Program |
Sunday, August 19 Reception Dinner @ Anacapa Lawn |
|||
Monday August 20 |
Tuesday August 21 |
Wednesday August 22 |
Thursday August 23 |
|
Morning I |
||||
|
||||
Afternoon I |
|
|||
Afternoon II |
||||
Free Time |
||||
IACR Membership
Meeting |
||||
Evening |
|
|
Barbeque Crypto Café |
Sunday, August 19,
2012
17:00 - 20:00: Registration, Anacapa Formal Lounge
17:30 - 21:30: Reception Dinner, Anacapa/Santa Cruz Ocean Lawn
Monday, August 20,
2012
Top
7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons
9:00 - 9:10: General Chair's Opening Remarks
9:10 - 10:50: Session 1 — Symmetric cryptosystems
ˇ
9:10 - 9:30: An Enciphering Scheme Based
on a Card Shuffle
Viet Tung Hoang,
Ben Morris, Phillip Rogaway
ˇ
9:30 - 9:50: Tweakable Blockciphers with
Beyond Birthday-Bound Security
Will Landecker,
Thomas Shrimpton, Seth Terashima
ˇ
9:50 - 10:10: Breaking and Repairing GCM
Security Proofs
Tetsu Iwata, Keisuke
Ohashi, Kazuhiko Minematsu
ˇ
10:10 - 10:30: On the Distribution of
Linear Biases: Three Instructive Examples
Mohamed Ahmed
Abdelraheem, Martin Ĺgren, Peter Beelen, Gregor Leander
ˇ
10:30 – 10:50: Substitution-Permutation
Networks, Pseudorandom Functions, and Natural Proofs
Eric Miles,
Emanuele Viola
Coffee Break
11:20 - 12:20: Invited Talk 1 — The End of Crypto
Jonathan Zittrain,
12:30 - 13:45: Lunch, De La Guerra Dining Commons
14:00 - 15:20: Session 2 — Secure
Computation I
ˇ
14:00 - 14:20: Must You Know the Code of f
to Securely Compute f?
Mike Rosulek
ˇ
14:20 - 14:40: Adaptively Secure
Multi-Party Computation with Dishonest Majority
Sanjam Garg,
Amit Sahai
ˇ
14:40 - 15:00: Collusion-Preserving
Computation
Joel Alwen,
Jonathan Katz, Ueli Maurer, Vassilis Zikas
ˇ
15:00 - 15:20: Secret Sharing Schemes for
Very Dense Graphs
Amos Beimel,
Oriol Farras, Yuval Mintz
Coffee Break
15:50 - 17:10: Session 3 — Attribute-based and
Functional Encryption
ˇ
15:50 - 16:10: Functional Encryption with
Bounded Collusions via Multi-Party Computation
Sergey
Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
ˇ
16:10 - 16:30: New Proof Methods for
Attribute-Based Encryption: Achieving Full Security through Selective
Techniques
Allison Lewko
and Brent Waters
ˇ
16:30 - 16:50: Dynamic Credentials and
Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai,
Hakan Seyalioglu, Brent Waters
ˇ
16:50 - 17:10: Functional Encryption for
Regular Languages
Brent Waters
19:00 - 21:00: Dinner, Anacapa/Santa Cruz Ocean Lawn
Tuesday, August
21, 2012
Top
7:30-8:45 Breakfast,
De La Guerra Dining Commons & Carrillo
Commons
9:00 - 9:40: Session 4 — Proof
Systems
ˇ
9:00 - 9:20: Secure Database Commitments
and Universal Arguments of Quasi Knowledge
Melissa Chase,
Ivan Visconti
ˇ
9:20 - 9:40: Succinct Arguments from
Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky, Alessandro
Chiesa
9:40 - 10:40: Session 5 —
Protocols
ˇ
9:40 - 10:00: On the Security of TLS-DHE
in the Standard Model
Tibor Jager,
Florian Kohlar, Sven Schäge, Jörg Schwenk
ˇ
10:00 – 10:20: Semantic
Security for the Wiretap Channel
Mihir Bellare, Stefano
Tessaro, Alexander Vardy
ˇ
10:20 - 10:40: Multi-Instance Security and
its Application to Password-Based Cryptography
Mihir Bellare,
Thomas Ristenpart, Stefano Tessaro
Coffee Break
11:10 - 12:30: Session 6 — Hash
Functions
ˇ
11:10 - 11:30: Hash Functions Based on
Three Permutations: A Generic Security Analysis
Bart Mennink,
Bart Preneel
ˇ
11:30 - 11:50: To Hash or Not to Hash
Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis,
Thomas Ristenpart, John Steinberger, Stefano Tessaro
ˇ
11:50 - 12:10: New Preimage Attacks
Against Reduced SHA-1
Simon
Knellwolf, Dmitry Khovratovich
ˇ
12:10 - 12:30: Stam’s Conjecture and
Threshold Phenomena in Collision Resistance
John
Steinberger, Xiaoming Sun, Zhe Yang
12:30 - 13:45: Lunch, De La Guerra Dining Commons
14:00 - 15:00: Session 7 —
Composable Security
ˇ
14:00 - 14:20: Universal Composability
from Essentially any Trusted Setup
Mike Rosulek
ˇ
14:20 - 14:40:
- Impossibility Results for Static Input Secure
Computation
Sanjam Garg,
Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
- New Impossibility Results for Concurrent Composition and
a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal,
Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
ˇ
14:40 - 15:00: Black-Box Constructions of
Composable Protocols without Set-Up
Huijia Rachel
Lin, Rafael Pass
Coffee Break
15:15 - 16:30: Tutorial — Pinning Down "Privacy" in Statistical
Databases
Adam Smith.
18:00-23:00: Dinner and Rump Session, UCEN
(Rump session starts at 19:30.)
Wednesday, August
22, 2012
Top
7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons
9:00 - 9:40: Session 8 — Privacy
ˇ
9:00 - 9:20: Crowd-Blending Privacy
Johannes
Gehrke, Michael Hay, Edward Lui,
ˇ
9:20 - 9:40: Differential Privacy with
Imperfect Randomness
Yevgeniy Dodis,
Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
9:40 - 10:40: Session 9 — Leakage and Side-Channels
ˇ
9:40 - 10:00: Tamper and Leakage
Resilience in the Split-State Model
Feng-Hao Liu,
Anna Lysyanskaya
ˇ
10:00 - 10:20: Securing Circuits Against
Constant-Rate Tampering
Dana Dachman-Soled,
Yael Tauman Kalai
ˇ
10:20 - 10:40: How to Compute under AC^0
Leakage without Secure Hardware
Guy Rothblum
Coffee Break
11:10 - 12:10: Invited Talk 2 — Recent Advances and Existing Research
Questions in Platform
Security
Ernie Brickell, Intel Corporation
12:10 - 13:40: Lunch, De La Guerra Dining Commons
13:40 - 14:20: Session 10 —
Signatures
ˇ
13:40 - 14:00: Group Signatures with
Almost-for-free Revocation
Benoit Libert,
Thomas Peters, Moti Yung
ˇ
14:00 - 14:20: Tightly Secure Signatures
and Public-Key Encryption
Dennis
Hofheinz, Tibor Jager
14:20 - 15:00: Session 11 — Implementation Analysis
ˇ
14:20 - 14:40: Efficient Padding Oracle
Attacks on Cryptographic Hardware
Romain Bardou, Riccardo
Focardi, Yusuke Kawamoto, Graham Steel, Joe-Kai Tsay
ˇ
14:40 - 15:00: Public Keys
Arjen K.
Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung,
Christophe Wachter
Coffee Break
15:30 - 16:30: Session 12 — Secure Computation II
ˇ
15:30 - 15:50: Multiparty Computation from
Somewhat Homomorphic Encryption
Ivan Damgard,
Valerio Pastro, Nigel Smart, Sarah Zakarias
ˇ
15:50 - 16:10: Near-Linear
Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson,
Serge Fehr, Rafail Ostrovsky
ˇ
16:10 - 16:30: A New Approach to Practical
Active-Secure Two-Party Computation
Jesper Buus
Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
16:30 - 16:50: Session 13 — Blackbox Separation
ˇ
16:30 - 16:50: The Curious Case of
Non-Interactive Commitments
Mohammad
Mahmoody,
16:50 - 17:40: IACR Membership Meeting, Campbell Hall
18:00 - 20:00: Beach Barbecue,
20:00 - 22:30: Crypto Cafe, Anacapa Formal Lounge
Thursday, August
23, 2012 Top
7:30 - 8:45: Breakfast, De La Guerra Dining Commons & Carrillo Commons
9:00 - 9:40: Session 14 — Cryptanalysis
ˇ
9:00 - 9:20: Efficient Dissection of Composite
Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial
Search Problems (Best Paper Award)
Itai Dinur, Orr
Dunkelman, Nathan Keller, Adi Shamir
ˇ
9:20 - 9:40: Resistance Against Iterated
Attacks Revisited
9:40 - 10:40: Session 15 — Quantum Cryptography
ˇ
9:40 - 10:00: Secure Identity-based
Encryption in the Quantum Random Oracle Model
Mark Zhandry
ˇ
10:00 - 10:20: Quantum to Classical
Randomness Extractors
Mario Berta,
Omar Fawzi, Stephanie Wehner
ˇ
10:20 - 10:40: Actively Secure Two-Party
Evaluation of any Quantum Operation
Frédéric Dupuis, Louis Salvail, Jesper Buus
Nielsen
Coffee Break
11:10 - 11:50 Session 16 — Key Encapsulation and
One-way Functions
ˇ
11:10 - 11:30: On the Impossibility of
Constructing Efficient Key Encapsulation and Programmable Hash Functions in
Prime Order Groups
Goichiro
Hanaoka, Takahiro Matsuda, Jacob C.N. Schuldt
ˇ
11:30 - 11:50: Hardness of Computing
Individual Bits for One-way Functions on Elliptic Curves
Alexandre Duc,
Dimitar Jetchev
11:50 - 12:30: Session 17 — Homomorphic Encryption
ˇ
11:50 - 12:10: Homomorphic Evaluation of
the AES Circuit
Craig Gentry,
Shai Halevi, Nigel P. Smart
ˇ
12:10 - 12:30: Fully Homomorphic
Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
12:15-13:45: Lunch, De La Guerra Dining Commons