Program at a glance | Sunday, December 1 -- Reception @ JW Marriott | |||
---|---|---|---|---|
Monday, December 2 |
Tuesday, December 3 |
Wednesday, December 4 |
Thursday, December 5 |
|
Session 1 | Zero-Knowledge | Theoretical Cryptography-II | Message Authentication Codes | Cryptographic Primitives |
Session 2 | Algebraic Cryptography | Symmetric Key Cryptanalysis | Signatures | Cryptanalysis and Passwords |
Session 3 | Theoretical Cryptography-I | invited talk by Lars R. Knudsen | invited talk by George Danezis | Leakage Resilient Cryptography |
Session 4 | Protocols | Symmetric Key Cryptology: Schemes and Analysis | Cryptography Based upon Physical Assumptions | Two-Party Computation |
Session 5 | - | Side-Channel Cryptanalysis | Multi-Party Computation | Hash Functions |
Evening | - | 18:00 -- 19:00 IACR General Meeting 19:30 -- 21:30 Rump Session | 19:30 -- 22:00 Banquet | - |
ASIACRYPT 2013 SCHEDULE | |
Sunday, December 1 | |
Reception: JW Marriott | 19:30 -- 23:00 |
Registration: JW Marriott | 19:00 -- 21:00 |
Monday, December 2 | |
General Chair's Opening Remarks | 08:50 -- 09:00 |
Session 1: Zero-Knowledge Chair: Tanja Lange |
09:00 -- 10:15 |
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces (Best Paper Award) [PPT] |
|
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model [PPT] |
|
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes |
|
Coffee Break | 10:15 -- 10:45 |
Session 2: Algebraic Cryptography Chair: Damien Stehlé |
10:45 -- 12:25 |
Families of fast elliptic curves from Q-curves [PDF] |
|
Four-dimensional GLV via the Weil restriction [PDF] |
|
Discrete Gaussian Leftover Hash Lemma over Infinite Domains [PPT] |
|
New Insight into the Isomorphism of Polynomial Problem IP1S and its Use in Cryptography [PDF] |
|
Lunch Break | 12:25 -- 14:00 |
Session 3: Theoretical Cryptography-I Chair: Helger Lipmaa | 14:00 -- 15:40 |
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited [PDF] |
|
Reset Indifferentiability and its Consequences [PDF] |
|
Computational Fuzzy Extractors [PDF] |
|
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization [PDF] |
|
Coffee Break | 15:40 -- 16:10 |
Session 4: Protocols Chair: Manoj Prabhakaran |
16:10 -- 17:50 |
SPHF-Friendly Non-Interactive Commitments [PDF] |
|
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency [PDF] |
|
Function-Private Subspace-Membership Encryption and Its Applications [PDF] |
|
Random Projections, Graph Sparsification, and Differential Privacy [PDF] |
|
Tuesday, December 3 | |
Session 1: Theoretical Cryptography-II Chair: Shweta Agrawal |
09:00 -- 09:50 |
Notions of Black-Box Reductions, Revisited [PDF] |
|
Adaptive and Concurrent Secure Computation from New Adaptive, Non-Malleable Commitments |
|
Session 2: Symmetric Key Cryptanalysis Chair: Yu Sasaki |
09:50 -- 11:05 |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$ [PDF] |
|
Key Difference Invariant Bias in Block Ciphers |
|
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE [PDF] |
|
Coffee Break | 11:05 -- 11:35 |
Session 3: Invited Talk Chair: Palash Sarkar |
11:35 -- 12:35 |
Block ciphers - past and present |
|
Lunch Break | 12:35 -- 14:00 |
Session 4: Symmetric Key Cryptology: Schemes and Analysis Chair: Nicolas Sendrier |
14:00 -- 15:40 |
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers [PDF] |
|
Parallelizable and Authenticated Online Ciphers [PDF] |
|
How to Construct an Ideal Cipher from a Small Set of Public Permutations [PDF] |
|
Generic Key Recovery Attack on Feistel Scheme |
|
Coffee Break | 15:40 -- 16:10 |
Session 5: Side-Channel Cryptanalysis Chair: Aggelos Kiayias |
16:10 -- 17:25 |
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests |
|
Behind the Scene of Side Channel Attacks [PDF] |
|
SCARE of Secret Ciphers with SPN Structures [PDF] |
|
IACR General Meeting | 18:00 -- 19:00 |
Rump Session | 19:30 -- 21:30 |
Wednesday, December 4 | |
Session 1: Message Authentication Codes Chair: Nadia Heninger |
09:00 -- 09:50 |
New Generic Attacks Against Hash-based MACs [PDF] |
|
Cryptanalysis of HMAC/NMAC-Whirlpool [PDF] |
|
Session 2: Signatures Chair: Serge Vaudenay |
09:50 -- 11:05 |
Lattice-Based Group Signatures with Logarithmic Signature Size [PDF] |
|
The Fiat--Shamir Transformation in a Quantum World [PDF] |
|
On the Security of One-Witness Blind Signature Schemes [PDF] |
|
Coffee Break | 11:05 -- 11:35 |
Session 3: Invited Talk Chair: Kazue Sako |
11:35 -- 12:35 |
Engineering Privacy-Friendly Computations |
|
Lunch Break | 12:35 -- 14:00 |
Session 4: Cryptography Based upon Pysical Assumptions Chair: Moti Yung |
14:00 -- 15:40 |
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions [PDF] |
|
Functional Encryption from (Small) Hardware Tokens |
|
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [PDF] |
|
Tamper Resilient Circuits: The Adversary at the Gates [PDF] |
|
Coffee Break | 15:40 -- 16:10 |
Session 5: Multi-Party Computation Chair: Tatsuaki Okamoto |
16:10 -- 17:25 |
Efficient General-Adversary Multi-Party Computation [PDF] |
|
Fair and Efficient Secure Multiparty Computation with Reputation Systems |
|
Between a Rock and a Hard Place: Interpolating Between MPC and FHE [PPTX] |
|
Banquet | 19:30 -- 22:00 |
Thursday, December 5 | |
Session 1: Cryptographic Primitives Chair: Vipul Goyal | 09:00 -- 10:40 |
Building Lossy Trapdoor Functions from Lossy Encryption [PDF] |
|
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters [PDF] |
|
Constrained Pseudorandom Functions and Their Applications |
|
Fully Homomorphic Message Authenticators [PDF] |
|
Coffee Break | 10:40 -- 11:10 |
Session 2: Cryptanalysis and Passwords Chair: Sanjit Chatterjee |
11:10 -- 12:25 |
Non-uniform cracks in the concrete: the power of free precomputation [PDF] |
|
Naturally Rehearsing Passwords [PPTX] |
|
Factoring RSA keys from certified smart cards: Coppersmith in the wild [PDF] |
|
Lunch Break | 12:25 -- 14:00 |
Session 3: Leakage Resilient Cryptography Chair: Rosario Gennaro |
14:00 -- 14:50 |
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter [PDF] |
|
On Continual Leakage of Discrete Log Representations [PPTX] |
|
Session 4: Two-Party Computation Chair: Arpita Patra |
14:50 -- 15:40 |
Hiding the Input-Size in Secure Two-Party Computation [PDF] |
|
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique [PDF] |
|
Coffee Break | 15:40 -- 16:10 |
Session 5: Hash Functions Chair: Bart Preneel |
16:10 -- 17:50 |
A heuristic for finding compatible differential paths with application to HAS-160 [PDF] |
|
Improved Cryptanalysis of Reduced RIPEMD-160 [PDF] |
|
Limited-birthday Distinguishers for Hash Functions Collisions Beyond the Birthday Bound can be Meaningful [PDF] |
|
On Diamond Structures and Trojan Message Attacks |