CRYPTO 2007

Preliminary Program

All events in Campbell Hall (unless otherwise noted)

Sponsorship:
Student scholarships were funded by Qualcomm.
The Crypto Café was sponsored by the D. E. Shaw group.
Sponsorship for the rump session was received from Jean-Jacques Quisquater.
General support was offered by Inspec.

IACR logo

Sunday, August 19, 2007
17:00   -   20:00 Registration, Anacapa Formal Lounge
  -         (registration continues outside Campbell Hall starting Monday morning)
17:30 - 21:30 Dinner Reception, Anacapa/Santa Cruz Ocean Lawn
Monday, August 20, 2007
07:30   -   08:45 Breakfast - De La Guerra Commons
09:00 - 09:10 Opening Remarks
Markus Jakobsson, General Chair
Session 1     Cryptanalysis I
Chair     Bart Preneel
09:10 - 09:35 Practical Cryptanalysis of SFLASH
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir and Jacques Stern  
09:35 - 10:00 Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Pierre-Alain Fouque, Gaëtan Leurent and Phong Nguyen  
10:00 - 10:30 Morning Break
Session 2     Secure Searching
Chair     Zulfikar Ramzan
10:30 - 10:55 How Should We Solve Search Problems Privately?
Amos Beimel, Tal Malkin, Kobbi Nissim and Enav Weinreb  
10:55 - 11:20 Public Key Encryption that Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky and William Skeith  
Session 3     Invited Talk
Chair     Alfred Menezes
11:20 - 12:20 Information Security Economics - and Beyond
Ross Anderson
12:25 - 13:45 Lunch - De La Guerra Commons
Session 4     Theory I
Chair     Amit Sahai
14:00 - 14:25 Cryptography with Constant Input Locality   Best Paper Award
Benny Applebaum, Yuval Ishai and Eyal Kushilevitz  
14:25 - 14:50 Universally-Composable Two-Party Computation in Two Rounds
Omer Horvitz and Jonathan Katz  
14:50 - 15:15 Indistinguishability Amplification
Ueli Maurer, Krzysztof Pietrzak and Renato Renner  
15:15 - 15:45 Afternoon Break
Session 5     Lattices
Chair     Antoine Joux
15:45 - 16:10 A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
Nick Howgrave-Graham
16:10 - 16:35 Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
Guillaume Hanrot and Damien Stehlé
Session 6     Random Oracles
Chair     Rei Safavi-Naini
16:35 - 17:00 Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer and Stefano Tessaro  
17:00 - 17:25 Random Oracles and Auxiliary Input
Dominique Unruh
TBA - TBA Dinner - Anacapa/Santa Cruz Ocean Lawn
Tuesday, August 21, 2007
07:30   -   08:45 Breakfast - De La Guerra Commons
Session 7     Hash Functions
Chair     Xavier Boyen
09:00 - 09:25 Security-Amplifying Combiners for Collision-Resistant Hash Functions
Marc Fischlin and Anja Lehmann  
09:25 - 09:50 Hash Functions and the (Amplified) Boomerang Attack
Antoine Joux and Thomas Peyrin  
09:50 - 10:15 Amplifying Collision Resistance: A Complexity-Theoretic Treatment
Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan and Hoeteck Wee
10:15 - 10:45 Morning Break
Session 8     Theory II
Chair     Amos Beimel
10:45 - 11:10 How Many Oblivious Transfers are Needed for Secure Multiparty Computation?
Danny Harnik, Yuval Ishai and Eyal Kushilevitz  
11:10 - 11:35 Simulatable VRFs with Applications to Multi-Theorem NIZK
Melissa Chase and Anna Lysyanskaya
11:35 - 12:00 Cryptography in the Multi-String Model
Jens Groth and Rafail Ostrovsky  
12:05 - 13:45 Lunch - De La Guerra Commons
Free Afternoon
Tourism - Santa Ynez Valley Winery Tour
14:00 - 17:00 Birds of a Feather Sessions - See Schedule in Anacapa Lobby
Soccer - Lawn
17:45 - 19:30 Dinner - De La Guerra Commons
Rump Session
Chair     Dan Bernstein
18:45 - 23:00 Snacks and Open Bar - University Center Courtyard
19:30 - 19:40 New IACR Fellows Induction Ceremony - University Center Corwin Pavilion
19:45 - Late Rump Session - University Center Corwin Pavilion
Wednesday, August 22, 2007
07:30   -   08:45 Breakfast - De La Guerra Commons
Session 9     Quantum Cryptography
Chair     Adam Smith
09:00 - 09:25 Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgård, Serge Fehr, Louis Salvail and Christian Schaffner
09:25 - 09:50 A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail and Christian Schaffner
9:50 - 10:20 Morning Break
Session 10     Cryptanalysis II
Chair     Tanja Lange
10:20 - 10:45 Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
Jean-Sébastien Coron
10:45 - 11:10 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N0.073
Ellen Jochemsz and Alexander May
Session 11     Invited Talk
Chair     Kristin Lauter
11:10 - 12:10 Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems
Paul Kocher  
12:05 - 13:45 Lunch - De La Guerra Commons
Session 12     Encryption
Chair     Kaoru Kurosawa
14:00 - 14:25 Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi  
14:25 - 14:50 Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
14:50 - 15:15 Pirate Evolution: How to Make the Most of Your Traitor Keys
Aggelos Kiayias and Serdar Pehlivanoglu
15:15 - 15:45 Afternoon Break
Session 13     Protocol Analysis
Chair     Matt Franklin
15:45 - 16:10 A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R.L. Brown and Kristian Gjøsteen  
16:10 - 16:35 A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré and Bogdan Warinschi
16:35 - 17:00 Chernoff-Type Direct Product Theorems
Russell Impagliazzo, Ragesh Jaiswal and Valentine Kabanets  
IACR Membership Meeting
Chair     Andy Clark, IACR President
17:05 - 17:50 IACR Membership Meeting - Campbell Hall
18:00 - 20:15 Beach Barbecue - Goleta Beach
20:00 - 22:30 Crypto Café - Anacapa Formal Lounge

Sponsored by the D. E. Shaw group
Thursday, August 23, 2007
07:30   -   08:45 Breakfast - De La Guerra Commons
Session 14     Public-Key Encryption
Chair     David Pointcheval
09:00 - 09:25 Rerandomizable RCCA Encryption
Manoj Prabhakaran and Mike Rosulek  
09:25 - 09:50 Deterministic and Efficiently Searchable Encryption
Mihir Bellare, Alexandra Boldyreva and Adam O'Neill
09:50 - 10:15 Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz and Eike Kiltz
10:15 - 10:45 Morning Break
Session 15     Multi-Party Computation
Chair     Rainer Steinwandt
10:45 - 11:10 Scalable and Unconditionally Secure Multiparty Computation  
Ivan Damgård and Jesper Buus Nielsen
11:10 - 11:35 On Secure Multi-Party Computation in Black-Box Groups
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld and Huaxiong Wang
11:35 - 12:00 A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra
Ronald Cramer, Eike Kiltz and Carles Padró
12:00 Conference Adjourns
12:00 - 13:45 Lunch - De La Guerra Commons