Monday, 22nd of September 2014
9:00 - 13:00 Registration
13:00 - 14:00 Lunch
14:00 - 14:10 Conference Opening
14:10 - 15:00 Prof. Adam Wierzbicki 1st Invited Lecture
Reputation Systems: Algorithms, Models and Applications
15:00 - 16:00 Session I – Cryptographic protocols I
15:00 - 15:20 Nicolas T. Courtois, Marek Grajek and Rahul Naik Optimizing SHA256 in Bitcoin Mining
15:20 - 15:40 Ferucio Laurenţiu Ţiplea A Lightweight Authentication Protocol for RFID
15:40 - 16:00 Jakub Muszyński, Sébastien Varrette, Juan Luís Jiménez Laredo and Pascal Bouvry Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities
16:00 - 16:30 Coffe break
16:30 - 17:50 Session II – Cryptography I
16:30 - 16:50 Marina Pudovkina and Alexander Toktarev Numerical Semigroups and Bounds on Impossible Dierential Attacks on Generalized Feistel Schemes
16:50 - 17:10 Marek Parfieniuk and Piotr Jankowski Encrypting Human-Encoded Data by Substituting Pairs of Code Words Without Changing the Bit Count of a Pair
17:10 - 17:30 Kimmo Halunen and Mirko Sailio Identity-Based Cryptography in Credit Card Payments
17:30 - 17:50 Monika Polak and Vasyl Ustimenko On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth Without Edge-Transitive Automorphism Groups
18:00     Opening Dinner
Tuesday, 23rd of September 2014
9:00 - 9:50
Prof. Franck Leprévost
2nd Invited Lecture
James Bond's most secret weapon
9:50 - 10:20 Coffe break
10:20 - 12:00 Session III – Cryptographic protocols II
10:20 - 10:40 Marek R. Ogiela and Piotr Sułkowski Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange
10:40 - 11:00 Ismail Mansour, Gérard Chalhoub and Pascal Lafourcade Secure Multihop Key Establishment Protocols for Wireless Sensor
11:00 - 11:20 Imed El Fray, Tomasz Hyla, Mirosław Kurkowski, Witold Maćków and Jerzy Pejaś Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices
11:20 - 11:40 Appala Naidu Tentu and Allam Appa Rao E‑cient Veriable Multi-secret Sharing Based on Y.C.H Scheme
11:40 - 12:30
Pascal Lafourcade
3rd Invited Lecture
12:30 - 13:30 Lunch
13:30 - 16:30 Session IV – Short and Work-in-Progress Presentations and Posters Session with Coffee
13:30 - 13:50 Urszula Romańczuk-Polubiec and Vasyl Ustimenko On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition
13:50 - 14:00 Mariusz Borowski Cryptographic Applications of the Duplex Construction
14:00 - 14:10 Bartłomiej Bielecki, Andrzej Krajka, Bogdan Ksiezopolski and Adam Wierzbicki The concept and security analysis of Wireless Sensor Network for Gas Lift in Oilwells
14:10 - 14:20 Christian Franck Dining Cryptographers with 0.924 Verifiable Collision Resolution
14:20 - 14:30 Marek Janiszewski The Oracle – a New Intelligent Cooperative Strategy of Attacks on Trust and Reputation Systems
14:30 - 14:40 Paweł Kasprowski and Katarzyna Harężlak Cheap and Easy PIN Entering Using Eye Gaze
14:40 - 14:50 Zbigniew Kotulski, Mariusz Sepczuk, Albert Sitek, Marcin Alan Tunia Adaptable context management framework for secure network services
14:50 - 15:00 Mariusz Sepczuk Authentication mechanism based on adaptable context management framework for secure network services
15:00 - 15:10 Albert Sitek Context-based Cardholder Verification Method in Electronic Funds Transfer transactions
15:10 - 15:20 Marcin Alan Tunia Vector approach to context data reliability
15:20 - 15:30 Robert Wicik, Tomasz Rachwalik and Rafał Gliwa Modified Alternating Step Generators with Non-Linear Scrambler
15:30 - 15:40 Aneta Wróblewska and Vasyl Ustimenko On new examples of families of multivariate stable maps and their cryptographical applications
15:40 - 15:50 Vasyl Ustimenko On multivariate cryptosystems based on computable maps with invertible decomposition
15:50 - 16:00 Wioletta Wójtowicz A fingerprint-based digital images watermarking for identity authentication
16:00 - 16:30 Coffe with Poster Session to Short and Work-in-Progress Papers
17:15 - 19:30 Guided City Tour – Old Town in Lublin (16:45 meeting in Lecture Hall, r. 217)
19:30     Conference Dinner
17:15 - 19:30 Guided City Tour – Old Town in Lublin (16:45 meeting in Lecture Hall, r. 217)
19:30     Conference Dinner
Wednesday, 24th of September 2014
9:00 - 10:20 Session V – Cryptography II and Network Security
9:00 - 9:20 Wit Foryś, Łukasz Jęda and Piotr Oprocha On a Cipher Based on Pseudo-random Walks on Graphs
9:20 - 9:40 Omar Reyad and Zbigniew Kotulski Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators
9:40 - 10:00 Grzegorz Oryńczak and Zbigniew Kotulski Context-Aware Secure Routing Protocol for Real-time Services
10:00 - 10:20 Katarzyna Mazur and Bogdan Ksiezopolski Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML
10:20 - 11:00 Coffe break
11:00 - 11:15 Closing the Conference