Program

8:00-9:00 Welcome Coffee

9:00-10:30 Session I

A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems Arsenia Chorti

Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks   Stefan Pfennig, Sabrina Engelmann, Elke Franz and Anne Wolf

Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters Alexander Bunin, Ziv Goldfeld, Haim Permuter, Shlomo Shamai, Paul Cuff and Pablo Piantanida

Hash-then-Encode: A Modular Semantically Secure Wiretap Code  Setareh Sharifian, Fuchun Lin and Rei Safavi-Naini

10:30-11:00 Coffee Break

11:00-12:00 Invited Talk I

Prof. Jean Claude Belfiore, Finite-Length Lattice Coding for Gaussian Wiretap Channels: A theta series perspective. Slides

12:00-14:00 Lunch Break

14:00-15:00 Invited Talk II

Dr. Stefano Tessaro, A Cryptographic Perspective on Information-theoretic Secrecy. Slides

15:00-15:30 Session II

A CCA-Secure Cryptosystem Using Massive MIMO Channels  Thomas Dean and Andrea Goldsmith

15:30-16:00 Coffee Break

16:00-17:30 Session III

You are how you play: authenticating mobile users via game playing  Marco Baesso, Pasquale Capuozzo, Mauro Conti, Luciano Gamberini, Merylin Monaro, Giuseppe Sartori and Riccardo Spolao

Fuzzy Authentication using Rank Distance Alessandro Neri, Joachim Rosenthal and Davide Schipan

A McEliece-based Key Exchange Protocol for Optical Communication Systems Joo Yeon Cho, Helmut Griesser and Danish Rafique

An ICN-based Authentication Protocol for a Simplified LTE Architecture Alberto Compagno, Mauro Conti and Muhammad Hassan Khan