Date:

22-25February 2021

About Winter School

Announcement: Registration for the winter school has been closed.

School overview:

The Second ISC Winter School on Information Security and Cryptology (ISCwsISC 2021) will be held virtually between 22 February and 25 February 2021. The school is organized by Cyberspace Research Institute at Shahid Beheshti University (SBU) and Iranian Society of Cryptology (ISC). ISC is a non-profit organization devoted to promoting the science of cryptology. This year the school topic will be Secure and Efficient Implementation of Cryptographic Algorithms.

The school aims to provide an opportunity for researchers to focus on understanding the security of implementation of cryptographic primitives and spot the emerging new areas. The school consists of several lectures by keynote speakers and experts. The program will cover the following topics: Power analysis attacks and countermeasures, micro-architectural attacks, fault attacks and whitebox cryptography.

The school is designed to be both informative and educative for a wide range of graduate students as well as to present the state of the art and recent results on the subjects they target.

Pre-school: ISC has organized a pre-school event that will be given in Persian. The workshop involves introduction lectures by experienced national researchers. The purpose of this workshop is to prepare those students who want to participate in the second winter school but do not have enough background about the secure implementation of cryptographic primitives. For more details please visit the workshops’ website.

Keynote Speakers

Billy Brumley

Associate Professor

Tampere University, Finland (more…)

Chris Brzuska

Assistant Professor

Aalto University, Finland (more…)

Joan Daemen

Professor

Radboud University, The Netherland (more…)

Maria Eichlseder

Assistant Professor

Graz University of Technology (more…)

Aalto university, Finland (more…)

Daniel Gruss

Assistant Professor

Graz University of Technology, Austria

Svetla Nikova

Research Expert (Onderzoekskader)

KU Leuven, Belgium (more…)

Elisabeth Oswald

Professor

University of Klagenfurt, Austria (more…)

Chester Rebeiro

Assistant Professor

Indian Institute of Technology Madras

Ruhr-Universität Bochum, Germany (more…)

Program

Opening Remarks

The slide is available here

Differential Fault Attacks on Block Ciphers and their Automation

Abstract: Embedded devices are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These attacks induce precisely timed and placed faults to retrieve secret

SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Abstract: We will discuss Statistical Ineffective Fault Attacks (SIFA) and several recently proposed countermeasures against this new approach. While classical differential fault attacks rely on observing the incorrect output

Side Channel Analysis and the Gap Between Research and Practice

Abstract: During the last 15 years, constant-time cryptographic software has transitioned from an academic construct to a concrete security requirement for real-world libraries. From the engineering perspective, we have

Profiling Methods in the Context of Side Channel Attacks

Abstract: In this we introduce the concepts of profiling and profiled attacks. We cover both supervised and unsupervised learning. The slide is available here

Threshold Cryptography Against Combined Attacks

Abstract: Recent attacks show that there is a need for protecting implementations jointly against side-channel and fault attacks. Analogously, modern MPC protocols consider active security, i.e. against malicious parties

SILVER – Statistical Independence and Leakage Verification

Abstract: Implementing cryptographic functions securely in the presence of physical adversaries is still a challenge although a lion’s share of research in the physical security domain has been put in

White-Box Cryptography – Security Goals and Foundations

Abstract: The white-box attack model was introduced in 2002 by Chow, Eisen, Johnson and van Oorschot.  In this attack model, we consider an adversary who gets access to the

On the Security of Keyed Hash Constructions

Abstract: Symmetric cryptography allows the protection of the confidentiality and integrity of messages between parties sharing a secret key. This protection is realized using cryptographic functions: encryption schemes, message authentication
Download Program

Organizers

FAQ Find the answer to your question

All sessions will have Q&A parts.
All recorded sessions will be released on March 2021.
Register for ISCwsISC 2021 by filling up the registration form. There is no registration fee but you need to register to be able to participate. It will be possible to register up until 12 February 2021.
If you have any questions, please send an email to iscwsisc2021@mail.sbu.ac.ir

News

Registration:

Register for ISCwsISC 2021 by filling up the registration form. There is no registration fee but you need to register to be able to participate. It will be possible to register up until  12 February 2021.