CRYPTO 2007Preliminary ProgramAll events in Campbell Hall (unless otherwise noted)
|
Sunday, August 19, 2007 | ||||
17:00 | - | 20:00 | Registration, Anacapa Formal Lounge | |
- | (registration continues outside Campbell Hall starting Monday morning) | |||
17:30 | - | 21:30 | Dinner Reception, Anacapa/Santa Cruz Ocean Lawn | |
Monday, August 20, 2007 | ||||
07:30 | - | 08:45 | Breakfast - De La Guerra Commons | |
09:00 | - | 09:10 | Opening Remarks | |
Markus Jakobsson, General Chair | ||||
Session 1 | Cryptanalysis I | |||
Chair | Bart Preneel | |||
09:10 | - | 09:35 | Practical Cryptanalysis of SFLASH | |
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir and Jacques Stern | ||||
09:35 | - | 10:00 | Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | |
Pierre-Alain Fouque, Gaëtan Leurent and Phong Nguyen | ||||
10:00 | - | 10:30 | Morning Break | |
Session 2 | Secure Searching | |||
Chair | Zulfikar Ramzan | |||
10:30 | - | 10:55 | How Should We Solve Search Problems Privately? | |
Amos Beimel, Tal Malkin, Kobbi Nissim and Enav Weinreb | ||||
10:55 | - | 11:20 | Public Key Encryption that Allows PIR Queries | |
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky and William Skeith | ||||
Session 3 | Invited Talk | |||
Chair | Alfred Menezes | |||
11:20 | - | 12:20 | Information Security Economics - and Beyond | |
Ross Anderson | ||||
12:25 | - | 13:45 | Lunch - De La Guerra Commons | |
Session 4 | Theory I | |||
Chair | Amit Sahai | |||
14:00 | - | 14:25 | Cryptography with Constant Input Locality Best Paper Award | |
Benny Applebaum, Yuval Ishai and Eyal Kushilevitz | ||||
14:25 | - | 14:50 | Universally-Composable Two-Party Computation in Two Rounds | |
Omer Horvitz and Jonathan Katz | ||||
14:50 | - | 15:15 | Indistinguishability Amplification | |
Ueli Maurer, Krzysztof Pietrzak and Renato Renner | ||||
15:15 | - | 15:45 | Afternoon Break | |
Session 5 | Lattices | |||
Chair | Antoine Joux | |||
15:45 | - | 16:10 | A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU | |
Nick Howgrave-Graham | ||||
16:10 | - | 16:35 | Improved Analysis of Kannan's Shortest Lattice Vector Algorithm | |
Guillaume Hanrot and Damien Stehlé | ||||
Session 6 | Random Oracles | |||
Chair | Rei Safavi-Naini | |||
16:35 | - | 17:00 | Domain Extension of Public Random Functions: Beyond the Birthday Barrier | |
Ueli Maurer and Stefano Tessaro | ||||
17:00 | - | 17:25 | Random Oracles and Auxiliary Input | |
Dominique Unruh | ||||
TBA | - | TBA | Dinner - Anacapa/Santa Cruz Ocean Lawn | |
Tuesday, August 21, 2007 | ||||
07:30 | - | 08:45 | Breakfast - De La Guerra Commons | |
Session 7 | Hash Functions | |||
Chair | Xavier Boyen | |||
09:00 | - | 09:25 | Security-Amplifying Combiners for Collision-Resistant Hash Functions | |
Marc Fischlin and Anja Lehmann | ||||
09:25 | - | 09:50 | Hash Functions and the (Amplified) Boomerang Attack | |
Antoine Joux and Thomas Peyrin | ||||
09:50 | - | 10:15 | Amplifying Collision Resistance: A Complexity-Theoretic Treatment | |
Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan and Hoeteck Wee | ||||
10:15 | - | 10:45 | Morning Break | |
Session 8 | Theory II | |||
Chair | Amos Beimel | |||
10:45 | - | 11:10 | How Many Oblivious Transfers are Needed for Secure Multiparty Computation? | |
Danny Harnik, Yuval Ishai and Eyal Kushilevitz | ||||
11:10 | - | 11:35 | Simulatable VRFs with Applications to Multi-Theorem NIZK | |
Melissa Chase and Anna Lysyanskaya | ||||
11:35 | - | 12:00 | Cryptography in the Multi-String Model | |
Jens Groth and Rafail Ostrovsky | ||||
12:05 | - | 13:45 | Lunch - De La Guerra Commons | |
Free Afternoon | ||||
Tourism - Santa Ynez Valley Winery Tour | ||||
14:00 | - | 17:00 | Birds of a Feather Sessions - See Schedule in Anacapa Lobby | |
Soccer - Lawn | ||||
17:45 | - | 19:30 | Dinner - De La Guerra Commons | |
Rump Session | ||||
Chair | Dan Bernstein | |||
18:45 | - | 23:00 | Snacks and Open Bar - University Center Courtyard | |
19:30 | - | 19:40 | New IACR Fellows Induction Ceremony - University Center Corwin Pavilion | |
19:45 | - | Late | Rump Session - University Center Corwin Pavilion | |
Wednesday, August 22, 2007 | ||||
07:30 | - | 08:45 | Breakfast - De La Guerra Commons | |
Session 9 | Quantum Cryptography | |||
Chair | Adam Smith | |||
09:00 | - | 09:25 | Secure Identification and QKD in the Bounded-Quantum-Storage Model | |
Ivan Damgård, Serge Fehr, Louis Salvail and Christian Schaffner | ||||
09:25 | - | 09:50 | A Tight High-Order Entropic Quantum Uncertainty Relation With Applications | |
Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail and Christian Schaffner | ||||
9:50 | - | 10:20 | Morning Break | |
Session 10 | Cryptanalysis II | |||
Chair | Tanja Lange | |||
10:20 | - | 10:45 | Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach | |
Jean-Sébastien Coron | ||||
10:45 | - | 11:10 | A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N0.073 | |
Ellen Jochemsz and Alexander May | ||||
Session 11 | Invited Talk | |||
Chair | Kristin Lauter | |||
11:10 | - | 12:10 | Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems | |
Paul Kocher | ||||
12:05 | - | 13:45 | Lunch - De La Guerra Commons | |
Session 12 | Encryption | |||
Chair | Kaoru Kurosawa | |||
14:00 | - | 14:25 | Invertible Universal Hashing and the TET Encryption Mode | |
Shai Halevi | ||||
14:25 | - | 14:50 | Reducing Trust in the PKG in Identity Based Cryptosystems | |
Vipul Goyal | ||||
14:50 | - | 15:15 | Pirate Evolution: How to Make the Most of Your Traitor Keys | |
Aggelos Kiayias and Serdar Pehlivanoglu | ||||
15:15 | - | 15:45 | Afternoon Break | |
Session 13 | Protocol Analysis | |||
Chair | Matt Franklin | |||
15:45 | - | 16:10 | A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator | |
Daniel R.L. Brown and Kristian Gjøsteen | ||||
16:10 | - | 16:35 | A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness | |
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré and Bogdan Warinschi | ||||
16:35 | - | 17:00 | Chernoff-Type Direct Product Theorems | |
Russell Impagliazzo, Ragesh Jaiswal and Valentine Kabanets | ||||
IACR Membership Meeting | ||||
Chair | Andy Clark, IACR President | |||
17:05 | - | 17:50 | IACR Membership Meeting - Campbell Hall | |
18:00 | - | 20:15 | Beach Barbecue - Goleta Beach | |
20:00 | - | 22:30 | Crypto Café - Anacapa Formal Lounge Sponsored by the D. E. Shaw group | |
Thursday, August 23, 2007 | ||||
07:30 | - | 08:45 | Breakfast - De La Guerra Commons | |
Session 14 | Public-Key Encryption | |||
Chair | David Pointcheval | |||
09:00 | - | 09:25 | Rerandomizable RCCA Encryption | |
Manoj Prabhakaran and Mike Rosulek | ||||
09:25 | - | 09:50 | Deterministic and Efficiently Searchable Encryption | |
Mihir Bellare, Alexandra Boldyreva and Adam O'Neill | ||||
09:50 | - | 10:15 | Secure Hybrid Encryption from Weakened Key Encapsulation | |
Dennis Hofheinz and Eike Kiltz | ||||
10:15 | - | 10:45 | Morning Break | |
Session 15 | Multi-Party Computation | |||
Chair | Rainer Steinwandt | |||
10:45 | - | 11:10 | Scalable and Unconditionally Secure Multiparty Computation | |
Ivan Damgård and Jesper Buus Nielsen | ||||
11:10 | - | 11:35 | On Secure Multi-Party Computation in Black-Box Groups | |
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld and Huaxiong Wang | ||||
11:35 | - | 12:00 | A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra | |
Ronald Cramer, Eike Kiltz and Carles Padró | ||||
12:00 | Conference Adjourns | |||
12:00 | - | 13:45 | Lunch - De La Guerra Commons |