Program

Sunday, October 28

Time Speaker/Activity Slides
09:00-11:00 Introduction to Elliptic Curve Cryptography (Part I)
Mathematical Foundations
by Craig Costello
Download
11:00-11:30 Coffee Break
11:30-13:30 Introduction to Elliptic Curve Cryptography (Part II)
Aspectos de Implementación --- Implementation Aspects
by Francisco Rodríguez-Henríquez
Download
13:30-15:00 Lunch Break
15:00-17:00 Introduction to Elliptic Curve Cryptography (Part III)
Ataques a criptosistemas de cifrado y firma -- Attacks on enciphering and signature schemes
by Neal Koblitz [presented in Spanish]
Blackboard
Class
18:00 - 20:30 Welcome Cocktail

Monday, October 29

Time Speaker/Activity
09:00-11:00 Tour of Querétaro City
11:50-12:00 Opening Remarks
Francisco Rodríguez-Henriquez

Session M1: DLP attacks
Session chair: Tanja Lange

Time Speaker/Activity Slides Video
12:00-13:00 On the complexity of index calculus algorithms for ECDLP over composite fields
Christophe Petit
Download Video
13:00-14:00 Applications of random walks to ECC
Steven Galbraith
Download Video
14:00-16:30 Lunch Break
16:30-17:30 Project Report on Solving Discrete Logarithm Problems with Auxiliary Input
Yumi Sakemi
Download Video
17:30-18:00 Coffee Break

Session M2: Primality Testing
Session chair: Victor Miller

Time Speaker/Activity Slides Video
18:00-19:00 Deterministic elliptic curve primality proving for special sequences
Alice Silverberg
Download Video
20:00-23:00 Rump Session
Sesion chair: Daniel J. Berstein & Tanja Lange
Casa Amarilla

Tuesday, October 30

Session T1: Aspects of provable security
Session chair: Debrup Chakraborty

Time Speaker/Activity Slides Video
09:00-10:00 Non-Uniformity
Neal Koblitz
Download Video
10:00-11:00 NIST P-256 has a cube-root ECDL algorithm
Daniel J. Bernstein
Download Video
11:00-11:30 Coffee Break

Session T2: Hardware Implementations
Session chair: Francisco Rodríguez-Henríquez

Time Speaker/Activity Slides Video
11:30-12:30 Implementation of pairings over supersingular curves
Jérémie Detrey
Download Video
12:30-13:30 Faster pairing hardware accelerators
Junfeng Fan
Download Video
13:30-16:30 Lunch Break

Session T3: Software Implementations
Session chair: Emmanuel Thomé

Time Speaker/Activity Slides Video
16:30-17:30 Efficient pairing computation at the 192-bit and 256-bit security levels
Craig Costello
Download Video
17:30-18:00 Coffee Break
18:00-19:00 Constructive and destructive implementations of elliptic curve arithmetic
Peter Schwabe
Download Video
20:00-23:30 Gala Dinner

Wednesday, October 31

Session W1: Properties of (hyper)-elliptic curves
Session chair: Neal Koblitz

Time Speaker/Activity Slides Video
09:00-10:00 Computing isogeny graphs in genus 2 using CM lattices
David Gruenewald
Download Video
10:00-11:00 Endomorphism rings of genus 2 jacobians
Sorina Ionica
Download Video
11:00-11:30 Coffee Break

Session W2: Modular Polynomials
Session chair: Anwar Hasan

Time Speaker/Activity Slides Video
11:30-12:30 On the evaluation of modular polynomials
Andrew Sutherland
Download Video

Session W3: Attacks on Elliptic curve and pairing cryptosystems
Session chair: Imbert Laurent

Time Speaker/Activity Slides Video
12:30-13:30 Breaking pairing-based cryptosystems using ηT pairing over GF(397)
Takuya Hayashi
Download Video
13:30-16:30 Lunch Break
16:30-17:30 Software-based side-channel attacks
Billy Bob Brumley
Download Video
17:30-18:00 Coffee Break
18:00-19:00 On Fault-based Attacks and Countermeasures for Elliptic Curve Cryptosystems
Agustín Domínguez-Oviedo
Download Video