Download program (PDF)

Monday 24.09.2012

9:00 - 13:00 Registation
13:00 - 14:00 Lunch
14:00 - 14:10 Conference Opening
14:10 - 15:00 Pascal Lafourcade (University Joseph Fourier, Grenoble) 1st Invited Lecture
15:00 - 16:00 Session I - Cryptography and data protection I
15:00 - 15:20 Anna Grocholewska-Czurylo, Janusz Stoklosa, Krzysztof Bucholc and Tomasz Bilski Parameterized Hash Functions
15:20 - 15:40 Mateusz Buczek Attacks on StreamHash 2
15:40 - 16:00 Sebastien Varrette, Jakub Muszynski and Pascal Bouvry Hash function generation by means of Gene Expression Programming
16:00 - 16:30 Coffe break
16:30 - 17:20 Mark D. Cole (University of Luxembourg) 2nd Invited Lecture
17:20 - 18:20 Session II - Security Systems
17:20 - 17:40 Nicolas Bernard and Franck Leprévost Hardened Bloom Filters, with an Application to Unobservability
17:40 - 18:00 Vaidas Juzonis, Nikolaj Goranin, Antanas Cenys and Dmitrij Olifer Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting
18:00 - 18:20 Franciszek Seredynski, Jaroslaw Skaruz and Adrian Piraszewski Image reconstruction with use of evolutionary algorithms and cellular automata
19:00     Barbecue Dinner

Tuesday 25.09.2012

8:00 - 9:00 Breakfast
9:00 - 9:50 Krzysztof Chmiel (Poznań University of Technology) 3rd Invited Lecture
9:50 - 10:30 Session III - Steganography and watermarking
9:50 - 10:10 Wioletta Wójtowicz and Marek R. Ogiela Security issues on digital watermarking algorithms
10:10 - 10:30 Mahmoud Ouf Performance Evaluation of Different Universal Steganalysis Technique in JPG Files
10:30 - 11:00 Coffe break
11:00 - 12:40 Session IV - Cryptographic protocols & Network security
11:00 - 11:20 Urszula Krawczyk and Piotr Sapiecha Automatic detection of DoS vulnerabilities of cryptographic protocols
11:20 - 11:40 Bogdan Księżopolski, Damian Rusinek, Adam Wierzbicki On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)
11:40 - 12:00 Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski, Nikos Fotiou, Giannis F. Marias, George C. Polyzos and Hermann de Meer Energy-aware Key Management in Mobile Wireless Sensor Networks
12:00 - 12:20 Grzegorz Oryńczak and Zbigniew Kotulski Notary-based self-healing mechanism for centralized peer-to-peer infrastructures
12:20 - 12:40 Marcin Alan Tunia Distributed Social Network
13:00 - 14:00 Lunch
14:00 - 15:40 Sesion V - Cryptography and data protection II
14:00 - 14:20 Renata Kawa and Mieczysław Kula A Remark on Hierarchical Threshold Secret Sharing
14:20 - 14:40 Aneta Wroblewska and Vasyl Ustimenko Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography
14:40 - 15:00 Mariusz Borowski, Marek Leśniewicz, Robert Wicik and Marcin Grzonkowski Generation of random keys for cryptographic systems
15:00 - 15:20 Urszula Romańczuk and Vasyl Ustimenko On the family of cubical multivariate cryptosystems based on algebraic graph over finite commutative rings of characteristic 2.
15:20 - 15:40 Monika Polak and Vasyl Ustimenko LDPC Codes Based on Algebraic Graphs
15:40 - 15:50 Closing the Conference
15:50 - 16:20 Coffe break
16:30 - 19:00 Guided City Tour - Kazimierz Dolny
19:10     Conference Dinner

 

 

Wednesday 26.09.2012

8:00 - 9:00 Breakfast
9:00 - 12:00 Leaving the rooms