Program
Crypto 2016 will be running dual tracks for most sessions. Track #1 will be in the University Center (UCEN) Corwin Pavilion and Track #2 will be in Lotte Lehmann hall, right across from the UCEN. All single-track sessions are in Corwin Pavilion.
Sunday, August 14, 2016 |
||
17:00 - 20:00 | Registration, Anacapa Formal Lounge | |
17:30 - 21:30 | Reception Dinner, Anacapa Lawn | |
Monday, August 15, 2016 |
||
7:30 - 8:45 | Breakfast, De La Guerra Dining Commons | |
8:45 - 8:55 | Opening remarks, Corwin Pavilion Crypto 2016 General Chair, Brian LaMacchia |
|
Track A: Corwin Pavilion |
Track B: Lotte Lehmann Hall | |
9:00 - 9:50 | Provable Security for Symmetric Cryptography Viet Tung Hoang; Stefano Tessaro Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers |
Secure Computation and Protocols I Network-Hiding Communication and Applications to Multi-Party Protocols Network Oblivious Transfer |
9:50 - 9:55 | ||
9:55 - 11:10 | Provable Security for Symmetric Cryptography (cont.) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees Indifferentiability of 8-Round Feistel Networks EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC |
Secure Computation and Protocols I (cont.) On the Power of Secure Two-Party Computation Secure Protocol Transformations On the Communication required for Unconditionally Secure Multiplication |
11:10 - 11:40 | Break - University Center Lagoon Plaza | |
11:40 - 12:40 | Crypto 2016 Invited Presentation, Corwin Pavilion Brian Sniffen, Chief Security Architect Akamai Technologies, Inc. |
|
12:40 - 14:00 | Lunch, De La Guerra Dining Commons | |
14:00 - 14:50 | Asymmetric Cryptography and Cryptanalysis I A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts |
Obfuscation Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security Obfuscation Combiners |
14:50 - 14:55 | ||
14:55 - 15:45 | Asymmetric Cryptography and Cryptanalysis I (cont.) A Practical Cryptanalysis of the Algebraic Eraser Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN |
Obfuscation (cont.) On Statistically Secure Obfuscation with Approximate Correctness Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium |
15:45 - 16:15 | Break - University Center Lagoon Plaza |
|
16:15 - 17:30 | Cryptography in Theory and Practice The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3 A Modular Treatment of Cryptographic APIs: the Symmetric-Key Case Encryption Switching Protocols
|
Asymmetric Cryptography and Cryptanalysis II Cryptanalysis of GGH15 Multilinear Maps Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 Separate Separations of CPA and Circular Security (for Any Cycle Length) |
19:00 - 21:00 | Dinner, Anacapa Lawn | |
Tuesday, August 16, 2016 |
||
7:30 - 9:00 | Breakfast, De La Guerra Dining Commons | |
Track A: Corwin Pavilion |
Track B: Lotte Lehmann Hall | |
9:10 - 10:25 | Compromised Systems Message Transmission with Reverse Firewalls – Secure Communication on Corrupted Machines Big-Key Symmetric Encryption: Resisting Key Exfiltration |
Quantum Techniques Quantum Homomorphic Encryption for Polynomial-sized Circuits Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications Semantic Security and Indistinguishability in the Quantum World |
10:25 - 10:55 | Break - University Center Lagoon Plaza | |
10:55 - 11:45 | Symmetric Cryptanalysis Achiya Bar-On; Nathan Keller Cryptanalysis of the FLIP Family of Stream Ciphers |
Spooky Encryption Spooky Encryption and its Applications Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems |
11:45 - 11:50 | ||
11:50 - 12:40 | Crypto 2016 Award Papers, Corwin Pavilion The Magic of ELFs Breaking the Circuit Size Barrier for Secure Computation Under DDH |
|
12:40 - 14:00 | Lunch, De La Guerra Dining Commons | |
14:00 - 18:00 | Free afternoon | |
18:00 - 21:00 | Dinner Reception, University Center Lagoon Plaza | |
19:00 - 19:30 | IACR Award Ceremony, University Center Corwin Pavilion | |
19:30 - 23:00 | Rump Session, University Center Corwin Pavilion Chairs: Kenny Paterson and Martijn Stam |
|
Wednesday, August 17, 2016 |
||
7:30 - 8:50 | Breakfast, De La Guerra Dining Commons | |
Track A: Corwin Pavilion |
Track B: Lotte Lehmann Hall | |
8:50 - 9:40 | Algorithmic Number Theory Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
|
Secure Computation and Protocols II Adaptively Secure Garbled Circuits from One-Way Functions Rate-1, Linear Time and Additively Homomorphic UC Commitments |
9:40 - 9:45 | ||
9:45 - 11:00 | Symmetric Primitives New Insights on AES-Like SPN Ciphers Christof Beierle; Thorsten Kranz; Gregor Leander Another View of the Division Property |
Secure Computation and Protocols II (cont.) UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens Probabilistic Termination and Composability of Cryptographic Protocols |
11:00 - 11:30 | Coffee Break, Plaza outside Campbell Hall | |
11:30 - 12:30 | Crypto 2016 Invited Presentation in Conjunction with CHES 2016 Paul Kocher Cryptography Research a Division of Rambus |
|
12:30 - 14:00 | Lunch, De La Guerra Dining Commons | |
14:00 - 15:15 | Asymmetric Cryptography FHE Circuit Privacy Almost For Free Optimal Security Proofs for Signatures from Identification Schemes Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli |
IBE, ABE, and Functional Encryption Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes Fully Secure Functional Encryption for Inner Products, from Standard Assumptions Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security |
15:15 - 15:45 | Break - University Center Lagoon Plaza | |
15:45 - 16:35 | Symmetric Cryptography Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS |
Automated Tools and Synthesis Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming Linicrypt: A Model for Practical Cryptography |
16:45 - 17:45 | IACR Membership Meeting, University Center Corwin Pavilion | |
18:00 - 19:30 | Beach Barbeque, Goleta Beach | |
19:30 - 22:30 | Crypto Café (with CHES) Anacapa Formal Lounge and Anacapa Front Lawn |
|
Thursday, August 18, 2016 |
||
7:30 - 8:50 | Breakfast, De La Guerra Dining Commons | |
Track A: Corwin Pavilion |
Track B: Lotte Lehmann Hall | |
8:50 - 10:05 | Cryptanalytic Tools Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks Memory-Efficient Algorithms for Finding Needles in Haystacks Breaking Symmetric Cryptosystems using Quantum Period Finding |
Zero Knowledge On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings How to prove knowledge of small secrets
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials |
10:05 - 10:30 | Break - University Center Lagoon Plaza | |
10:30 - 11:45 10:30 - 12:10 |
Hardware-oriented Cryptography Efficiently Computing Data-Independent Memory-Hard Functions Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks |
Theory Fine-grained Cryptography TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption Bounded Indistinguishability and the Complexity of Recovering Secrets Two Message Oblivious Evaluation of Cryptographic Functionalities |
11:45/12:10 – 14:00 | Lunch, De La Guerra Dining Commons |