27 March 2013 Brussels, Belgium

8:50 - 9:00 Welcome

Session 1: Towards SHA-3

9:00 - 9:40 Vincent Rijmen (KU Leuven, Belgium)
The SHA-3 process
[abstract & slides]

9:40 - 10:20 Elena Andreeva (KU Leuven, Belgium)
Security of SHA-3: the provable security perspective
[abstract]

Session 2: Keccak

10:50 - 11:30 Joan Daemen (STMicroelectronics, Belgium)
Permutation-based cryptography
[abstract & slides]

11:30 - 12:10 Gilles Van Assche (STMicroelectronics, Belgium)
Inside Keccak
[abstract & slides]

Session 3: Cryptanalysis

13:30 - 14:10 Maria Naya-Plasencia (INRIA, France)
First practical results on reduced-round Keccak and Unaligned rebound attack
[abstract & slides]

14:10 - 14:50 Orr Dunkelman (University of Haifa, Israël)
Four rounds are not enough
[abstract & slides]

14:50 - 15:30 Itai Dinur (Weizmann Institute, Israël)
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
[abstract & slides]

16:00 - 16:40 Anne Canteaut (INRIA, France)
On some algebraic properties of Keccak
[abstract & slides]

Session 4: Implementation

16:40 - 17:20 Christian Wenzel-Benner (ITK Engineering AG, Germany)
SHA-3 optimization and benchmarking: an engineer's perspective
[abstract & slides]

17:20 - 18:00 Michaël Peeters (NXP Semiconductors, Belgium)
Implementation aspects of Keccak
[abstract & slides]

18:00 - 18:10 Closing remarks