|
Program for International Conference on Boolean Functions: Cryptography and Applications (BFCA) |
| Date: May 19 - 21, 2008, in Copenhagen, Denmark |
| Monday, May 19 | |
|---|---|
| Event | |
| 10h00 - 10h30 | Registration/Welcome |
| 10h30 - 10h45 | Welcome from IBM Allan Andersen IBM at-a-glance |
| 10h45 - 11h00 | Coffee break |
| 11h00 - 12h00 | Hanne Sondergaard, IBM Crypto Competence Center, Copenhagen User-friendly practical Crypto solutions |
| 12h00 - 13h00 | Lunch |
| 13h00 - 13h45 | L. Budaghyan, C. Carlet, G. Leander On inequivalence between known power apn functions |
| 13h45 - 14h30 | M. Mouffron Balanced alternating and symmetric functions over finite sets |
| 14h30 - 15h15 | F. Rodier Bounds on the degrees of apn polynomials |
| 15h15 - 15h45 | Coffee break |
| 15h45 - 16h30 | C. Carlet, L.E. Danielsen, M.G. Parker, P. Solé Self dual bent function |
| 16h30 - 17h15 | J. Pieprzyk, H. Wang, X.-M. Zhang (talk by C. Charnes) Möbius-α commutative functions and partially coincident functions |
| Tuesday, May 20 | |
| 10h00 - 11h00 | Michael Wolf (Niels Bohr Institute) Quantum Information Theory - a survey |
| 11h00-11h15 | Coffee break |
| 11h15 - 12h00 | Q.-C Le, P. Bellot How to use the quantum xor gate as a relay to extend the qkd range? |
| 12h00 - 13h00 | Lunch |
| 13h00 - 13h45 | B.-S. Choi, J. Bae, Y. Kwon Quantum mechanical m-resiliency checking of a boolea function: invasion of the complexity from computation to measurement |
| 13h45 - 14h30 | P. Lacharme, B. Martin, P. Solé Pseudo-random sequences, boolean functions and cellular automata |
| 14h30 - 15h15 | S. Kavut, M. Yucel Random Permutations on Input Vectors of Boolean Functions |
| 15h15 - 15h45 | Coffee break |
| 15h45 - 16h30 | C. Karanikas, N.D. Atreas On a very large class of non-linear coding method based on boolean invertible matrices |
| 19h00 - 'til the end | Banquet |
| Wednesday, May 21 | |
| 9h30 - 10h15 | S. Maitra, S. Kavut, M. Yucel Balanced Boolean Function on 13-variables having Nonlinearity greater than the Bent Concatenation Bound |
| 10h15 - 10h30 | Coffee break |
| 10h30 - 11h15 | N. Tokareva k-bent functions and quadratic cryptanalysis of block ciphers |
| 11h15 - 12h00 | C. McDonald, C. Charnes, J. Pieprzyk an algebraic analysis of Trivium ciphers based on the boolean satisfiability problem |
| 12h00 - 13h00 | Lunch |
| 13h00 - 13h45 | M. Hermelin, K. Nyberg Multidimensional linear distinguishing attacks and boolean functions |
| 13h45 - 14h30 | G. Millérioux, P. Guillot, J.M. Amigo, J. Daafouz Flat dynamical systems and self-synchronizing stream ciphers |
| 14h30 - 14h45 | Coffee break |
| 14h45 - 15h30 | C. Bracken, G. Leander New families of functions with differential uniformity of 4* |