Santa Barbara August 17-21
|
|
CRYPTO 2003
PROGRAM
|
Sunday August 17, 2003
|
|
17:00-20:00
|
Registration
|
Anacapa Formal Lounge
|
|
17:30-21:30
|
Evening Reception
Buffet 18:00-21:30
Main Bar 18:00-22:00
|
Anacapa Lawn
|
|
|
Early Bar opens 17:30
|
Anacapa Formal Lounge Patio
|
|
|
|
|
Monday August 18, 2003
|
|
8:50-9:00
|
Opening Remarks
Greg Rose, Crypto 2003 General Chair
|
All talks will be
in Campbell Hall
|
|
|
|
|
Session
1: Public key cryptanalysis I
|
Chair: Michael Wiener
|
|
9:00-9:25
|
Factoring Large Numbers with the TWIRL Device
Adi Shamir, Eran Tromer
|
|
9:25-9:50
|
New Partial Key Exposure Attacks on RSA
Johannes Blömer, Alexander May
|
|
9:50-10:15
|
Algebraic Cryptanalysis of Hidden Field Equation
(HFE) Cryptosystems Using Gröbner Bases
Jean-Charles Faugère, Antoine Joux
|
|
|
10:15-10:40
|
Morning Break
|
|
|
|
|
|
Session
2: Alternate adversary models
|
Chair: Victor Shoup
|
|
10:40-11:05
|
On Constructing Locally Computable Extractors
and Cryptosystems in the Bounded Storage Model
Salil Vadhan
|
|
11:05-11:30
|
Unconditional Authenticity and Privacy from an
Arbitrarily Weak Secret
Renato Renner, Stefan Wolf
|
|
Session
3: Invited Talk I
|
Chair: Dan Boneh
|
|
11:30-12:30
|
Cryptographic Assumptions and Challenges
Invited Speaker: Moni Naor
|
|
|
|
|
|
12:30-13:45
|
Lunch
|
|
|
|
|
|
Session
4: Protocols
|
Chair: Tal Rabin
|
|
14:00-14:25
|
Scalable Protocols for Authenticated Group Key
Exchange
Jonathan Katz, Moti Yung
|
|
14:25-14:50
|
Practical Verifiable Encryption and Decryption
of Discrete Logarithms
Jan Camenisch, Victor Shoup
|
|
14:50-15:15
|
Extending Oblivious Transfers Efficiently
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank
|
|
|
|
|
|
15:15-15:45
|
Afternoon Break
|
|
|
|
|
|
Session
5: Symmetric key cryptanalysis I
|
Chair: Bart Preneel
|
|
15:45-16:10
|
Algebraic Attacks on Combiners with Memory
Frederik Armknecht, Matthias
Krause
|
|
16:10-16:35
|
Fast Algebraic Attacks on Stream Ciphers with
Linear Feedback
Nicolas Courtois
|
|
16:35-17:00
|
Cryptanalysis of SAFER++
Alex Biryukov, Christophe De
Canniere, Gustaf Dellkrantz
|
|
|
|
|
|
19:00-22:00
|
Evening Reception
Dinner 19:00-20:30
Dessert 20:00-21:30
Bar open until 22:00
|
Anacapa Lawn
|
|
|
|
|
Tuesday August 19, 2003
|
|
|
|
|
|
Session
6: Public key cryptanalysis II
|
Chair: Ramarathnam Venkatesan
|
|
9:00-9:25
|
A Polynomial Time Algorithm for the Braid
Diffie-Hellman Conjugacy Problem
Jung Hee Cheon, Byungheup Jun
|
|
9:25-9:50
|
The Impact of Decryption Failures on the
Security of NTRU Encryption
Nick Howgrave-Graham, Phong
Nguyen, David Pointcheval, John Proos, Joseph Silverman, Ari Singer, William Whyte
|
|
Session
7: Universal composability
|
Chair: Jonathan Katz
|
|
9:50-10:15
|
Universally Composable Efficient
Multiparty Computation from Threshold Homomorphic Encryption
Ivan Damgaard, Jesper Buus
Nielsen
|
|
10:15-10:40
|
Universal Composition
with Joint
State
Ran Canetti, Tal Rabin
|
|
|
|
|
|
10:40-11:10
|
Morning Break
|
|
|
|
|
|
Session
8: Zero Knowledge
|
Chair: Rafail Ostrovsky
|
|
11:10-11:35
|
Statistical Zero-Knowledge Proofs With Efficient
Provers: Lattice Problems and More
Daniele Micciancio, Salil Vadhan
|
|
11:35-12:00
|
Derandomization in Cryptography
Boaz Barak, Shien Jin Ong, Salil Vadhan
|
|
12:00-12:25
|
On Deniability in the Common Reference String
and Random Oracle
Model
Rafael Pass
|
|
|
|
|
|
12:30-13:45
|
Lunch
|
|
14:00-17:00
|
Free Afternoon
Tourism
Birds-of-a-Feather Sessions
Soccer
|
Santa Barbara
Anacapa lounges
Lawn
|
|
|
|
|
|
RUMP
SESSION
|
Chair: Stuart Haber
|
|
18:30
|
Buffet Opens
Buffet 18:30-22:00
Bar open until 23:00
|
University Center
|
|
19:00-late
|
Rump Session
|
University Center
|
|
|
|
|
Wednesday August 20, 2003
|
|
|
|
|
|
Session
9: Algebraic Geometry
|
Chair: Antoine Joux
|
|
9:00-9:25
|
Primality Proving via One Round in ECPP and One
Iteration in AKS
Qi Cheng
|
|
9:25-9:50
|
Torus-based Cryptography
Karl Rubin, Alice Silverberg
|
|
|
|
|
|
9:50-10:20
|
Morning Break
|
|
|
|
|
|
Session
10: Public Key Constructions
|
Chair: Mihir Bellare
|
|
10:20-10:45
|
Efficient Universal Padding Techniques for
Multiplicative Trapdoor One-way Permutation
Yuichi Komano, Kazuo Ohta
|
|
10:45-11:10
|
Multipurpose Identity-Based Signcryption
Xavier Boyen
|
|
Session
11: Invited talk II
|
Chair: Dan Boneh
|
|
|
|
|
11:10-12:10
|
The Cryptography of the IPSec
and IKE Protocols
Hugo Krawczyk
|
|
Session
12: New problems
|
Chair: Jessica Staddon
|
|
14:00-14:25
|
On Memory-Bound Functions for Fighting Spam
Cynthia Dwork, Andrew
Goldberg, Moni Naor
|
|
14:25-14:50
|
Lower and Upper Bounds on Obtaining History Independence
Niv Buchbinder, Erez Petrank
|
|
14:50-15:15
|
Private Circuits: Securing Hardware against
Probing Attacks
Yuval Ishai, Amit Sahai, David Wagner
|
|
|
|
|
|
|
|
|
|
15:15-15:45
|
Afternoon Break
|
|
|
|
|
|
Session 13: Symmetric key
constructions
|
Chair: Charanjit Jutla
|
|
15:45-16:10
|
A Tweakable Enciphering Mode
Shai Halevi, Phillip Rogaway
|
|
16:10-16:35
|
A Message Authentication Code Based on
Unimodular Matrix Groups
Matthew Cary, Ramarathnam
Venkatesan
|
|
16:35-17:00
|
Luby-Rackoff: 7 Rounds are Enough for 2n(1-ε) Security
Jacques Patarin
|
|
|
|
|
|
IACR
Membership Meeting
|
|
|
17:05-17:50
|
IACR Membership Meeting
|
|
|
|
|
|
18:00-20:30
|
Beach Barbecue
Bar 18:00-20:30
Buffet 18:15-20:30
Dessert/Coffee 19:00-20:30
|
|
|
20:00-22:30
|
Crypto Cafe
|
Anacapa Formal Lounge
|
|
|
|
|
Thursday August 21, 2003
|
|
|
|
|
|
Session
14: New models
|
Chair: Anna Lysyanskaya
|
|
9:00-9:25
|
Weak Key-Authenticity and the Computational
Completeness of Formal Encryption
Omer Horvitz, Virgil Gligor
|
|
9:25-9:50
|
Plaintext Awareness via Key Registration
Jonathan Herzog, Moses
Liskov, Silvio Micali
|
|
9:50-10:15
|
Relaxing Chosen-Ciphertext Security
Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
|
|
|
|
|
|
10:15-10:45
|
Morning Break
|
|
|
|
|
|
Session
15: Symmetric key cryptanalysis II
|
Chair: Mitsuru Matsui
|
|
10:45-11:10
|
Password Interception in a SSL/TLS Channel
Brice Canvel, Alain
Hiltgen, Serge Vaudenay, Martin Vuagnoux
|
|
11:10-11:35
|
Instant Ciphertext-Only Cryptanalysis of GSM
Encrypted Communication
Elad Barkan, Eli Biham, Nathan Keller
|
|
11:35-12:00
|
Making a faster Cryptanalytic Time-Memory
Trade-Off
Philippe Oechslin
|
|
|
|
|
|
12:30-13:45
|
Lunch
|
|
|
|
|
|
13:45
|
Conference Adjourns
|
|
|
|
|
|
|
|