-
Opening
Shiho Moriai
Annoucement
-
ProvSec 2010 (slides) (video)
Swee-Huay Heng and Kaoru Kurosawa -
Africacrypt 2010 (slides) (video)
Ismail M. Idris, Dan Bernstein, Tanja Lange and Antoine Joux -
ACISP 2010:Call For Papers (slides) (video)
*Ron Steinfeld -
ICITS 2011 (slides, slides) (video)
Serge Fehr and Yvo Desmedt -
Crypto and Security Project of Strategic Japanese-Indian Cooperative Program on
Multidisciplinary Research Field, which combines Information and Communications Technology with Other Fields
(slides) (video)
Kanta Matsuura, Takashi Nishide, Kouichi Sakurai and Hajime Watanabe -
Asiacrypt 2010 (slides) (video)
San Ling -
Asiacrypt 2011 (slides) (video)
Hyoung Joong Kim and Kwangjo Kim
Technical
-
A Practical-Time Attack on the Encryption Algorithm Used in Third Generation Telephony
Orr Dunkelman, Nathan Keller, and Adi Shamir -
A Pathetic Related-key Attacks Faster than Exhaustive Search
Serge Vaudenay -
Free-start preimages of step-reduced Blake compression function (slides) (video)
Lei Wang, Kazuo Ohta, and Kazuo Sakiyama -
On Hamsi
Jean-Philippe Aumasson, Emilia Käsper, Lars Knudsen, Rune Ødegaard, Thomas Peyrin, and Martin Schläffer -
Memoryless Near-Collisions via Coding Theory (slides) (video)
Mario Lamberger, Florian Mendel, Vincent Rijmen and Koen Simeons -
Efficient Leakage-Resilient Signatures, AKA, and CCA Encryption
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, and Daniel Wichs -
Proxy Re-Encryption from Learning with Errors (slides) (video)
Keita Xagawa and Keisuke Tanaka -
A Story of "United Nations" of Post Quantum Cryptography (slides) (video)
Licheng Wang and Lihua Wang -
Multiparty Secure Computation over Multivariate Polynomials (slides) (video)
Moti Yung, Dana Dachman-Soled, Tal Malkin, and Mariana Raykova -
Concise, uninformative proofs (slides) (video)
Adam Smith -
Some Consequences about Oblivious Polynomial Evaluation from Existence of the Homomorphic and Non-Committing Encryption (slides) (video)
Chunhua Su, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai -
Constructing Full-Homomorphic Encryption Schemes from Coding Theory (slides) (video)
Frederik Armknecht, Daniel Augot, Ludovic Perret, and Ahmad-Reza Sadeghi
-
Closing