From theory to WhiteHat: Cryptology and Cyber Resilience
19 -26 July 2015 (Sunday-Sunday), “National Institute of Education”, Oriahovitza, Bulgaria (view map)
Registration closed. Travel and logistics for the participants – find here
Registration form >>> download from here. Deadline for registration: 15 May 2015
Limited scholarship fund is available. Full funding will be provided to a limited number of students and researchers from Bulgaria. Partial funding of 200 Euro/person is allocated for students and researchers from outside Bulgaria. Selection will be based on applicant background (CV) and a motivation letter/email. Deadline for application for scholarship: 10 May 2015
First Announcement >>> download from here
Sponsorship package >>> download from here
Queries and interest >>> info (at) cryptoBG (dot) org
One intensive week of theory, practice and discussions: 4-hour lectures and tutorials by international experts extended with practical workshops, labs and seminars, simulations, round-table discussions and working groups on hot topics
Topics of the year – the specific focus areas for 2015 edition will be:
- Crypto for cloud – Searchable encryption and Homomorphic encryption (with practical simulations and demo-kit)
- Crypto and security for smart devices – Internet of Things, the emerging standard of “industrial Internet”, theory and practice (semi-autonomous, robots) – specific aspect: Side channel attacks
Theory
- elliptic curve cryptography (ECC), symmetric key, lattice-based cryptography
- efficient arithmetic and integer factorization
- functional encryption – identity-based encryption (IBE) and attribute-based encryption (ABE)
- curve-based cryptography – theoretical and practical aspects
- pairing-based cryptography
- blind signatures and e-voting schemes
- secure communications
Practice
- personal secure devices, mobile security
- secure architectures, “security by design” aspects
- biometrics for security, multi-factor security (incl. “intuitive” methods)
- e-Voting – practical realization
- security in the cloud – searchable encryption lab
- side-channel resistance – practical labs and simulation
Special TEASER FOR INDUSTRY
- Challenge CryptoBG*2015 participants >>> Define a problem, put it on the table on day 1 and get a short and simple solution by the end of the summer school!
Lectures and Tutorials – final program:
Dr. Nicolas Gama (Universite de Versailles, France) – 1) Crypto fundamentals; 2) Basics of quantum algorithms against factorization, discrete logs, Grover algorithm; 3) Implementation design and simulation of Homomorphic Encryption (with Ilaria Chillotti)
Dr. Guillaume Bouffard (ANSSI, France) – JavaCard Security
Dr. Elizabeth Quaglia (Huawei Technologies, France) – Provably Secure, Public-Key Broadcast еncryption
Dr. Elena Andreeva (KU Leuven, Belgium) – Authenticated encryption and CAESAR competition
Dr. Mariya Georgieva (Gemalto, France) – Code Based Cryptography and Secure Implementation of McEliece Decryption
Dr. Iosif Androulidakis (Greece) – Security of telecommunication systems (focus on data channels)
Dr. Dimitar Jetchev (EPFL, Switzerland) – Cryptology in the cloud: Searchable encryption (tele-presented by VGo)
Konstantin Delchev (FMI, Bulgaria) – Crypto fundamentals (2)
Yavor Papazov (ESI CEE, Bulgaria) – Active Security – Overview of buffer overflow exploitation
Amir Tabatabaei (University of Siegen, Germany) – Fuzzy message authentication
Short talks:
Stoyan Denev (CertiVox, Bulgaria)- Secure distributed case allocation system for the Bulgarian juridical system
Eleonora Cagli (CEA Grenoble, France) – Points of interest research for differential side channel attacks
Siemen Dgooghe (KU Leuven, Belgium) – CTF: breaking a symmetric encryption scheme
Romeo Ayemele Djeujo (University of Siegen, Germany) – Key Generation for Compressive Sensing Based Communication Security
And your favorite CTF*BG round (Capture The Flag) by CyResLab (of ESI CEE) RED <>BLUE teams in 3 sessions:
- CTF “warm up” & challenges explained
- active security – MITM demos, Аpplication security and exploitation, Secure Coding digest
- CTF*BG Ultimate
Program
To view or download the presentations, please follow this link (for participants only, password required)
Round table discussions:
- e-voting and e-Government (Bulgaria, Europe)
- collective Cyber Resilience – stakeholders engagements and commitments
- What’s next – threats and challenges
Organized by:
In Cooperation with IACR
Supported by: