LOGIN / REGISTER
Main
The School
Program
Venue and Transportation
Registration and Scholarships
Program Committee
Contact
Videos

Program

The School will offer a variety of courses in Cryptography, basic and advanced, and a few social events as well.
Here is the schedule of activities followed by the list of courses.

Schedule

Time Thu 20
Fri 21
Sat 22
Sun 23
Mon 24
Tue 25
Wed 26
08:00 - 09:00
AH-1
PB-1
NS-1
AV-1
Institutional presentations, discussions, panels at Unicamp.
CK-1
SH-1
09:00 - 10:00
AH-2
PB-2
NS-2
AV-2
CK-2
SH-2
10:00 - 10:20
Coffee
Coffee Coffee Coffee Coffee Coffee
10:20 - 11:20
JL-1
VR
VL-1
DP-1
FR-1
TR-1
11:20 - 12:20
JL-2
JS
VL-2
DP-2
FR-2
TR-2
12:20 - 13:40
Lunch
Lunch Lunch Lunch Lunch Closing remarks and farewell lunch
13:40 - 14:40
RT-1
RP-1
OD-1
VM
JG-2

14:40 - 15:40
RT-2
RP-2
OD-2
JG-1
JG-3

15:40 - 16:00
Coffee
Coffee Coffee Coffee Coffee
16:00 - 17:00
Opening
JD-1
vzG-1
MA-1
AN-1

17:00 - 18:00
Cocktail
JD-2
vzG-2
MA-2
AN-2

Evening
Dinner, etc
Dinner, etc Dinner, etc Dinner, etc Banquet in Campinas
Dinner, etc

Course Information

Key Speaker Basic/
Advanced/
Keynote
Title of course #h
Elliptic-curve and Pairing-based Cryptography
PB Paulo Barreto B Introduction to Pairing-based Cryptography 2
JL Julio Lopez-Hernandez B Introduction to Elliptic Curve Cryptography 2
VM Victor Miller K Pairing-based Cryptography 1
Cryptographic Schemes and Protocols
MA Michel Abdalla A An Overview of Functional Encryption 2
JG Juan Garay A Sound Specification of Cryptographic Tasks 3
AH Alejandro Hevia B Introduction to Provable Security 2
AN Anderson Nascimento A Unconditionally Secure Cryptography based on Physical Assumptions 2
Post-quantum Cryptography
JD Jintai Ding A Rethinking Hidden Field Equation MultivariateCryptosystems 2
VL Vadim Lyubashevsky A A History of Lattice-Based Encryption Schemes 2
RP Reginaldo Palazzo B Introduction to Lattice and Coding Theory 2
NS Nicolas Sendrier A A Survey of Code-based Cryptography 2
JS Jacques Stern K An Overview of Multivariate Cryptography 1
Symmetric Crypto and Hash
OD Orr Dunkelman A Advanced Block Cipher Cryptanalysis 2
RT Routo Terada B Introduction to Linear and Differential Cryptanalysis 2
Homomorphic Encryption
SH Shai Halevi A Fully Homomorphic Encryption 2
TR Tal Rabin A TBD 2
Implementation Issues
CK Cetin Koc A Embedded Software and Hardware Realizations of Modular Arithmetic and Finite Fields for Public-key Cryptography 2
FR Francisco Rodriguez-Henriquez A Hardware Implementation of Pairings 2
Theoretical Aspects
vzG Joachim von zur Gathen K Complexity Theory and Cryptography; Reductions and Generic Computations 2
DP Daniel Panario A Some Finite Fields Functions and their Cryptographic Importance 2
VR Valdemar C. da Rocha Jr K Homophonic Substitution and Random Number Generation 1
AV Alfredo Viola A Boolean Functions and Cryptography 2