CRYPTO 2004Program |
All events are in Campbell Hall (unless otherwise noted).
Sunday, | August 15, 2004 | ||
17:00 | - | 20:00 | Registration, Santa Cruz Formal Lounge |
17:30 | - | 21:30 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn |
Monday, | August 16, 2004 | ||
9:00 | - | 9:10 | Opening Remarks |
Jim Hughes, General Chair | |||
Session 1: |
Linear Cryptanalysis Chair: Willi Meier |
||
9:10 | - | 9:35 | On Multiple Linear Approximations |
Alex Biryukov, Christophe De Cannière and Michaël Quisquater | |||
9:35 | - | 10:00 | Feistel Schemes and Bi-linear Cryptanalysis |
Nicolas T. Courtois | |||
10:00 | - | 10:30 | Morning Break |
Session 2: |
Group Signatures Chair: Tal Malkin |
||
10:30 | - | 10:55 | Short Group Signatures |
Dan Boneh, Xavier Boyen and Hovav Shacham | |||
10:55 | - | 11:20 | Signature Schemes and Anonymous Credentials from Bilinear Maps |
Jan Camenisch and Anna Lysyanskaya | |||
Session 3: |
Invited Talk Chair: Matt Franklin |
||
11:20 | - | 12:20 | 14 Years of Chosen Ciphertext Security: A Survey of Public Key Encryption |
Victor Shoup | |||
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
Session 4: |
Foundations Chair: Rafail Ostrovsky |
||
14:00 | - | 14:25 | Complete Classification of Bilinear Hard-Core Functions |
Thomas Holenstein, Ueli Maurer and Johan Sjödin | |||
14:25 | - | 14:50 | Finding Collisions on a Public Road, or Do Secure Hash Fuctions Need Secret Coins? |
Chun-Yuan Hsiao and Leonid Reyzin | |||
14:50 | - | 15:15 | Security of Random Feistel Schemes with 5 or more rounds |
Jacques Patarin | |||
15:15 | - | 15:45 | Afternoon Break |
Session 5: |
Efficient Representations Chair: Alice Silverberg |
||
15:45 | - | 16:10 | Signed Binary Representations Revisited |
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn and Tsuyoshi Takagi | |||
16:10 | - | 16:35 | Compressed Pairings |
Michael Scott and Paulo S. L. M. Barreto | |||
16:35 | - | 17:00 | Asymptotically Optimal Communication for Torus-Based Cryptography |
Marten van Dijk and David Woodruff | |||
17:00 | - | 17:25 | How to Compress Rabin Ciphertexts and Signatures (and More) |
Craig Gentry | |||
19:00 | - | 22:00 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn |
Tuesday | August 17, 2004 | ||
Session 6: |
Public Key Cryptanalysis Chair: Pil Joong Lee |
||
9:00 | - | 9:25 | On the Bounded Sum-of-digits Discrete Logarithm Problem in Finite Fields |
Qi Cheng | |||
9:25 | - | 9:50 | Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring |
Alexander May | |||
9:50 | - | 10:20 | Morning Break |
Session 7: |
Zero-Knowledge Chair: Daniele Micciancio |
||
10:20 | - | 10:45 | Multi-trapdoor Commitments and their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-middle Attacks |
Rosario Gennaro | |||
10:45 | - | 11:10 | Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model |
Giovanni Di Crescenzo, Giuseppe Persiano and Ivan Visconti | |||
11:10 | - | 11:35 | Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks |
Ivan Damgård, Serge Fehr and Louis Salvail | |||
11:35 | - | 12:00 | The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols |
Mihir Bellare and Adriana Palacio | |||
IACR Fellows Ceremony Chair: Andy Clark, IACR President |
|||
12:00 | - | 12:15 | IACR Fellows Ceremony - Campbell Hall |
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
Free Afternoon | |||
Tourism - Santa Barbara | |||
14:00 | - | 17:00 | Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby |
Soccer - Lawn | |||
Rump Session Chair: Stuart Haber |
|||
18:30 | - | 23:00 | Buffet and Open Bar - University Center |
19:00 | - | Late | Rump Session - University Center |
Wednesday | August 18, 2004 | ||
Session 8: |
Hash Collisions Chair: Ilya Mironov |
||
9:00 | - | 9:25 | Near-Collisions of SHA-0 |
Eli Biham and Rafi Chen | |||
9:25 | - | 9:50 | Multicollisions in iterated hash functions. Application to cascaded constructions |
Antoine Joux | |||
9:50 | - | 10:20 | Morning Break |
Session 9: |
Secure Computation Chair: Phil MacKenzie |
||
10:20 | - | 10:45 | Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography |
Masayuki Abe and Serge Fehr | |||
10:45 | - | 11:10 | Round-Optimal Secure Two-Party Computation |
Jonathan Katz and Rafail Ostrovsky | |||
Session 10: |
Invited Talk Chair: Bart Preneel |
||
11:10 | - | 12:10 | Security, Liberty, and Electronic Communications |
Susan Landau | |||
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
Session 11: |
Stream Cipher Cryptanalysis Chair: Anne Canteaut |
||
14:00 | - | 14:25 | An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators |
Håvard Molland and Tor Helleseth | |||
14:25 | - | 14:50 | Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers |
Philip Hawkes and Gregory G. Rose | |||
14:50 | - | 15:15 | Faster Correlation Attack on Bluetooth Keystream Generator E0 |
Yi Lu and Serge Vaudenay | |||
15:15 | - | 15:45 | Afternoon Break |
Session 12: |
Public Key Encryption Chair: Yevgeniy Dodis |
||
15:45 | - | 16:10 | A New Paradigm of Hybrid Encryption Scheme |
Kaoru Kurosawa and Yvo Desmedt | |||
16:10 | - | 16:35 | Secure Identity Based Encryption Without Random Oracles |
Dan Boneh and Xavier Boyen | |||
Session 13: |
Bounded Storage Model Chair: Jee Hea An |
||
16:35 | - | 17:00 | Non-Interactive Timestamping in the Bounded Storage Model |
Tal Moran, Ronen Shaltiel and Amnon Ta-Shma | |||
IACR Business Meeting Chair: Andy Clark, IACR President |
|||
17:05 | - | 17:50 | IACR Membership meeting - Campbell Hall |
18:00 | - | 20:30 | Beach Barbecue - Goleta Beach |
20:00 | - | 22:30 | Crypto Café - Santa Cruz Formal Lounge |
Thursday | August 19, 2004 | ||
Session 14: |
Key Management Chair: John Black |
||
9:00 | - | 9:25 | IPAKE: Isomorphisms for Password-based Authenticated Key Exchange |
Dario Catalano, David Pointcheval and Thomas Pornin | |||
9:25 | - | 9:50 | Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes |
Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk and Tal Rabin | |||
9:50 | - | 10:15 | Efficient Tree-Based Revocation in Groups of Low-State Devices |
Michael T. Goodrich, Jonathan Z. Sun and Roberto Tamassia | |||
10:15 | - | 10:45 | Morning Break |
Session 15: |
Computationally Unbounded Adversaries Chair: Yuval Ishai |
||
10:45 | - | 11:10 | Privacy-Preserving Datamining on Vertically Partitioned Databases |
Cynthia Dwork and Kobbi Nissim | |||
11:10 | - | 11:35 | Optimal Perfectly Secure Message Transmission |
K. Srinathan, Arvind Narayanan and C. Pandu Rangan | |||
11:35 | - | 12:00 | Pseudo-signatures, broadcast, and multi-party computation from correlated randomness |
Matthias Fitzi, Stefan Wolf and Juerg Wullschleger | |||
12:00 | Conference Adjourns | ||
12:15 | - | 13:30 | Lunch - DeLaGuerra Commons |