|
|
|
|
Tentative Asiacrypt 2007 Schedule
|
Schedule *
Registration desk will open at 08:00 AM from Monday to
Thursday
|
|
Dec 2 (Sun) |
Dec 3 (Mon) |
Dec 4 (Tue) |
Dec 5 (Wed) |
Dec 6 (Thu) |
08:00 |
|
Opening Remark
(08:50 - 09:00) |
Guided Excursion to see Orang
Utan and Longhouse
(08:00 - 14:00) |
|
|
09:00 |
Session 1
|
Session 7 |
Session 10 |
|
Coffee Break
(10:15- 10:40) |
Coffee Break
(10:15 - 10:40)
|
Coffee Break
(10:15 - 10:40)
|
|
Session 2
|
Session 8 |
Session 11 |
12:00 |
Invited Talk #1 |
|
Lunch
(12:30 - 14:00) |
Lunch
(12:30 - 14:00) |
Lunch
(12:30 - 14:00) |
|
Session 3
|
Session 5 |
Session 9 |
Conference Adjourns |
15:00 |
Registration
(15:00 - 18:00) |
Coffee Break
(15:15 - 15:40) |
Coffee Break
(15:15 - 15:40) |
Coffee Break
(15:15 - 15:40) |
|
Session 4 |
Session 6 |
Invited Talk #2 |
|
IACR Membership Meeting
(17:00 - 18:00) |
18:00 |
Welcome Cocktail Reception
(19:00 - 22:00) |
|
Rump Session
(19:00 - 22:00) |
Banquet
(20:00 - 22:00) |
|
|
Technical Program
of Asiacrypt 2007
December 3rd (Monday) |
|
[ Session 1. Number Theory and Elliptic Curve ]
09:00 - 10:15
Session Chair: Serge Vaudenay
- A Kilobit Special
Number Field Sieve Factorization,
Kazumaro Aoki (NTT)
Jens Franke (University of Bonn, Department of
Mathematics)
Thorsten Kleinjung (University of Bonn, Department
of Mathematics)
Arjen K. Lenstra (EPFL and Bell Laboratories)
Dag Arne Osvik (EPFL)
- When e-th Roots
Become Easier Than Factoring,
Antoine Joux (DGA and Université de Versailles)
David Naccache (Ecole normale supérieure)
Emmanuel Thomé (INRIA Lorraine, LORIA)
- Faster Addition
and Doubling on Elliptic Curves,
Daniel J. Bernstein (University of Illinois at
Chicago, USA)
Tanja Lange (Technische Universiteit Eindhoven,
Netherlands)
[ Session 2.
Protocol ]
10:40 - 11:30
Session Chair:
Xuejia Lai
-
A Non-Interactive
Shuffle with Pairing Based Verifiability,
Jens Groth (University College London)
Steve Lu (UCLA, Math Department)
-
On Privacy Models
for RFID,
Serge Vaudenay (EPFL)
[ Invited Talk I
]
11:30 - 12:30
Session Chair:
Masayuki Abe
[ Session 3.
Hash Function Design ]
14:00 - 15:15
Session Chair:
Martijn Stam
-
A Simple Variant of
the Merkle-Damgård Scheme with a Permutation,
Shoichi Hirose (University of Fukui, Japan),
Je Hong Park (ETRI Network & Communication
Security Division, Korea),
Aaram Yun (ETRI Network & Communication Security
Division, Korea)
-
Seven-Property-Preserving Iterated Hashing: ROX,
Elena Andreeva (Katholieke Universiteit Leuven)
Gregory Neven (Katholieke Universiteit Leuven)
Thomas Shrimpton (Portland State University and
University of Lugano)
Bart Preneel (Katholieke Universiteit Leuven)
-
How to Build a Hash
Function from Any Collision-resistant Function,
Thomas Ristenpart (University of California, San
Diego)
Thomas Shrimpton (Portland State University and
University of Lugano)
[ Session 4.
Group/Broadcast Cryptography ]
15:40 - 16:55
Session Chair:
Josef Pieprzyk
-
Fully Anonymous
Group Signatures without Random Oracles,
Jens Groth (University College London)
-
Group Encryption,
Aggelos Kiayias (University of Connecticut, USA)
Yiannis Tsiounis (BestQuotes, USA)
Moti Yung (Google Inc. and Columbia University)
-
Identity-Based
Broadcast Encryption with Constant Size
Ciphertexts and Private Keys,
Cécile Delerablée (Orange Labs)
|
December 4th
(Tuesday) |
|
[ Session 5. MAC and Implementation ]
14:00 - 15:15
Session Chair:
Thomas Johansson
-
Boosting
Merkle-Damgård Hashing for Message Authentication,
Kan Yasuda (NTT, Japan)
-
On Efficient
Message Authentication Via Block Cipher Design
Techniques,
G. Jakimoski and K. P. Subbalakshmi (Stevens
Institute of Technology)
-
Symmetric Key Cryptography on Modern Graphics
Hardware,
James Goodman and Jason Yang (Advanced Micro
Devices, Inc.)
[ Session 6.
Multiparty Computation I ]
15:40 - 16:55
Session Chair:
Jung Hee Cheon
-
Blind
Identity-Based Encryption and Simulatable
Oblivious Transfer,
Matthew Green and Susan Hohenberger (The Johns
Hopkins University)
-
Multi-Party Indirect Indexing and Applications,
Matthew Franklin, Mark Gondree and Payman Mohassel
(Dept. of Computer Science, University of
California, Davis)
-
Two-Party Computing
with Encrypted Data,
Seung Geol Choi (Computer Science Department,
Columbia University)
Ariel Elbaz (Computer Science Department, Columbia
University)
Ari Juels (RSA Laboratories)
Tal Malkin (Computer Science Department, Columbia
University)
Moti Yung (Google Inc. and Columbia University)
|
December
5th
(Wednesday) |
|
[ Session 7.
Block Cipher ]
9:00 - 10:15
Session Chair:
Tetsu Iwata
-
Known-Key
Distinguishers for Some Block Ciphers,
Lars R. Knudsen (Technical University of Denmark)
Vincent Rijmen (Graz University of Technology,
Austria)
-
Generic Attacks on Unbalanced Feistel Schemes with
Expanding Functions,
Jacques Patarin (University of Versailles)
Valerie Nachef (University of Cergy-Pontoise)
Come Berbain (France Télécom Research and
Developpement)
-
On Tweaking
Luby-Rackoff Ciphers,
David Goldenberg (College of William and Mary)
Susan Hohenberger (Johns Hopkins University)
Moses Liskov (College of William and Mary)
Elizabeth Crump Schwartz (College of William and
Mary)
Hakan Seyalioglu (College of William and Mary)
[ Session 8. Multiparty Computation II ]
10:40 - 12:20
Session Chair:
Yvo Desmedt
-
Secure Protocols
with Asymmetric Trust,
Ivan Damgård (Aarhus University)
Yvo Desmedt (University College London)
Matthias Fitzi (ETH Zürich)
Jesper Buus Nielsen (Aarhus University)
-
Simple and
Efficient Perfectly-Secure Asynchronous MPC,
Zuzana Beerliová-Trubíniová and Martin Hirt (ETH
Zürich)
-
Efficient Byzantine
Agreement with Faulty Minority,
Zuzana Beerliová-Trubíniová, Martin Hirt and Micha
Riser (ETH Zürich)
-
Information-theoretic Security without an Honest
Majority,
Anne Broadbent and Alain Tapp (Université de
Montréal)
[ Session 9. Foundation ]
14:00 - 15:15
Session Chair:
Jesper Buus Nielsen
-
Black-Box Extension
Fields and the Inexistence of Field-Homomorphic
One-Way Permutations,
Ueli Maurer and Dominik Raub (ETH Zürich)
-
Concurrent
Statistical Zero-Knowledge Arguments for NP from
One Way Functions,
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky and
Amit Sahai (UCLA)
-
Anonymous Quantum
Communication,
Gilles Brassard (Université de Montréal)
Anne Broadbent (Université de Montréal),
Joseph Fitzsimons (University of Oxford)
Sébastien Gambs (Université de Montréal),
Alain Tapp (Université de Montréal)
[ Invited Talk II ]
15:40 - 16:40
Session Chair:
Tsuyoshi Takagi
|
December 6th
(Thursday) |
|
[ Session 10. Public Key
Encryption ]
09:00 - 10:15
Session Chair:
Kaoru Kurosawa
-
Miniature CCA2 PK Encryption :
Tight Security Without Redundancy,
Xavier Boyen (Voltage Inc.)
-
Bounded CCA2-Secure Encryption,
Ronald Cramer (CWI & Leiden University)
Goichiro Hanaoka (AIST, Japan)
Dennis Hofheinz (CWI)
Hideki Imai (AIST, Japan)
Eike Kiltz (CWI)
Rafael Pass (Cornell University)
abhi shelat (U. Virginia)
Vinod Vaikuntanathan (MIT)
-
Relations Among Notions of
Non-Malleability for Encryption,
Rafael Pass (Cornell University)
abhi shelat (U. Virginia)
Vinod Vaikuntanathan (MIT)
[ Session 11. Cryptanalysis ]
10:40 - 11:55
Session Chair:
Bart Preneel
-
Cryptanalysis of the Tiger Hash
Function,
Florian Mendel (Institute for Applied Information
Processing and Communications
(IAIK))
Vincent Rijmen (Graz University of Technology,
Austria)
-
Cryptanalysis of
Grindahl,
Best Paper Award
Thomas Peyrin (France Télécom R&D, AIST,
University of Versailles)
-
A Key Recovery Attack on Edon80,
Martin Hell and Thomas Johansson (Lund University,
Sweden)
|
|
|
|
|
|