Workshop 2012

Workshop: Provable Security: Playing Games with the Adversary & Leakage Resilience: When Side Channels meet Provable Security

Workshop 1:”Provable Security: Playing Games with the Adversary”
Date:21 July 2012 (Saturday)
Time:9am-1.15pm
Venue:6th Floor,SA Block,Faculty of Engineering and Science, Kuala Lumpur Campus

Background of the workshop:

(a) Provable security is the de facto approach to offering some assurance of a cryptographic construction’s security
(b) Target audience: Undergraduate/Postgraduate students, researchers from university/organization

Objectives:

(a) To grasp the popularized concept of provable security within the context of cryptography
(b) To study some example cryptographic constructions in relation to provable security

Discussions and training activities:

(a) This workshop investigates the main ideas behind provable security approach
(b) Discussion of some example cryptographic constructions where provable security applies.

Workshop 2:”Leakage Resilience: When Side Channels meet Provable Security”
Date:28 July 2012 (Saturday)
Time:9am-1.15pm
Venue:6th Floor,SA Block,Faculty of Engineering and Science, Kuala Lumpur Campus

Background of the workshop:

(a) Looking into the recent cryptographic venues which are abuzz with the notion of leakage resilience.
Leakage resilience is aimed to capture security even when some information about secrets are leaked.
(b) Target audience: Undergraduate/Postgraduate students, researchers from university/organization

Objectives:

(a) To familiarize the attendees with the recently popular concept of leakage resilience in cryptography
(b) To study how leakage resilience is captured within provable security

Discussions and training activities:

(a) This workshop discussed on the most recent cryptographic venues.
(b) Discussion onthe leakage resilience notion and relates it to provable security.

Scroll to top