Program
Framework schedule.
Monday, 11 Sept.
8:30 - 9:30 | Registration |
9:30 - 10:00 |
Openning
Conference Opening Keynotes by Dean of the Faculty of MIMUW prof. Paweł Strzelecki and Chairman of the Organizing and Steering Committee prof. UW Jacek Pomykała |
10:00 - 11:00 |
Keynote: Gerhard Frey Geometry: Deep Theory, Efficient Algorithms and Suprising Applications |
11:00 - 11:30 | Coffee Break |
11:30 - 12:00 |
Session 1 Andrzej Paszkiewicz On the least quadratic non-residue and the least prime primitive root. A computational point of view Session 2 Katlin Gyarmati On the cross-combined measure of families of binary lattices and sequences |
12:00 - 12:30 |
Session 1 Nadir Murru and Francesco Saettone A novel RSA-like cryptosystem based on a product related to the cubic Pell equation and Rédei rational functions Session 2 Alan Szepieniec and Bart Preneel Digital Signatures from Short Solutions to Nonlinear Systems of Equations |
12:30 - 13:00 | Coffee break |
13:00 - 14:00 |
Keynote: Antoine Joux A crossbred algorithm for solving Boolean polynomial systems |
14:00 - 14:30 |
Session 1 Appala Naidu Multi-Secret Sharing Scheme for Level-Ordered Access Structures Session 2 Oğuz Yayla Near Butson-Hadamard Matrices and Nonlinear Boolean Functions |
14:30 - 15:00 |
Session 1 Reza Rezaeian Farashahi and Mojtaba Fadavi Surjective Encodings to Elliptic Curves over Finite Fields Session 2 Dongdong Shang and Ping Wang Optimizing Filtered Triple Sieving Using Angular Locality-sensitive Hashing |
15:00 - 16:00 |
Lunch |
16.00 - 17.00 |
Keynote: Igor Shparlinski Playing Hide-and-Seek with in Finite Fields: Hidden Number Problem and Its Applications |
17.00 - 17.30 |
Session 1 Maciej Zakarczemny On some cancellation algorithms Session 2 András Sárközy, László Mérai, Joel Rivat The measures of pseudorandomness and the NIST tests |
17.30 - 18.00 |
Session 1 Rafał Bystrzycki Detection of primes in the set of residues of divisors of a given number Session 2 Filipp Valovich and Francesco Alda Computational Differential Privacy from Lattice-based Cryptography |
Tuesday, 12 Sept.
10:00 - 11:00 |
Keynote: Josef Pieprzyk Analysis of Human Identification Protocols |
11:00 - 11:30 |
Session 1 Jacek Pomykała Small and large sieve in selected cryptological problems Session 2 Michał Wroński and Tomasz Kijko On the possibility of transformation multidimensional ECDLP problem into one-dimensional ECDLP |
11:30 - 12:00 |
Session 1 Robert Dryło Factoring n and the number of points of Kummer hypersurfaces mod n Session 2 Janusz Szmidt The Cube Attack on Courtois Toy Cipher |
12:00 - 13:00 | Lunch |
13:00 - 14:00 |
Keynote: Rene Peralta The NIST post-quantum cryptography project |
14:00 - 14:30 |
Session 1 Paweł Augustynowicz and Andrzej Paszkiewicz Few words on sedimentary polynomials over GF(2) Session 2 Junpei Yamaguchi and Masaya Yasuda Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications |
14:30 - 15:00 |
Session 1 Maciej Grześkowiak Explicit Bound for the Prime Ideal Theorem in Residue Classes Session 2 Przemysław Dąbrowski, Rafał Gliwa, Janusz Szmidt and Robert Wicik Generation and Implementation of Cryptographically Strong Elliptic Curves |
15:00 - 15:15 | Coffee break |
15:15 - 16:15 |
Keynote: Markus Hittmeir A babystep-giantstep method for faster deterministic integer factorization |
Wednesday, 13 Sept.
9:00 - 10:00 |
Keynote: Igor Shparlinski Short character sums modulo prime powers and applications: L-functions, primes, Kloosterman sums and the divisor function |
10:00 - 10:30 |
Session 1 Jacques Patarin and Valerie Nachef Commutativity, Associativity, and Public Key Cryptography |
10:30 - 11:00 |
Coffee Break |
11:00 - 12:00 |
Tutorial session: Krystian Matusiewicz Mahematics in the industry: an introduction to EPID |
12:00 | Closing |