program
Monday, May 31 | |
---|---|
08:30–11:00 | Registration |
09:30–10:30 | Coffee |
10:50–11:00 | Welcome and Opening Remarks |
11:00–12:40 | Cryptosystems I — Alexander May |
»On Ideal Lattices and Learning with Errors over Rings
[slides]
V. Lyubashevsky, C. Peikert, and O. Regev | |
»Fully Homomorphic Encryption over the Integers
[slides]
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan | |
»Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
[slides]
D. M. Freeman | |
»Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[slides]
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters | |
12:45–14:15 | Lunch |
14:15–15:30 | Obfuscation and Side Channel Security — Helena Handschuh |
»Secure Obfuscation for Encrypted Signatures
[slides]
S. Hada | |
»Public-Key Encryption in the Bounded-Retrieval Model
[slides]
J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, and D. Wichs | |
»Protecting Circuits from Leakage: The Computationally-Bounded and Noisy Cases
[slides]
S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan | |
15:30–16:00 | Coffee |
16:00–17:40 | 2-Party Protocols — Aggelos Kiayias |
»Partial Fairness in Secure Two-Party Computation
[slides]
S. D. Gordon and J. Katz | |
»Secure Message Transmission with Small Public Discussion
[slides]
J. Garay, C. Givens, and R. Ostrovsky | |
»Efficient Device-Independent Quantum Key Distribution
[slides]
E. Hänggi, R. Renner, and S. Wolf | |
»On the Impossibility of Three-Move Blind Signature Schemes
[slides]
M. Fischlin and D. Schröder | |
18:00–20:30 | Reception |
20:45 | Buses to Nice |
Tuesday, June 1 | |
09:30–11:10 | Cryptanalysis — Lars R. Knudsen |
»New Generic Algorithms for Hard Knapsacks
[slides]
N. Howgrave-Graham and A. Joux | |
»Lattice Enumeration using Extreme Pruning
[slides]
N. Gama, P. Q. Nguyen, and O. Regev | |
»Algebraic Cryptanalysis of McEliece Variants with Compact Keys
[slides]
J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich | |
»Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
[slides]
A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, and A. Shamir | |
11:15–11:45 | Coffee |
11:45–12:45 | 2010 IACR Distinguished Lecture — Bart Preneel |
»Cryptography between Wonderland and Underland
Moti Yung | |
12:45–14:15 | Lunch |
14:15–15:30 | Automated Tools and Formal Methods — Helger Lipmaa |
»Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad, and Others
[slides]
A. Biryukov and I. Nikolić | |
»Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
[slides]
K. G. Paterson and G. J. Watson | |
»Computational Soundness, co-Induction, and Encryption Cycles
[slides]
D. Micciancio | |
15:30–16:00 | Coffee |
16:00–17:15 | Models and Proofs — David Pointcheval |
»Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks
[slides]
S. Fehr, D. Hofheinz, E. Kiltz, and H. Wee | |
»Cryptographic Agility and its Relation to Circular Encryption
T. Acar, M. Belenkiy, M. Bellare, and D. Cash | |
»Bounded Key-Dependent Message Security
[slides]
B. Barak, I. Haitner, D. Hofheinz, and Y. Ishai | |
17:30–18:30 | IACR Members' Meeting |
18:30–21:00 | Rump Session — Daniel J. Bernstein and Tanja Lange |
21:15 | Buses to Nice |
Wednesday, June 2 | |
09:30–10:45 | Multiparty Protocols — Berry Schoenmakers |
»Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
[slides]
I. Damgård, Y. Ishai, and M. Krøigaard | |
»Adaptively Secure Broadcast
[slides]
M. Hirt and V. Zikas | |
»Universally Composable Quantum Multi-Party Computation
D. Unruh | |
10:45–11:15 | Coffee |
11:15–12:30 | Cryptosystems II — Jean-Sébastien Coron |
»A Simple BGN-Type Cryptosystem from LWE
[slides]
C. Gentry, S. Halevi, and V. Vaikuntanathan | |
»Bonsai Trees, or How to Delegate a Lattice Basis
[slides]
D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert | |
»Efficient Lattice (H)IBE in the Standard Model
[slides]
S. Agrawal, D. Boneh, and X. Boyen | |
12:30–14:15 | Lunch |
19:00–22:00 | Social Event |
22:15 | Buses to Monaco |
Thursday, June 3 | |
09:30–10:45 | Hash and MAC — Anne Canteaut |
»Multi-Property-Preserving Domain Extension using Polynomial-Based Modes of Operation
[slides]
J. Lee and J. Steinberger | |
»Stam's Collision Resistance Conjecture
J. Steinberger | |
»Universal One-Way Hash Functions via Inaccessible Entropy
I. Haitner, T. Holenstein, O. Reingold, S. Vadhan, and H. Wee | |
10:45–11:15 | Coffee |
11:15–12:30 | Foundational Primitives — Krzysztof Pietrzak |
»Constant-Round Non-Malleable Commitments from Sub-Exponential One-Way Functions
R. Pass and H. Wee | |
»Constructing Verifiable Random Functions with Large Input Spaces
[slides]
S. Hohenberger and B. Waters | |
»Adaptive Trapdoor Functions and Chosen-Ciphertext Security
E. Kiltz, P. Mohassel, and A. O'Neill | |
12:30–12:35 | Closing Remarks |