Program
Welcome reception and all technical sessions will be held at the Merchant Court Ballroom. PDF version of the program is available.
Sunday, December 5 | |
17:30 – 20:30 | Registration |
18:30 – 20:30 | Welcome Reception (Merchant Court Ballroom, Section B) |
Monday, December 6 | |
08:00 – 09:00 | Registration |
09:00 – 09:15 | Welcome and Opening Remarks |
09:15 – 10:30 | Session 1: Hash Attacks (I) (Chair: Mitsuru Matsui) |
Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger |
|
Finding Second Preimages of Short Messages for Hamsi-256 Thomas Fuhr |
|
Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama and Kazuo Ohta |
|
10:30 – 11:00 | Morning Break |
11:00 – 12:00 | Invited Talk 1: Bart Preneel (Chair: Masayuki Abe) Cryptographic Hash Functions and the SHA-3 Competition |
12:00 – 13:40 | Lunch |
13:40 – 14:30 | Session 2: Hash Attacks (II) (Chair: Francois-Xavier Standaert) |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo, San Ling, Christian Rechberger and Huaxiong Wang |
|
Collision Attacks against the Knudsen-Preneel Compression Functions Onur Özen and Martijn Stam |
|
14:30 – 15:20 | Session 3: Symmetric-Key Cryptosystems (Chair: Hongjun Wu) |
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Emmanuel Volte, Valerie Nachef and Jacques Patarin |
|
The World is Not Enough: Another Look on Second-Order DPA Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper and Stefan Mangard |
|
15:20 – 15:45 | Afternoon Break |
15:45 – 17:00 | Session 4: Block and Stream Ciphers (Chair: Claude Carlet) |
Conditional Differential Cryptanalysis of NLFSR-based Cryptosystems Simon Knellwolf, Willi Meier and Maria Naya-Plasencia |
|
A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng |
|
Improved Single-Key Attacks on 8-round AES-192 and AES-256 Orr Dunkelman, Nathan Keller and Adi Shamir |
|
18:30 – 21:30 | Asiacrypt Steering Committee Meeting (Rosewood Room) |
Tuesday, December 7 | |
08:30 – 09:00 | Registration |
09:00 – 10:15 | Session 5: Protocols (Chair: Dong-Hoon Lee) |
Constant-Size Commitments to Polynomials and Their Applications Aniket Kate, Gregory M. Zaverucha and Ian Goldberg |
|
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay and Tomas Toft |
|
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro, Jihye Kim and Gene Tsudik |
|
10:15 – 10:40 | Morning Break |
10:40 – 11:30 | Session 6: Key Exchange (Chair: Serge Vaudenay) |
Generic Compilers for Authenticated Key Exchange Tibor Jager, Florian Kohlar, Sven Schäge and Jörg Schwenk |
|
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT Eric Brier and Thomas Peyrin |
|
11:30 – 12:30 | Invited Talk 2: Hugo Krawczyk (Chair: Serge Vaudenay) Cryptography, from Theory to Practice: A Personal Perspective |
12:30 – 14:00 | Lunch |
14:00 – 18:00 | Guided Excursion (Optional) |
19:00 – 22:00 | Rump Session (Merchant Court Ballroom) |
Wednesday, December 8 | |
08:30 – 09:00 | Registration |
09:00 – 10:15 | Session 7: Foundation (Chair: Hugo Krawczyk) |
Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu and Bo-Yin Yang |
|
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger |
|
Random Oracles With(out) Programmability Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam and Stefano Tessaro |
|
10:15 – 10:45 | Morning Break |
10:45 – 12:00 | Session 8: Zero-Knowledge (Chair: Payman Mohassel) |
Short Pairing-based Non-interactive Zero-Knowledge Arguments Jens Groth |
|
Short Non-interactive Zero-Knowledge Proofs Jens Groth |
|
Optimistic Concurrent Zero Knowledge Alon Rosen and abhi shelat |
|
12:00 – 13:30 | Lunch |
13:30 – 14:45 | Session 9: Lattice-Based Cryptography (Chair: Willy Susilo) |
Faster Fully Homomorphic Encryption Damien Stehlé and Ron Steinfeld |
|
A Group Signature Scheme from Lattice Assumptions Dov Gordon, Jonathan Katz and Vinod Vaikuntanathan |
|
Lattice-based Blind Signatures Markus Rückert |
|
14:45 – 15:10 | Afternoon Break |
15:10 – 16:50 | Session 10: Secure Communication and Computation (Chair: Huaxiong Wang) |
The Round Complexity of Verifiable Secret Sharing: The Statistical Case Ranjit Kumaresan, Arpita Patra and C. Pandu Rangan |
|
General Perfectly Secure Message Transmission Using Linear Codes Qiushi Yang and Yvo Desmedt |
|
On Invertible Sampling and Adaptive Security Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi and Amit Sahai |
|
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition Chao Ning and Qiuliang Xu |
|
17:00 – 18:00 | IACR Membership Meeting (Merchant Court Ballroom) |
18:30 – 21:30 | Conference Banquet at Grand Shanghai Restaurant (Shuttle buses to and from the banquet venue will be provided) |
Thursday, December 9 | |
08:30 – 09:00 | Registration |
09:00 – 10:15 | Session 11: Models, Notions and Assumptions (Chair: Rei Safavi-Naini) |
A Closer Look at Anonymity and Robustness in Encryption Schemes Payman Mohassel |
|
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn, Hovav Shacham and David Mandell Freeman |
|
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography Tibor Jager and Andy Rupp |
|
10:15 – 10:40 | Morning Break |
10:40 – 12:20 | Session 12: Public-Key Encryption (Chair: San Ling) |
The Degree of Regularity of HFE Systems |
|
Structured Encryption and Controlled Disclosure |
|
Leakage Resilient ElGamal Encryption Eike Kiltz and Krzysztof Pietrzak |
|
Efficient Public-Key Cryptography in the Presence of Key Leakage |
|
12:20 – 12:30 | Closing Remarks |
12:30 – 14:00 | Lunch |