Monday 26.09.2011

9:00 - 13:00 Registation
13:00 - 14:00 Lunch
14:00 - 14:10 Workshop Opening
14:10 - 16:00 Sesion I: Cryptography and data protection I
14:10 - 15:00 Stefan Dziembowski - Invited Lecture Recent Advances in the Theory of Leakage-Resilience
15:00 - 15:20 Michał Misztal Differential Cryptanalysis of PP-1 cipher
15:20 - 15:40 Michał Trojnara Evolution of the StreamHash Hash Function Family
15:40 - 16:00 Mirosław Szaban and Franciszek Seredyński Block Symmetric Key Cryptography With Use of Cellular Automata
16:00 - 16:30 Coffe break
16:30 - 18:40 Sesion II: Security systems I
16:30 - 17:20 Marek Klonowski - Invited Lecture Security Methods for Weak Devices
17:20 - 17:40 Urszula Krawczyk and Piotr Sapiecha Effective reduction of cryptographic protocols specification for model-checking with Spin
17:40 - 18:00 Damian Rusinek and Bogdan Księżopolski The influence of CCM, CBC-MAC, CTR and Stand-Alone Encryption on the quality of transmitted data in high-performance WSN based on Imote2
18:00 - 18:20 Zbigniew Piotrowski, Piotr Gajewski and Jarosław Wojtuń Implementation of the DSSS method in watermarking digital audio objects
18:20 - 18:40 Lukasz Kucharzewski, Zbigniew Kotulski Mobile identity management system in heterogeneous wireless networks
19:00     Barbecue Dinner

Tuesday 27.09.2011

8:00 - 9:00 Breakfast
9:00 - 11:10 Sesion III: Cryptography and data protection II
9:00 - 9:50 Roman Gielerak - Invited Lecture Absolute security of Quantum Key Distribution Technology - present state of the art
9:50 - 10:10 Vasyl Ustimenko, Abderezak Touzene, Marwa Alraissi and Imene Boudeliouua Performance of Algebraic Graphs Based Stream-Ciphers Using Large Finite Fields
10:10 - 10:30 Vasyl Ustimenko and Aneta Wróblewska On the key expansion of D(n;K)-based cryptographical algorithm
10:30 - 10:50 Maciej Grześkowiak On Generating Elements of Orders Dividing
10:50 - 11:10 Jakub Derbisz Methods of encrypting monotonic access structures
11:10 - 11:40 Coffe break
11:40 - 13:20 Sesion IV: Security systems II
11:40 - 12:00 Krystian Baniak Dynamic Group Signature for Security Monitoring Application
12:00 - 12:20 Łukasz Papiez The security of the multi-application transport card
12:20 - 12:40 Dariusz Rzońca and Andrzej Stec Small Prototype Acquisition System with Secure Remote Data Access
12:40 - 13:00 Paweł Szałachowski and Zbigniew Kotulski Secure time information in the Internet Key Exchange Protocol
13:00 - 13:20 Grzegorz Oryńczak and Zbigniew Kotulski Non cryptographic methods for improving real time transmission security and integrality
13:30 - 14:30 Lunch
14:30 - 15:50 Sesion V: Cryptography and data protection III
14:30 - 14:50 Anna Grocholewska-Czuryło Cryptographic properties of modified AES-like S-boxes
14:50 - 15:10 Michał Klisowski, Vasyl Ustimenko and Urszula Romańczuk On the implementation of cubic public keys based on new family of algebraic graphs
15:10 - 15:30 Rafal Gliwa and Wojciech Oszywa Combining Message Encryption and Authentication
15:30 - 15:50 Vasyl Ustimenko and Monika Polak On LDPC Codes Corresponding to Affine Parts of Generalized Polygons
15:50 - 16:00 Summary of the Workshop
16:00 - 16:30 Coffe break
16:45 - 18:00 Guided City Tour - Nałęczów
18:15 - 19:15 Programm Comitee Members meeting
19:30     Conference Dinner

Wednesday 28.09.2011

8:00 - 9:00 Breakfast
9:00 - 10:00 Leaving the rooms