Invited Speaker


 


 

 

     Prof. Thomas Peyrin (Nanyang Technological University)

Thomas PEYRIN received his engineer M.S. in 2004 from CPE Lyon and specialized in theoretical computer science at the Ecole Polytechnique in France. He completed in 2008 a doctorate in cryptography at Orange Labs, formerly known as France Telecom, during which he was awarded the Japan Society for the Promotion of Science (JSPS) grant. He previously worked as a Cryptography Expert at Ingenico (the world leader in payment solutions) and as a Research Fellow at the School of Physical and Mathematical Sciences of Nanyang Technological University in Singapore under the Singapore Lee Kuan Yew Postdoctoral Fellowship. He was appointed Nanyang Assistant Professor in 2012 under the Singapore NRF fellowship, and Associate Professor at NTU in 2017.

Title - Tweakable Block Cipher-Based Cryptography

Abstract - A tweakable block cipher (TBC) basically consists of a block cipher with an extra input, the tweak, that allows to select a family of keyed permutations. Since their first formalization by Liskov et al. at CRYPTO2012, TCBCs have recently gained popularity as they can easily instantiate beyond birthday-bound operating modes. In particular, these modes are potentially very attractive for lightweight cryptography, where it is crucial to reach a security as high as possiblefor a state as small as possible. In this talk, we will review the latest advances in tweakable block ciphers. First, we will recall how to design TBCs from an existing primitive or from scratch. Then, using the example of lightweight authenticated encryption, we will study why TBCs are very competitive primitives in that scenario. Finally, we will exhibit other possible future usages of TBCs. Throughout the talk, we will try to identify several possibly interesting open research problems.

 

 

     Prof. Sujoy Sinha Roy (University of Birmingham)

Sujoy Sinha Roy received the PhD degree with `Summa cum laude with congratulations from the examination committee' (~top 5%) from the Computer Security and Industrial Cryptography (COSIC) group, Department of Electrical Engineering (ESAT), KU Leuven, Belgium. My doctoral thesis received the 'IBM Innovation Award 2018' which recognizes of an outstanding doctoral thesis in informatics. I joined the School of Computer Science, University of Birmingham in September 2018.

Title - Designing and Implementing the NIST Post-quantum Public-key Candidate Sabe

Abstract - Saber is an IND-CCA2 secure post-quantum Key Encapsulation Mechanism (KEM) whose security relies on the hardness of the Module Learning With Rounding problem. It is one of the four finalists of NIST's Post-quantum public-key cryptography standardization project. The design goals of SABER are simplicity, efficiency and flexibility. In this talk, I will tell constructing Saber and making it efficient and secure on software and hardware platforms.

 

 

 

     Dr. Lily Chen (National Institute of Standards and Technology)

Dr. Lily (Lidong) Chen is a mathematician and the manager of Cryptographic Technology Group in NIST’s Computer Security Division. She received her PhD from Aarhus University, Denmark. Her areas of research include cryptographic protocols, zero-knowledge proof, special featured digital signature schemes, network security, and security for wireless and mobility. Besides cryptographic research and applications. Dr. Chen has actively contributed to cryptographic and security standards development by IEEE-SA, ISO, and other consensus and consortium standards organizations. The book “Communication System Security” she co-authored and published in 2012 by CRC Press has been used as textbook by many universities. She has led NIST Cryptographic Program since 2012.

Title - Next Generation Cryptography Standards

Abstract Today, cryptography mechanisms have been implemented in almost every digital device. Next generation cryptography standards must be able to resist powerful and sophisticated attacks and also to adapt to constrained implementation environment. Future technology and application demand cryptography standards to provide new security features and meet extended security objectives. This talk will discuss challenges in developing next generation cryptography standards and provide updates on NIST initiatives.