Gilles Van Assche
I am a cryptographer, currently working for STMicroelectronics in Belgium, and a member of the "Keccak Team", known to have developed the Keccak algorithm, selected to become the new SHA-3 standard.
Gilles Van Assche currently works in the Secure Microcontrollers Division of STMicroelectronics in Diegem, Belgium and teaches cryptography at the École Supérieure d'Informatique in Brussels. He receives the Physics Engineer degree from the Université Libre de Bruxelles (ULB) in 1998. He then joins the company Proton World, which later became part of STMicroelectronics. Between 2000 and 2005, in parallel with his job, he works on a PhD thesis at the Center for Quantum Information and Communication of the ULB. He is a co-recipient of the prize Le Prix La Recherche mention Mobilités 2004 for his work in quantum cryptography. He is the author of the book "Quantum Cryptography and Secret-Key Distillation" (Cambridge University Press) and of about 30 scientific papers, and has served in the program committee of various conferences. His current research interests are hash function design, modes of operation and side channel attacks. Together with Guido Bertoni, Joan Daemen and Michaël Peeters, he is a co-designer of the Keccak sponge function, which was selected by NIST as the winner of the SHA-3 competition. At ST, he works on security and testing aspects of software on secure microcontrollers.
The Keccak Team: during the last few years Guido, Joan, Michaël and Gilles have joined forces, concentrating on permutation-based cryptography with a focus on actual usability. This has lead among other things to the new sponge and duplex constructions, with their unique combination of simplicity and flexibility. These constructions allow hashing, encryption, authentication and authenticated encryption, all based on one single simple component: an iterated permutation. Based on them, they designed the primitive Keccak and submitted it to the NIST SHA-3 competition. The inner workings of Keccak are equally innovative, making use of a fresh set of round components. Aside from Keccak, the sponge and duplex constructions are also adopted by several so-called lightweight functions. For the development of CAESAR candidates Ketje and Keyak, the team was augmented with the forces of Ronny Van Keer.
Links
Events
Title | Day | Room | Track | Start | End |
---|---|---|---|---|---|
Keccak and SHA-3: code and standard updates From the Keccak Code Package to a wide range of cryptographic applications |
Sunday | K.1.105 (La Fontaine) | Security | 11:00 | 11:50 |