The call for submissions has been archived on a separate page. A preliminary printed schedule was distributed before lunch on Tuesday. The final schedule appears below.
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Crypto 2010 rump session, Tuesday 17 August 2010 | ||||
19:30 | Bart Preneel | Bart Preneel | IACR Fellowship Ceremony | slides |
19:45 | Cetin Koc and Jean-Jacques Quisquater | Jean-Jacques Quisquater | CHES opening | slides |
19:48 | Daniel J. Bernstein and Tanja Lange | Daniel J. Bernstein and Tanja Lange | Welcome to the Crypto rump session | |
19:51 | Nadia Heninger and Hovav Shacham | Nadia Heninger | Notes on the History of Crypto | slides |
19:53 | Edouard Cuvelier, Alphonse Magnus and Jean-Jacques Quisquater | Jean-Jacques Quisquater | How old and known are the Edwards curves | slides |
19:55 | Hilarie Orman | Hilarie Orman | The IACR Archive of Technical Papers | slides |
Hash functions | ||||
19:58 | Itai Dinur and Adi Shamir | Adi Shamir | An Algebraic Attack on Hamsi-256 | |
20:03 | Christina Boura, Anne Canteaut, Christophe De Canniere | Christophe De Canniere | Beware of optimistic weather forecast | slides |
20:08 | Gaëtan Leurent | Gaëtan Leurent | Self-Defence Against Fresh Fruit | slides |
20:12 | Charles Bouillaguet, Pierre-Alain Fouque, Praveen Gauravaram and Gaëtan Leurent | Praveen Gauravaram | How good are some 2nd round SHA3 hashes when their compression functions are weak? | slides |
20:16 | Gideon Yuval | Gideon Yuval | Multicollisions: what Joux does not imply | |
20:21 | Praveen Gauravaram, Nasour Bagheri and Lars R.Knudsen | Praveen Gauravaram | Fixing non-randomness in PGVs | slides |
20:25 | Yuji Suga | Yuji Suga | Reconsideration of public key fingerprints | slides |
20:30 | Break | |||
More cryptanalysis | ||||
20:55 | Piotr Mroczkowski, Janusz Szmidt | Janusz Szmidt | The cube attack on stream cipher Trivium and quadraticity tests | slides |
20:59 | Itai Dinur and Adi Shamir | Adi Shamir | An Algebraic Attack on Grain-128 | |
21:03 | Andrey Bogdanov, Vincent Rijmen | Andrey Bogdanov | Universal Related-Key Linear Hull Distinguishers for Key-Alternating Block Ciphers | slides |
21:07 | Yu Sasaki, Kan Yasuda | Yu Sasaki | Formalizing Known-Key "Distinguishers" -- New Attacks on Feistel Ciphers | slides |
21:11 | Lars R. Knudsen, Gregor Leander | Julia Borghoff | Make the world a better place... | slides |
21:13 | Henry Cohn and Nadia Heninger | Nadia Heninger | Coppersmith's Theorem XVII: Coppersmith UNLEASHED | slides |
21:17 | Craig Gentry, Shai Halevi | Craig Gentry | Cryptanalytic Challenges for FHE | slides |
Leakage resilience | ||||
21:21 | Allison Lewko, Yannis Rouselakis, Brent Waters | Yannis Rouselakis | Achieving Leakage Resilience through Dual System Encryption | slides |
21:25 | Elette Boyle, Gil Segev, Daniel Wichs | Elette Boyle | Fully Leakage-Resilient Signatures | slides |
21:29 | Jorge González-Díaz and Francisco Rodríguez-Henríquez | Francisco Rodríguez-Henríquez | Leakage-resilient cryptographers in the Latincrypt-model | slides |
21:33 | Abhishek Jain, Krzysztof Pietrzak | Abhishek Jain | On Leakage Resilience Amplification via Repetition | |
21:33 | Abhishek Jain, Krzysztof Pietrzak | Abhishek Jain | On Leakage Resilience Amplification via Repetition | |
21:33 | Abhishek Jain, Krzysztof Pietrzak | Abhishek Jain | On Leakage Resilience Amplification via Repetition | |
21:37 | Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan | Zvika | Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage | |
21:41 | Jon Callas, Tamzen Cannoy, Nicko van Someren | Nicko van Someren | On the Leakage of Zero-Knowledge | slides |
21:45 | Break | |||
More good news | ||||
22:10 | Yvo Desmedt, Stelios Erotokritou, Rebecca Wright | Yvo Desmedt | Towards Secure Internet Voting | slides |
22:14 | Ronald L. Rivest et al. | Ronald L. Rivest | Report on Takoma Park election using scantegrity | slides |
22:17 | ETSI-SAGE, Chair: Steve Babbage, Vodafone | Helena Handschuh | New mobile phone security algorithms | slides |
22:19 | Krzysztof Pietrzak | Krzysztof Pietrzak | Subspace LWE and Non-HB Style Authentication from LPN | slides |
22:24 | Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai | Zvika | Black-Box Circular Secure Encryption Beyond Affine Functions | |
22:27 | Tal Malkin, Isamu Teranishi and Moti Yung | Moti Yung | Efficient Block-Wise KDM (Circular) Encryption | slides |
22:30 | C. Aguilar, P. Gaborit, P. Lacharme, J. SChrek and G. Zemor | P. Gaborit | Noisy Diffie-Hellman protocols or code-based key exchanged and encryption without masking | slides |
22:33 | Tolga Acar, Karen Easterbrook and Brian LaMacchia | Brian LaMacchia | Implementing Fiber-based Steganography for Pairings | slides |
22:36 | Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner | Marc Fischlin | Random Oracles in a Quantum World | slides |
22:39 | Seung Geol Choi, Aggelos Kiayias, Tal Malkin | Aggelos Kiayias | BiTR Cryptography | slides |
22:42 | Michael Gerbush, Allison Lewko, Brent Waters | Michael Gerbush | Dual Form Signatures | slides |
22:45 | Dan Boneh and David Mandell Freeman | David Mandell Freeman | Homomorphic signatures over binary fields | slides |
22:48 | Yuval Ishai and Abishek Kumarasubramanian and Claudio Orlandi and Amit Sahai | Claudio Orlandi | On Invertible Sampling and Adaptive Security | slides |
22:51 | Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias | Sarah Zakarias | A Framework for Semi-Homomorphic Public Key Cryptosystems with Applications to MPC | slides |
22:54 | Zvika Brakerski, Yael Tauman Kalai | Zvika | A Framework for Signatures, Ring Signatures and Identity-Based Encryption in the Standard Model | |
22:57 | Tom Berson, Nigel Smart, Raphael C.-W. Phan, Orr Dunkelman, Dan Page | Orr Dunkelman | Universal Compostible Secure Broadcast\ based on Commutative Random Algebraic Partitions | slides |
23:00 | Fin! | |||
Conference announcements, http://www.iacr.org/events/ | ||||
18--22 October 2010, Redmond: Workshop on Elliptic Curve Computations, http://2010.eccworkshop.org | ||||
13--15 December 2010, Yamanaka Hot Spring: Pairing 2010, http://www.pairing-conference.org | ||||
6--9 March 2011, Taormina: PKC 2011, http://www.iacr.org/workshops/pkc2011/ | ||||
21--24 May 2011, Amsterdam: ICITS 2011, http://www.cwi.nl/ICITS2011 |