DIAC 2015
27 - 29 Sept
DIAC 2015: Directions in Authenticated Ciphers

DIAC 2015

Talk submission

Important dates

Submission deadline: September 1, 2015 at 17:00 SGT(=UTC+8)
Notification to authors: September 8, 2015
Workshop: September 27-29, 2015

Submission deadline has passed.


DIAC 2015 calls for submissions of talks on the topics listed below.

Talk submissions should be related to the field of authenticated encryption. Talk submissions addressing latest updates of CAESAR candidates are welcomed. This type should identify themselves as such; for fairness there should be only one submission per candidate. A talk of this type is expected to highlight the latest comparisons, upcomming tweaks, proofs, software/hardware implementations, etc.

Submissions are expected to be on the very latest results and ideas, including work in progress. Submissions are therefore not expected to be full papers; they are expected to be explanations of what talks will contain. However, detailed explanations will help in selecting and organizing talks, and there is no prohibition on submission of papers in cases where papers are available.

DIAC 2015 will not publish formal conference proceedings. There is no prohibition on talk submissions for papers that have been submitted to conferences with proceedings.

To submit, send a PDF by email by September 1, 2015, 17:00 SGT to


with subject line:
DIAC 2015 Submission: [title]

and replacing [title] by the the title of the submission . Submissions are not expected to be anonymous.


  • Components and combinations
    • Block ciphers
    • Dedicated stream ciphers
    • Stream ciphers based on block ciphers
    • Dedicated hash functions, sponges, etc.
    • Hash functions based on block ciphers
    • Dedicated MACs
    • MACs based on hash functions
    • MACs based on block ciphers
    • Authenticated encryption based on any of the above
    • Dedicated ciphers with built-in authentication
  • Attacks
    • Cryptanalysis of symmetric systems
    • Side-channel attacks on symmetric systems
    • Real-world costs of attacks
  • Implementations
    • APIs
    • Software
    • FPGAs
    • ASICs
    • Comparisons
  • Requirements
    • Quantitative security: e.g., is 80 bits enough?
    • Qualitative security: e.g., MAC vs. PRF, INT-PTXT vs. INT-CTXT
    • Robustness: e.g., security under nonce reuse, security against idiots
    • Side-channel resistance
    • Handling of limited randomness
    • Safety of using a key for many messages: 2^32? 2^64?
    • Key agility
    • Throughput in software, FPGA, ASIC
    • Parallelizability, incrementality, etc.
    • ASIC area budgets, FPGA slice budgets, etc.
    • Power limits, energy limits, etc.
    • Bandwidth: short plaintexts, ciphertexts, authenticators
    • Flexibility: e.g., variable authenticator lengths
    • Convenience: e.g., one-pass, intermediate tags
    • Use cases


The list of topics above is copied from the DIAC 2014, DIAC 2013 and DIAC 2012 workshops, which in turn draws on discussions at the January 2012 Dagstuhl workshop on Symmetric Cryptography, including suggestions from Jean-Philippe Aumasson, Eli Biham, Joan Daemen, Orr Dunkelman, Lars Knudsen, Bart Preneel, and Greg Rose.

Contact webmaster Jérémy Jean at diac2015singapore@gmail.com
Template designed by KU Leuven - COSIC // Photo by Jérémy Jean.
Last modification: 7 September 2015.