Main Page | Call for Papers | Contact Info | Program | Local Info | Registration | Rump Session | BoFs |
CRYPTO 2005ProgramPreliminary - subject to change |
Sunday, August 14, 2005 | ||||
17:00 | - | 20:00 | Registration, Anacapa Formal Lounge | |
17:30 | - | 21:30 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn | |
Monday, August 15, 2005 | ||||
09:00 | - | 09:10 | Opening Remarks | |
Stuart Haber, General Chair | ||||
Session 1 | Hash Functions | |||
Chair | Victor Shoup | |||
09:10 | - | 09:35 | Efficient Collision Search Attacks on SHA-0 | |
Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin | ||||
09:35 | - | 10:00 | Finding Collisions in the Full SHA-1 | |
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu | ||||
10:00 | - | 10:30 | Morning Break | |
Session 2 | Theory | |||
Chair | Stanislaw Jarecki | |||
10:30 | - | 10:55 | Pebbling and Proofs of Work | |
Cynthia Dwork, Moni Naor, and Hoeteck Wee | ||||
10:55 | - | 11:20 | Composition Does Not Imply Adaptive Security | |
Krzysztof Pietrzak | Presentation | |||
Session 3 | IACR Distinguished Lecture | |||
Chair | Andrew Clark | |||
11:20 | - | 12:20 | The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology | |
Ralph Merkle | ||||
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
Session 4 | Cryptanalysis | |||
Chair | Arjen Lenstra | |||
14:00 | - | 14:25 | On the Discrete Logarithm Problem on Algebraic Tori | |
Robert Granger and Fréderik Vercauteren | Presentation | |||
14:25 | - | 14:50 | A Practical Attack on a Braid Group Based Cryptographic Protocol | |
Alexei Myasnikov, Vladimir Shpilrain, and Alexander Ushakov | ||||
14:50 | - | 15:15 | The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption | |
Yi Lu, Willi Meier, and Serge Vaudenay | Presentation | |||
15:15 | - | 15:45 | Afternoon Break | |
Session 5 | Zero Knowledge | |||
Chair | Louis Salvail | |||
15:45 | - | 16:10 | Unconditional Characterizations of Non-Interactive Zero-Knowledge | |
Rafael Pass and abhi shelat | ||||
16:10 | - | 16:35 | Impossibility and Feasibility Results for Zero Knowledge with Public Keys | |
Joël Alwen, Giuseppe Persiano, and Ivan Visconti | Presentation | |||
16:35 | - | 17:00 | Communication-Efficient Non-Interactive Proofs of Knowledge with Online Extractors | |
Marc Fischlin | ||||
Nightlife | ||||
19:00 | - | 22:00 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn | |
Tuesday, August 16, 2005 | ||||
Session 6 | Anonymity | |||
Chair | Alice Silverberg | |||
09:00 | - | 09:25 | A Formal Treatment of Onion Routing | |
Jan Camenisch and Anna Lysyanskaya | ||||
09:25 | - | 09:50 | Simple and Efficient Shuffling with Provable Correctness and ZK Privacy | |
Kun Peng, Colin Boyd, and Ed Dawson | ||||
09:50 | - | 10:15 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | |
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi | Presentation | |||
10:15 | - | 10:45 | Morning Break | |
Session 7 | Privacy | |||
Chair | Jonathan Katz | |||
10:45 | - | 11:10 | Private Searching on Streaming Data | |
Rafail Ostrovsky and William Skeith | ||||
11:10 | - | 11:35 | Privacy-Preserving Set Operations | |
Lea Kissner and Dawn Song | Presentation | |||
Session 8 | Broadcast Encryption | |||
Chair | Alexandra Boldyreva | |||
11:35 | - | 12:00 | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | |
Dan Boneh, Craig Gentry, and Brent Waters | ||||
12:00 | - | 12:25 | Generic Transformation for Scalable Broadcast Encryption Schemes | |
Jung Yeon Hwang, Dong Hoon Lee, and Jongin Lim | Presentation | |||
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
Free Afternoon | ||||
Tourism - Santa Barbara | ||||
14:00 | - | 17:00 | Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby | |
Soccer - Lawn | ||||
17:45 | - | 19:30 | Dinner - DeLaGuerra Commons | |
Rump Session | ||||
Chair | Phong Nguyen | |||
19:30 | - | 23:00 | Snacks and Open Bar - University Center | |
19:30 | - | Late | Rump Session - University Center | |
Wednesday, August 17, 2005 | ||||
Session 9 | Human-oriented Cryptography | |||
Chair | Leonid Reyzin | |||
09:00 | - | 09:25 | Authenticating Pervasive Devices with Human Protocols | |
Ari Juels and Stephen A. Weis | Presentation | |||
09:25 | - | 09:50 | Secure Communications over Insecure Channels Based on Short Authenticated Strings | |
Serge Vaudenay | Presentation | |||
09:50 | - | 10:20 | Morning Break | |
Session 10 | Secret Sharing | |||
Chair | Amos Beimel | |||
10:20 | - | 10:45 | On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes | |
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimégnez Urroz, Gregor Leander, Jaume Martí-Farré, and Carles Padró | Presentation | |||
10:45 | - | 11:10 | Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | |
Ronald Cramer, Serge Fehr, and Martijn Stam | Presentation | |||
Session 11 | Invited Talk | |||
Chair | Victor Shoup | |||
11:10 | - | 12:10 | Bilinear Maps in Cryptography | |
Dan Boneh | ||||
12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
Session 12 | Multi-party Computation | |||
Chair | Rebecca Wright | |||
14:00 | - | 14:25 | Secure Computation without Authentication | |
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, and Tal Rabin | ||||
14:25 | - | 14:50 | Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator | |
Ivan Damgård and Yuval Ishai | Presentation | |||
14:50 | - | 15:15 | Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems | |
Omer Barkol and Yuval Ishai | Presentation | |||
15:15 | - | 15:45 | Afternoon Break | |
Session 13 | Random Oracles | |||
Chair | Craig Gentry | |||
15:45 | - | 16:10 | Analysis of Random Oracle Instantiation Scenarios for OAEP and other Practical Schemes | |
Alexandra Boldyreva and Marc Fischlin | ||||
16:10 | - | 16:35 | Merkle-Damgård Revisited : How to Construct a Hash Function | |
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, and Prashant Puniya | Presentation | |||
16:35 | - | 17:00 | On the Generic Insecurity of the Full-Domain Hash | |
Yevgeniy Dodis, Roberto Oliveira, and Krzysztof Pietrzak | ||||
IACR Business Meeting | ||||
Chair | Andrew Clark, IACR President | |||
17:05 | - | 17:50 | IACR Membership meeting - Campbell Hall | |
Nightlife | ||||
18:00 | - | 20:15 | Beach Barbecue - Goleta Beach | |
20:00 | - | 22:30 | Crypto Café - Santa Cruz Formal Lounge | |
Thursday, August 18, 2005 | ||||
Session 14 | Information Theoretic Security | |||
Chair | Ilya Mironov | |||
09:00 | - | 09:25 | New Monotones and Lower Bounds in Unconditional Two-Party Computation | |
Stefan Wolf and Juerg Wullschleger | ||||
09:25 | - | 09:50 | One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption | |
Thomas Holenstein and Renato Renner | Presentation | |||
09:50 | - | 10:15 | A Quantum Cipher with Near Optimal Key-Recycling | |
Ivan Damgård, Thomas B. Pedersen, and Louis Salvail | Presentation | |||
10:15 | - | 10:45 | Morning Break | |
Session 15 | Primitives and Protocols | |||
Chair | Moni Naor | |||
10:45 | - | 11:10 | An Efficient CDH-based Signature Scheme with a Tight Security Reduction | |
Benoît Chevallier-Mames | Presentation | |||
11:10 | - | 11:35 | Improved Security Analyses for CBC MACs | |
Mihir Bellare, Krzysztof Pietrzak, and Phillip Rogaway | Presentation | |||
11:35 | - | 12:00 | HMQV: A High-Performance Secure Diffie-Hellman Protocol | |
Hugo Krawczyk | Presentation | |||
12:00 | Conference Adjourns | |||
12:15 | - | 13:30 | Lunch - DeLaGuerra Commons |