NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

The First SHA-3 Candidate Conference

February 25-28, 2009

Program

Printable PDF version       *Presenter affiliation listing

Wednesday, February 25, 2009

10:30am - 12:00pm
and
1:00pm - 5:00pm

Registration
Registration will open during the FSE 2009 Conference
Location: Museumzaal
2:00pm - 2:15pm Opening Remarks
William Burr, Manager, Security Technology Group, Computer Security Division, National Institute of Standards and Technology
2:15pm - 3:45pm Session I: Presentations of First Round Candidates
Session Chair:
Donna Dodson, NIST

  1. ECHO, presented by: Thomas Peyrin*
  2. Grøstl, presented by: Christian Rechberger
  3. Cheetah, presented by: Dmitry Khovratovich
  4. Lesamnta, presented by: Hirotaka Yoshida
  5. ARIRANG, presented by: Jongsung Kim
3:45pm - 4:15pm Break
Location: Museumzaal
4:15pm - 5:45pm Session II: Presentations of First Round Candidates
Session Chair:
Mridul Nandi, NIST

  1. Twister, presented by: Ewan Fleischmann
  2. Luffa, presented by: Dai Watanabe
  3. JH, presented by: Hongjun Wu
  4. Sarmal, presented by: Kerem Varici
5:45pm Adjourn for the Day

 

Thursday, February 26, 2009

8:30am - 5:00pm

Registration
Location: Museumzaal
9:00am - 10:30am Session III: Presentations of First Round Candidates
Session Chair:
Rene Peralta, NIST

  1. CubeHash, presented by: D. J. Bernstein
  2. Fugue, presented by: Charanjit S. Jutla
  3. Keccak, presented by: Guido Bertoni, Joan Daemen, Michael Peeters & Gilles Van Assche
  4. LUX, presented by: Ivica Nikolic
  5. Vortex, presented by: Shay Gueron & Michael Kounavis
10:30am - 11:00am Break
Location: Museumzaal
11:00am - 12:00pm

Session IV: System Priorities [Transcripts]
Session Chair:
Donna Dodson, NIST

• Application contexts
• Performance and implementations tradeoffs

12:00pm - 1:30pm Lunch
Location: Salons Georges
1:30pm - 3:00pm Session V: Presentations of First Round Candidates
Session Chair:
Souradyuti Paul, NIST

  1. BLAKE, presented by: Jean-Philippe Aumasson
  2. LANE, presented by: Sebastiaan Indesteege
  3. SHAvite-3, presented by: Orr Dunkelman
  4. Skein, presented by: Jon Callas
  5. SWIFFTX, presented by: Vadim Lyubashevsky
3:00pm - 3:30pm Break
Location: Museumzaal
3:30pm - 4:45pm Session VI: Presentations of First Round Candidates
Session Chair
: Lily Chen, NIST

  1. ECOH, presented by: Daniel R.L. Brown
  2. ESSENCE, presented by: Jason Worth Martin
  3. MD6, presented by: Ronald L. Rivest
  4. SANDstorm, presented by: Rich Schroeppel
4:45pm - 5:45pm

Session VII: Security Evaluation [Transcripts]
Session Chair:
Rene Peralta, NIST

• NIST’s views on SHA-3’s security requirements, presented by: Mridul Nandi
• Evaluation of attacks, presented by: Mridul Nandi
• Q&A, moderated by: Rene Peralta

7:00pm Dinner / Reception
Location: Faculty Club

 

Friday, February 27, 2009

8:30am - 5:00pm

Registration
Location: Museumzaal
9:00am - 10:30am Session VIII: Presentations of First Round Candidates
Session Chair:
Donna Dodson, NIST

  1. AURORA, presented by: Tetsu Iwata
  2. CHI, presented by: Phillip Hawkes
  3. SIMD, presented by: Gaetan Leurent
  4. TIB3, presented by: Daniel Penazzi
  5. Shabal, presented by: Anne Canteaut
10:30am - 11:00am Break
Location: Museumzaal
11:00am - 12:00pm

Session IX: Security-Performance Tradeoff [Transcripts]
Session Chair:
Souradyuti Paul, NIST

• NIST’s plan for handling tunable parameters, presented by: Souradyuti Paul
• Role of performance in the first cut, presented by: Souradyuti Paul
• Q&A, moderated by: Souradyuti Paul and William Burr

12:00pm - 1:30pm Lunch
Location: Salons Georges
1:30pm - 2:45pm

Session X: Presentations of First Round Candidates
Session Chair
: Rene Peralta, NIST

  1. NaSHA, presented by: Aleksandra Mileva
  2. EDON-R, presented by: Danilo Gligoroski
  3. FSB, presented by: Matthieu Finiasz
  4. Spectral Hash, presented by: Cetin Kaya Koc
2:45pm - 4:00pm

Session XI: Presentations of First Round Candidates
Session Chair:
Lily Chen , NIST

  1. Blue Midnight Wish, presented by: Svein Johan Knapskog
  2. EnRUPT, presented by: Sean O'Neil
  3. Hamsi, presented by: Ozgul Kucuk
  4. CRUNCH, presented by: Emmanuel Volte
4:00pm - 4:30pm Break
Location: Museumzaal
4:30pm - 5:30pm Session XII: The Way Forward [Transcripts]
Session Chair:
William Burr, NIST
5:30 pm Adjourn for Day

 

Saturday, February 28, 2009
9:00am - 10:20am
A First Look at First Round Candidates
Session Chair:
Mridul Nandi, NIST

Classification of the SHA-3 Candidates, presented by: Christian Forler
SHA-3 Zoo, presented by: Christian Rechberger
Engineering Comparison of the SHA-3 Candidates, presented by: Niels Ferguson
eBASH, presented by: D. J. Bernstein
10:20am - 10:50am Break
Location: Museumzaal
10:50am - 12:00pm

RUMP Session
Session Chair: William Burr, NIST

  1. Cryptanalysis of Dynamic SHA, presented by Sebastiaan Indesteege
  2. Lane, presented by Sebastiaan Indesteege
  3. Second preimage attack on SHAMATA-512, presented by Kota Ideguchi and Dai Watanabe
  4. Observations of non-randomness in the ESSENCE compression function, presented by Nicky Mouha, Søren S. Thomsen, Meltem Sönmez Turan and Bart Preneel
  5. Length extension of Keccak cryptanalysis prize, presented by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche (2 min)
  6. More engineering considerations for the SHA-3 hash function, presented by Orr Dunkelman
  7. Bit attack, presented by Dan Bernstein
  8. Ponic algorithm, presented by Peter Schmidt Nielsen
  9. Data, Clarification, Opinion, and a Challenge, presented by Shay Gueron
  10. ERINDALE family of hash functions, presented by Nikolajs Volkovs
  11. Thoughts on Permutation Based Hashes (Theoretical), presented by Martijn Stam
  12. Replay attack on a one-way hash function, presented by Dan Bernstein (video)

12:00pm Adjourn

The following algorithms will not be presented at the First SHA-3 Candidate Conference; however, presentation materials have been submitted and will be posted below.

      • Blender, principal submitter: Dr. Colin Bradbury
      • Dynamic SHA, principal submitter: Xu Zijie
      • Dynamic SHA2, principal submitter: Xu Zijie
      • MCSSHA-3, principal submitter: Mikhail Maslennikov
      • Sgàil, principal submitter: Peter Maxwell