Last minute changes could be introduced in the conference program. Please, check the information on this page before and during the conference.
| |
|
|
|
| Sunday, May 20, 2007 |
| |
17:00 - 20:30 |
Registration is open
|
| |
18:30 - 20:30 |
Welcome reception
|
| Monday, May 21, 2007 |
| |
08:00 - 09:00 |
Registration
|
| |
09:00 - 09:10 |
Opening Remarks
|
| |
Session 1: |
Chair: Yuval Ishai |
| |
09:10 - 09:40 |
Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
 |
| |
|
Marc Stevens, Arjen Lenstra and Benne de Weger |
| |
09:40 - 10:10 |
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist
 |
| |
|
Krzysztof Pietrzak |
| |
10:10 - 10:40 |
The collision intractability of MDC-2 in the ideal-cipher model
|
| |
|
John P. Steinberger |
| |
10:40 - 11:10 |
Coffee break
|
| |
Session 2: |
Chair: Serge Fehr |
| |
11:10 - 11:40 |
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
 |
| |
|
Yehuda Lindell and Benny Pinkas |
| |
11:40 - 12:10 |
Revisiting the Efficiency of Malicious Two-Party Computation
|
| |
|
David P. Woodruff |
| |
12:10 - 12:40 |
Efficient Two-Party Secure Computation on Committed Inputs
|
| |
|
Stanislaw Jarecki and Vitaly Shmatikov |
| |
12:45 - 14:30 |
Lunch break
|
| |
Session 3: |
Chair: Giuseppe Persiano |
| |
14:30 - 15:00 |
Universally Composable Secure Computation Using Tamper-Proof Hardware
|
| |
|
Jonathan Katz |
| |
15:00 - 15:30 |
Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model
|
| |
|
Moti Yung and Yunlei Zhao |
| |
15:30 - 16:00 |
Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
|
| |
|
Yi Deng and Dongdai Lin |
| |
16:00 - 16:30 |
Coffee break
|
| |
Session 4: |
Chair: Moni Naor |
| |
16:30 - 17:00 |
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
|
| |
|
Chun-Yuan Hsiao, Chi-Jen Lu and Leonid Reyzin |
| |
17:00 - 17:50 |
Zero Knowledge and Soundness are Symmetric
|
| |
|
Shien Jin Ong and Salil Vadhan |
| |
19:00 |
Welcome Cocktail
|
| Tuesday, May 22, 2007 |
| |
Session 5: |
Chair: Dario Catalano |
| |
09:00 - 09:30 |
Mesh Signatures
|
| |
|
Xavier Boyen |
| |
09:30 - 10:00 |
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
|
| |
|
Thomas Ristenpart and Scott Yilek |
| |
10:00 - 10:30 |
Batch Verification of Short Signatures
|
| |
|
Jan Camenisch, Susan Hohenberger and Michael Ostergaard Pedersen |
| |
10:30 - 11:00 |
Coffee break
|
| |
Session 6: |
Chair: Xiaoyun Wang |
| |
11:00 - 11:30 |
Cryptanalysis of SFLASH with Slightly Modified Parameters
 |
| |
|
Vivien Dubois, Pierre-Alain Fouque and Jacques Stern |
| |
11:30 - 12:00 |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
 |
| |
|
Hongjun Wu and Bart Preneel |
| |
12:00 - 12:10 |
Short break
|
| |
Session 7: IACR Distinguished Lecture |
Chair: Andy Clark |
| |
12:10 - 13:10 |
Cryptography from A to Z
|
| |
|
Jacques Stern |
| |
13:10 - 14:40 |
Lunch
|
| |
Excursion |
|
| |
15:00 - 19:00 |
Excursion
|
| |
|
Visit to 'Caves Codorniu' (Codorniu cellars) |
| |
Rump Session |
|
| |
20:00 |
Rump Session
|
| Wednesday, May 23, 2007 |
| |
Session 8: |
Chair: Brent Waters |
| |
09:00 - 09:30 |
Secure Computation from Random Error Correcting Codes
|
| |
|
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan and Vinod Vaikuntanathan |
| |
09:30 - 10:00 |
Round-Efficient Secure Computation in Point-to-Point Networks
|
| |
|
Jonathan Katz and Chiu-Yuen Koo |
| |
10:00 - 10:30 |
Atomic Secure Multi-Party Multiplication with Low Communication
|
| |
|
Ronald Cramer, Ivan Damgaard and Robbert de Haan |
| |
10:30 - 11:00 |
Coffee break
|
| |
Session 9: |
Chair: Victor Miller |
| |
11:00 - 11:30 |
Cryptanalysis of the Sidelnikov cryptosystem
 |
| |
|
Lorenz Minder |
| |
11:30 - 12:00 |
Toward a rigorous variation of Coppersmith's algorithm on three variables
 |
| |
|
Aurelie Bauer and Antoine Joux |
| |
12:00 - 12:30 |
An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves
|
| |
|
Andreas Enge and Pierrick Gaudry |
| |
12:45 - 14:30 |
Lunch break
|
| |
Session 10: |
Chair: Michel Abdalla |
| |
14:30 - 15:00 |
General Ad Hoc Encryption from Exponent Inversion IBE
|
| |
|
Xavier Boyen |
| |
15:00 - 15:30 |
Non-Interactive Proofs for Integer Multiplication
|
| |
|
Ivan Damgard and Rune Thorbek |
| |
15:30 - 16:00 |
Ate Pairing on Hyperelliptic Curves
 |
| |
|
Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault and Frederik Vercauteren |
| |
16:00 - 16:30 |
Coffee break
|
| |
Session 11: |
Chair: Eran Tromer |
| |
16:30 - 17:00 |
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
 |
| |
|
Willi Geiselmann and Rainer Steinwandt |
| |
17:00 - 17:30 |
Ideal Multipartite Secret Sharing Schemes
 |
| |
|
Oriol Farras, Jaume Marti-Farre and Carles Padro |
| |
17:30 - 18:00 |
Divisible e-cash systems can be truly anonymous
|
| |
|
Sebastien Canard and Aline Gouget |
| |
IACR Membership Meeting |
|
| |
18:00 - 19:00 |
IACR Membership Meeting
|
| |
21:00 |
Gala dinner
|
| Thursday, May 24, 2007 |
| |
Session 12: |
Chair: Nigel Smart |
| |
09:00 - 09:30 |
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
 |
| |
|
Ueli Maurer and Johan Sjodin |
| |
09:30 - 10:00 |
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
 |
| |
|
Krzysztof Pietrzak and Johan Sjodin |
| |
10:00 - 10:30 |
Feistel Networks made Public, and Applications
|
| |
|
Yevgeniy Dodis and Prashant Puniya |
| |
10:30 - 11:00 |
Coffee break
|
| |
Session 13: |
Chair: Stefan Dziemowski |
| |
11:00 - 11:30 |
Oblivious-Transfer Amplification
|
| |
|
Juerg Wullschleger |
| |
11:30 - 12:00 |
Simulatable Adaptive Oblivious Transfer
|
| |
|
Jan Camenisch, Gregory Neven and abhi shelat |
| |
12:00 - 12:10 |
Short break
|
| |
Session 14: Invited Talk |
Chair: Bart Preneel |
| |
12:10 - 13:10 |
Elliptic Curves and Cryptography: Invention and Impact
 |
| |
|
Victor Miller |
| |
13:10 - 13:15 |
Closing remarks
|