SSQSA: Set of Software Quality Static Analyzers 4/12/2019

By Gordana Rakić, University of Novi Sad, Serbia

Introducing Aggregation Functions 1/23/2019

By Regivan Hugo Nunes Santiago, Universidade Federal do Rio Grande do Norte, Brazil

SureThing: Device Location Certification for the Internet of Things 12/3/2018

By Miguel Pardal, Instituto Superior Técnico, University of Lisbon & INESC-ID

YouTube Timed Metadata Enrichment Using a Collaborative Approach 11/21/2018

By José Pedro PintoTelecommunications and Multimedia Center, INESC TEC

An Exercise in Formalisation: Blockchain Transactions 11/8/2018:

By Steve Reeves, University of Waikato (New Zeeland)

A Metalanguage for Guarded Iteration 7/31/2018

By Sergey Goncharov, Friedrich-Alexander-Universität Erlangen-Nürnberg.

The Future of Computing and the IBM Q Network 6/6/2018

By Walter Riess, IBM Research – Zurich and Binnig and Rohrer Nanotechnology Center, and Noam Zakay, IBM Corporate Technology and Intellectual Property.

Formal design of embedded systems 4/16/2018

By Naijun Zhan, Distinguished Research Professor at the Chinese Academy of Sciences, China.

Privacy-aware Databases 3/21/2018

By Rogério Pontes, HASLab, INESC TEC & UMinho.

Resource-Aware Models in ABS 12/14/2017

By Einar Broch Johnsen, University of Oslo, Norway.

Blockchain Technology Workshop 12/7/2017


The workshop will take place at Auditorium A2, first floor. Departamento de Informatica, Building 07. University of Minho, Gualtar campus, Braga, Portugal.

Date and Time: THURSDAY, December 7th, 2017 starting at 6PM.


18h00. Networking Session—Coffee and cookies are available.

18h30. Opening

An Algebraic Approach to the Design of Block Ciphers 11/8/2017

By Óscar Pereira, HASLab, INESC TEC & Minho University.

Abstract. We explore the possibility of modelling a working block cipher, and analysing its security, exclusively through an algebraic framework of polynomial rings and finite fields: one aims to get the simplest formal models of ciphers for which it is possible to get demonstrative evidence of its security but still with reasonably efficient implementations.