| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 9:00 am |
– H2020 Project SeCoIIA Webinar |
– H2020 SeCoIIA Information Security Workshop |
||
| 9:15 am |
– Welcome to the first day of workshop |
|||
| 9:30 am |
– Veronika Kuchta – Lattice-Based Zero-Knowledge Proof |
|||
| 9:45 am | ||||
| 10:00 am |
– Session 5: Short Papers II |
|||
| 10:15 am |
– Welcome to the second day of workshop |
|||
| 10:30 am |
– Mélissa Rossi – Assessing residual security of lattice-based cryptography |
– Federico Pintore – a practical and provable secure isogeny-based signature |
– Session 2: TLS, Openness & Security Control |
|
| 10:45 am | ||||
| 11:00 am |
– Break |
|||
| 11:15 am | ||||
| 11:30 am |
– Session 6: Risk Analysis, Neural Networks & Web Protection |
|||
| 11:45 am |
– Romain Alleaume – Quantum and Post-Quantum Cryptography Complementarity |
– Vishal Saraswat – Hash-Based Signatures |
||
| 12:00 pm |
– Break |
|||
| 12:15 pm | ||||
| 12:30 pm | ||||
| 12:45 pm |
– Conclusion of the workshop |
|||
| 1:00 pm |
– Break |
|||
| 1:15 pm | ||||
| 1:30 pm |
– Session 3: Short Papers I |
|||
| 1:45 pm |
– Bhaskar Biswas – Code-based Crypto and HyMES |
– General Welcome |
||
| 2:00 pm |
– Keynote: New Dimensions of Information Warfare: survey, challenges, and research directions |
– H2020 SeCoIIA Preparedness Workshop |
– Session 7: Infrastructure Security & Malware Detection |
|
| 2:15 pm | ||||
| 2:30 pm |
– |
|||
| 2:45 pm |
– Jean-Christophe Deneunille – Code-based cryptography is being ready for post-quantum PKE standardization |
|||
| 3:00 pm |
– Session 4: Access Control, Risk Assessment & Security Knowledge |
|||
| 3:15 pm |
– Inaugural Speech
|
|||
| 3:30 pm |
– Session 1: Vulnerabilities, Attacks & Intrusion Detection – On-Board security challenges, results and perspectives
|
– FAREWELL/CLOSING |
||
| 3:45 pm | ||||
| 4:00 pm |
– Presentation and Live Demonstration of CHESS4Automotive platform
|
|||
| 4:15 pm | ||||
| 4:30 pm |
– Off-Board and V2X security challenges, results and perspectives – Arnaud KAISER
|
|||
| 4:45 pm |
| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 9:15 am |
– Welcome to the first day of workshop |
|||
| 9:30 am |
– Veronika Kuchta – Lattice-Based Zero-Knowledge Proof |
|||
| 9:45 am | ||||
| 10:00 am | ||||
| 10:15 am |
– Welcome to the second day of workshop |
|||
| 10:30 am |
– Mélissa Rossi – Assessing residual security of lattice-based cryptography |
– Federico Pintore – a practical and provable secure isogeny-based signature |
||
| 10:45 am | ||||
| 11:00 am | ||||
| 11:15 am | ||||
| 11:45 am |
– Romain Alleaume – Quantum and Post-Quantum Cryptography Complementarity |
– Vishal Saraswat – Hash-Based Signatures |
||
| 12:00 pm | ||||
| 12:15 pm | ||||
| 12:30 pm | ||||
| 12:45 pm |
– Conclusion of the workshop |
|||
| 1:45 pm |
– Bhaskar Biswas – Code-based Crypto and HyMES |
|||
| 2:00 pm | ||||
| 2:15 pm | ||||
| 2:30 pm | ||||
| 2:45 pm |
– Jean-Christophe Deneunille – Code-based cryptography is being ready for post-quantum PKE standardization |
|||
| 3:00 pm | ||||
| 3:15 pm | ||||
| 3:30 pm |
| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 11:00 am |
– Break |
|||
| 11:15 am | ||||
| 12:00 pm |
– Break |
|||
| 12:15 pm | ||||
| 12:30 pm | ||||
| 12:45 pm | ||||
| 1:00 pm |
– Break |
|||
| 1:15 pm | ||||
| 2:30 pm |
– |
|||
| 2:45 pm |
| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 10:00 am |
– Session 5: Short Papers II |
|||
| 10:15 am | ||||
| 10:30 am |
– Session 2: TLS, Openness & Security Control |
|||
| 10:45 am | ||||
| 11:00 am | ||||
| 11:15 am | ||||
| 11:30 am |
– Session 6: Risk Analysis, Neural Networks & Web Protection |
|||
| 11:45 am | ||||
| 12:00 pm | ||||
| 12:15 pm | ||||
| 12:30 pm | ||||
| 12:45 pm | ||||
| 1:30 pm |
– Session 3: Short Papers I |
|||
| 1:45 pm |
– General Welcome |
|||
| 2:00 pm |
– Keynote: New Dimensions of Information Warfare: survey, challenges, and research directions |
– Session 7: Infrastructure Security & Malware Detection |
||
| 2:15 pm | ||||
| 2:30 pm | ||||
| 2:45 pm | ||||
| 3:00 pm |
– Session 4: Access Control, Risk Assessment & Security Knowledge |
|||
| 3:15 pm | ||||
| 3:30 pm |
– Session 1: Vulnerabilities, Attacks & Intrusion Detection |
– FAREWELL/CLOSING |
||
| 3:45 pm | ||||
| 4:00 pm | ||||
| 4:15 pm | ||||
| 4:30 pm | ||||
| 4:45 pm |
| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 3:15 pm |
– Inaugural Speech
|
|||
| 3:30 pm |
– On-Board security challenges, results and perspectives
|
|||
| 3:45 pm | ||||
| 4:00 pm |
– Presentation and Live Demonstration of CHESS4Automotive platform
|
|||
| 4:15 pm | ||||
| 4:30 pm |
– Off-Board and V2X security challenges, results and perspectives – Arnaud KAISER
|
|||
| 4:45 pm |
| Tuesday, 3rd | Wednesday, 4th | Thursday, 5th | Friday, 6th | |
|---|---|---|---|---|
| 9:00 am |
– H2020 Project SeCoIIA Webinar |
– H2020 SeCoIIA Information Security Workshop |
||
| 9:15 am | ||||
| 9:30 am | ||||
| 9:45 am | ||||
| 10:00 am | ||||
| 10:15 am | ||||
| 10:30 am | ||||
| 10:45 am | ||||
| 11:00 am | ||||
| 11:15 am | ||||
| 11:30 am | ||||
| 11:45 am | ||||
| 2:00 pm |
– H2020 SeCoIIA Preparedness Workshop |
|||
| 2:15 pm | ||||
| 2:30 pm | ||||
| 2:45 pm | ||||
| 3:00 pm | ||||
| 3:15 pm | ||||
| 3:30 pm | ||||
| 3:45 pm | ||||
| 4:00 pm | ||||
| 4:15 pm | ||||
| 4:30 pm | ||||
| 4:45 pm |