DIAC 2016
September 25 - 27, 2016
Nagoya, Japan
DIAC 2016: Directions in Authenticated Ciphers 2016



Accepted Talks

Accepted Talks on Round 3 Candidates

  1. Ascon
    • Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schlaffer
    • Graz University of Technology, Infineon Technologies Austria AG
  2. Third round updates of ACORN
    • Hongjun Wu
    • Nanyang Technological University
  3. Third round updates of AEGIS
    • Hongjun Wu and Bart Preneel
    • Nanyang Technological University, KU Leuven
  4. Third round updates of JAMBU
    • Hongjun Wu and Tao Huang
    • Nanyang Technological University
  5. Third round updates of MORUS
    • Hongjun Wu and Tao Huang
    • Nanyang Technological University
  6. AES-OTR v3
    • Kazuhiko Minematsu
    • NEC Corporation
  7. Updates on CLOC and SILC Version 3
    • Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi
    • Nagoya University, NEC Corporation, Nanyang Technological University
  8. On Tiaoxin-346
    • Ivica Nikolić
    • Nanyang Technological University
  9. Deoxys
    • Jérémy Jean, Ivica Nikolić, Thomas Peyrin, and Yannick Seurin
    • Nanyang Technological University, ANSSI
  10. COLM
    • Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda, Nilanjan Datta, and Mridul Nandi
    • KU Leuven and iMinds, DTU Compute, Indian Statistical Institute, NTT Secure Platform Laboratories

Accepted Talks on Other Topics

  1. More on the Automatic Search for Differential Trails in NORX
    • Vesselin Velichkov
    • University of Luxembourg, SnT
  2. Blockcipher-based Authenticated Encryption: How Small Can We Go?
    • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, and Mridul Nandi
    • Indian Statistical Institute, Nagoya University, NEC Corporation
  3. Fault Based Almost Universal Forgeries on CLOC and SILC
    • Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S V Dilip Kumar, Debdeep Mukhopadhyay, and Mridul Nandi
    • Indian Institute of Technology Kharagpur, Indian Statistical Institute, Indraprastha Institute of Information Technology
  4. Software Benchmarking of the 2nd round CAESAR Candidates
    • Ralph Ankele and Robin Ankele
    • Royal Holloway, University of London, University of Oxford
  5. A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race
    • Avijit Dutta, Ashwin Jha, and Mridul Nandi
    • Indian Statistical Institute
  6. Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
    • Avijit Dutta, Ashwin Jha, and Mridul Nandi
    • Indian Statistical Institute
  7. Enhancing CAESAR Hardware API Support for Lightweight Architectures
    • Panasayya Yalla and Jens-Peter Kaps
    • George Mason University
  8. Toward Fair and Comprehensive Benchmarking of CAESAR Candidates in Hardware: Standard API, High-Speed Implementations in VHDL/Verilog, and Benchmarking Using FPGAs
    • Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Michael X. Lyons, Panasayya Yalla, and Kris Gaj
    • George Mason University
  9. An Alternative Approach to Hardware Benchmarking of CAESAR Candidates Based on the Use of High-Level Synthesis Tools
    • Ekawat Homsirikamol and Kris Gaj
    • George Mason University
  10. An Online Authenticated Encryption scheme with an Optimal Single-Keyed Inverse-Free Construction
    • Ritam Bhaumik and Mridul Nandi
    • Indian Statistical Institute
  11. Authenticated Encryption with Variable Stretch
    • Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár
    • NEC Laboratories Europe, Germany, EPFL
  12. A New Improved Key-Scheduling for Khudra
    • Rajat Sadhukhan, Souvik Kolay, Shashank Srivastava, and Debdeep Mukhopadhyay
    • Indian Institute of Technology Kharagpur

Template designed by KU Leuven - COSIC