Last minute changes could be introduced in the conference program. Please, check the information on this page before and during the conference.
|
|
|
|
Sunday, May 20, 2007 |
|
17:00 - 20:30 |
Registration is open
|
|
18:30 - 20:30 |
Welcome reception
|
Monday, May 21, 2007 |
|
08:00 - 09:00 |
Registration
|
|
09:00 - 09:10 |
Opening Remarks
|
|
Session 1: |
Chair: Yuval Ishai |
|
09:10 - 09:40 |
Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
|
|
|
Marc Stevens, Arjen Lenstra and Benne de Weger |
|
09:40 - 10:10 |
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist
|
|
|
Krzysztof Pietrzak |
|
10:10 - 10:40 |
The collision intractability of MDC-2 in the ideal-cipher model
|
|
|
John P. Steinberger |
|
10:40 - 11:10 |
Coffee break
|
|
Session 2: |
Chair: Serge Fehr |
|
11:10 - 11:40 |
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
|
|
|
Yehuda Lindell and Benny Pinkas |
|
11:40 - 12:10 |
Revisiting the Efficiency of Malicious Two-Party Computation
|
|
|
David P. Woodruff |
|
12:10 - 12:40 |
Efficient Two-Party Secure Computation on Committed Inputs
|
|
|
Stanislaw Jarecki and Vitaly Shmatikov |
|
12:45 - 14:30 |
Lunch break
|
|
Session 3: |
Chair: Giuseppe Persiano |
|
14:30 - 15:00 |
Universally Composable Secure Computation Using Tamper-Proof Hardware
|
|
|
Jonathan Katz |
|
15:00 - 15:30 |
Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model
|
|
|
Moti Yung and Yunlei Zhao |
|
15:30 - 16:00 |
Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
|
|
|
Yi Deng and Dongdai Lin |
|
16:00 - 16:30 |
Coffee break
|
|
Session 4: |
Chair: Moni Naor |
|
16:30 - 17:00 |
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
|
|
|
Chun-Yuan Hsiao, Chi-Jen Lu and Leonid Reyzin |
|
17:00 - 17:50 |
Zero Knowledge and Soundness are Symmetric
|
|
|
Shien Jin Ong and Salil Vadhan |
|
19:00 |
Welcome Cocktail
|
Tuesday, May 22, 2007 |
|
Session 5: |
Chair: Dario Catalano |
|
09:00 - 09:30 |
Mesh Signatures
|
|
|
Xavier Boyen |
|
09:30 - 10:00 |
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
|
|
|
Thomas Ristenpart and Scott Yilek |
|
10:00 - 10:30 |
Batch Verification of Short Signatures
|
|
|
Jan Camenisch, Susan Hohenberger and Michael Ostergaard Pedersen |
|
10:30 - 11:00 |
Coffee break
|
|
Session 6: |
Chair: Xiaoyun Wang |
|
11:00 - 11:30 |
Cryptanalysis of SFLASH with Slightly Modified Parameters
|
|
|
Vivien Dubois, Pierre-Alain Fouque and Jacques Stern |
|
11:30 - 12:00 |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
|
|
|
Hongjun Wu and Bart Preneel |
|
12:00 - 12:10 |
Short break
|
|
Session 7: IACR Distinguished Lecture |
Chair: Andy Clark |
|
12:10 - 13:10 |
Cryptography from A to Z
|
|
|
Jacques Stern |
|
13:10 - 14:40 |
Lunch
|
|
Excursion |
|
|
15:00 - 19:00 |
Excursion
|
|
|
Visit to 'Caves Codorniu' (Codorniu cellars) |
|
Rump Session |
|
|
20:00 |
Rump Session
|
Wednesday, May 23, 2007 |
|
Session 8: |
Chair: Brent Waters |
|
09:00 - 09:30 |
Secure Computation from Random Error Correcting Codes
|
|
|
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan and Vinod Vaikuntanathan |
|
09:30 - 10:00 |
Round-Efficient Secure Computation in Point-to-Point Networks
|
|
|
Jonathan Katz and Chiu-Yuen Koo |
|
10:00 - 10:30 |
Atomic Secure Multi-Party Multiplication with Low Communication
|
|
|
Ronald Cramer, Ivan Damgaard and Robbert de Haan |
|
10:30 - 11:00 |
Coffee break
|
|
Session 9: |
Chair: Victor Miller |
|
11:00 - 11:30 |
Cryptanalysis of the Sidelnikov cryptosystem
|
|
|
Lorenz Minder |
|
11:30 - 12:00 |
Toward a rigorous variation of Coppersmith's algorithm on three variables
|
|
|
Aurelie Bauer and Antoine Joux |
|
12:00 - 12:30 |
An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves
|
|
|
Andreas Enge and Pierrick Gaudry |
|
12:45 - 14:30 |
Lunch break
|
|
Session 10: |
Chair: Michel Abdalla |
|
14:30 - 15:00 |
General Ad Hoc Encryption from Exponent Inversion IBE
|
|
|
Xavier Boyen |
|
15:00 - 15:30 |
Non-Interactive Proofs for Integer Multiplication
|
|
|
Ivan Damgard and Rune Thorbek |
|
15:30 - 16:00 |
Ate Pairing on Hyperelliptic Curves
|
|
|
Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault and Frederik Vercauteren |
|
16:00 - 16:30 |
Coffee break
|
|
Session 11: |
Chair: Eran Tromer |
|
16:30 - 17:00 |
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
|
|
|
Willi Geiselmann and Rainer Steinwandt |
|
17:00 - 17:30 |
Ideal Multipartite Secret Sharing Schemes
|
|
|
Oriol Farras, Jaume Marti-Farre and Carles Padro |
|
17:30 - 18:00 |
Divisible e-cash systems can be truly anonymous
|
|
|
Sebastien Canard and Aline Gouget |
|
IACR Membership Meeting |
|
|
18:00 - 19:00 |
IACR Membership Meeting
|
|
21:00 |
Gala dinner
|
Thursday, May 24, 2007 |
|
Session 12: |
Chair: Nigel Smart |
|
09:00 - 09:30 |
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
|
|
|
Ueli Maurer and Johan Sjodin |
|
09:30 - 10:00 |
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
|
|
|
Krzysztof Pietrzak and Johan Sjodin |
|
10:00 - 10:30 |
Feistel Networks made Public, and Applications
|
|
|
Yevgeniy Dodis and Prashant Puniya |
|
10:30 - 11:00 |
Coffee break
|
|
Session 13: |
Chair: Stefan Dziemowski |
|
11:00 - 11:30 |
Oblivious-Transfer Amplification
|
|
|
Juerg Wullschleger |
|
11:30 - 12:00 |
Simulatable Adaptive Oblivious Transfer
|
|
|
Jan Camenisch, Gregory Neven and abhi shelat |
|
12:00 - 12:10 |
Short break
|
|
Session 14: Invited Talk |
Chair: Bart Preneel |
|
12:10 - 13:10 |
Elliptic Curves and Cryptography: Invention and Impact
|
|
|
Victor Miller |
|
13:10 - 13:15 |
Closing remarks
|