practical cryptography
Miroslav Dimitrov (Institute of Mathematics and Informatics, Bulgaria) – RSA Introduction and Attacks
Abdullatif Shikfa (Qatar University, Qatar) – Introduction to secure multi-party computation
George Sharkov (ESI CEE, Bulgaria) – Systems of systems resilience
Chuadhry Mujeeb Ahmed (Singapore University of Technology and Design, Singapore) – (1) Secure Cyber Physical Systems Computer Science and Control Theory Approaches; (2) SensorPrint An approach to identify popularly used sensors in a Cyber Physical Systems using Machine Learning
Nicolas Gama (Université de Versailles, France) – Fully Homomorphic Encryption
Yavor Papazov (CyResLab of ESI CEE, Bulgaria) – Client-side web cryptography practical workshop

Symposium

Invited talks: Konstantin Delchev and Prof. Dimitar Jetchev

Farzaneh Abed – Attacking a Leackage-Resilient Authenticated Encryption Scheme without Leakage
Houssam Zenati – The ever necessity of reforming cyber security services : France case study
Abdullatif Shikfa – Garbled Circuits: Optimizations and Implementations
Iosif Androulidakis – Guidelines on a mobile phone security lab course
Mariya Nenova – Algorithms and techniques for protection against DDoS attacks
Miroslav Dimitrov – A software tool “ASR” for a posteriori cryptanalisys on public keys generated with “RSA” 

Student talks:

Ivan Nikolov – Wireshark ESP-Now Dissection
Vasilien Tsvetkov – Linux processes’ memory visualization
Otmane El Mouaatamid – Internet of Things Devices Authentication

And your favorite CTF*BG round (Capture The Flag) by CyResLab (of ESI CEE) RED <>BLUE teams in 3 sessions:

  • CTF “warm up” & challenges explained
  • Active security – MITM demos, Аpplication security, and exploitation, Secure Coding digest, Lower-level cryptographic software primitives
  • CTF*BG Ultimate

Program

To view or download the presentations, please follow this link (for participants only, password required)

« 2 of 33 »

Organized by:

Supported by: