Program
Upon request of IACR to implement parallel sessions for IACR conferences this year, Eurocrypt 2015 predominantly runs two tracks in parallel, the R-track (for Real) and the I-track (for Ideal). Dedicated presentations such as invited talks and for best papers will be hosted in a joint, single session. The full program can be downloaded here.Sunday, April 26th | ||
---|---|---|
17:00 | Registration | |
19:30 | Welcome Reception | |
Monday, April 27th | ||
8:30 | Registration | |
9:00 | Welcome | |
9:15 | Invited talk: A Privacy Research Roadmap for a National Privacy Research Strategy Tal Rabin, IBM T.J.Watson Research Center, USA Session chair: Elisabeth Oswald |
|
10:15 | Coffee Break | |
R-track | I-track | |
10:40 | Random Number Generators [slides] Session chair: Yannick Seurin |
Signatures [slides] Session chair: Michel Abdalla |
11:30 | Swap | |
11:35 | Number Field Sieve [slides] Session chair: Tanja Lange |
Zero-Knowledge Proofs [slides] Session chair: Jens Groth |
12:35 | Lunch | |
14:00 | Algorithmic Cryptanalysis [slides] Session chair: Vadim Lyubashevski |
Leakage-Resilient Cryptography [slides] Session chair: Krzyzstof Pietrzak |
14:50 | Swap | |
14:55 | Symmetric Cryptanalysis I [slides] Session chair: Anne Canteaut |
Garbled Circuits [slides] Session chair: Ivan Damgard |
15:45 | Coffee Break | |
16:15 | Symmetric Cryptanalysis II [slides] Session chair: Francois-Xavier Standaert |
Crypto Currencies [slides] Session chair: Shai Halevi |
Tuesday, April 28th | ||
9:00 |
Best paper and honourable mentions [slides]
Cryptanalysis of the Multilinear Maps over the Integers, Jung Hee Cheo; Kyoohyung Han; Changmin Lee; Hansol Ryu; Damien Stehlé Robust Authenticated-Encryption: AEZ and the Problem that it Solves, Viet Tung Hoang; Ted Krovetz; Phillip Rogaway On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, Anne Canteaut; Joëlle Roué Session chair: Christian Cachin |
|
10:15 | Coffee Break | |
R-track | I-track | |
10:40 | Hash Functions [slides] Session chair: Christian Rechberger |
Secret Sharing [slides] Session chair: Jan Camenisch |
11:30 | Swap | |
11:35 | Evaluating Implementations [slides] Session chair: Thomas Roche |
Outsourcing Computations [slides] Session chair: Jan Camenisch |
12:35 | Lunch | |
14:00 | Masking [slides] Session chair: Matthieu Rivain |
Obfuscation and E-Voting [slides] Session chair: Markulf Kohlweiss |
18:30 | Walking Dinner and Rump Session | |
Wednesday, April 29th | ||
9:15 | Invited talk [slides]: Practical Applications of Homomorphic Encryption, Kristin Lauter, Mircosoft Research, USA Session chair: Svetla Nikova |
|
10:15 | Coffee Break | |
R-track | I-track | |
10:40 | Fully Homomorphic Encryption I [slides] Session chair: Kenny Paterson |
Multi-Party Computations [slides] Session chair: Aggelos Kiayas |
11:30 | Swap | |
11:35 | Related-Key Attacks [slides] Session chair: Pooya Farshim |
Encryption [slides] Session chair: Eike Kiltz |
12:35 | Lunch | |
14:00 | Fully Homomorphic Encryption II [slides] Session chair: Nigel Smart |
Resistant Protocols [slides] Session chair: Ivan Visconti |
14:50 | Swap | |
14:55 | Efficient Two-Party Protocols [slides] Session chair: Nigel Smart |
Key Exchange [slides] Session chair: Christina Brzuska |
15:45 | Coffee Break | |
16:00 | IACR Membership Meeting | |
20:00 | Banquet | |
Thursday, April 30th | ||
9:15 | Invited talk [slides]: Threshold Implementations, Vincent Rijmen, KU Leuven, Belgium Session chair: Marc Fischlin |
|
10:15 | Coffee Break | |
R-track | I-track | |
10:40 | Symmetric Cryptanalysis III [slides] Session chair: Elena Andreeva |
Quantum Cryptography [slides] Session chair: Serge Fehr |
11:30 | Swap | |
11:35 | Lattices [slides] Session chair: Marc Fischlin |
Discrete Logarithms [slides] Session chair: Masayuki Abe |
12:00 | Lunch |