Last minute changes could be introduced in the conference program. Please, check the information on this page before and during the conference.
|
|
|
|
Sunday, March 9, 2007 |
|
18:00 - 20:00 |
Registration
|
|
19:00 - 20:30 |
Welcome cocktail
|
Monday, March 10, 2007 |
|
08:00 - 10:00 |
Registration
|
|
08:45 - 09:00 |
Opening
|
|
|
Chaired by the Rector of the Technical University of Catalonia (UPC) |
|
Session I: Algebraic and Number Theoretical Cryptoanalysis (I) |
Chair: Steven Galbraith |
|
09:00 - 09:30 |
Total Break of the $\ell$-IC Signature Scheme
|
|
|
P.A. Fouque and G. Macariorat and L. Perret and J. Stern |
|
09:30 - 10:00 |
Recovering NTRU Secret Key From Inversion Oracles
|
|
|
Petros Mol and Moti Yung |
|
10:00 - 10:30 |
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
|
|
|
Alexander May and Maike Ritzenhofen |
|
10:30 - 11:00 |
Coffee break
|
|
Session II: Theory of Public Key Encryption |
Chair: Eike Kiltz |
|
11:00 - 11:30 |
Relations Among Notions of Plaintext Awareness
|
|
|
James Birkett and Alexander W. Dent |
|
11:30 - 12:00 |
Completely Non-Malleable Encryption Revisited
|
|
|
Carmine Ventre and Ivan Visconti |
|
12:00 - 12:15 |
Coffee break
|
|
Invited Talk I |
Chair: Ronald Cramer |
|
12:15 - 13:15 |
The Role of Discrete Logarithms in Designing Secure CryptoSystems
|
|
|
Victor Shoup (New York University) |
|
13:15 - 15:30 |
Lunch
|
|
Session III: Digital Signatures (I) |
Chair: Masayuki Abe |
|
15:30 - 16:00 |
Off-Line/On-Line Signatures: Theoretical aspects and Experimental Results
|
|
|
Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro |
|
16:00 - 16:30 |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
|
|
|
Siamak F Shahandashti and Reihaneh Safavi-Naini |
|
16:30 - 17:00 |
Proxy Signatures Secure Against Proxy Key Exposure
|
|
|
Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson |
|
18:30 |
Cocktail Party
|
|
|
at FME (rooms Q and R) |
Tuesday, March 11, 2007 |
|
Session IV: Identification, Broadcast and Key Agreement |
Chair: Moti Yung |
|
09:00 - 09:30 |
Lattice-Based Identification Schemes Secure Under Active Attacks
|
|
|
Vadim Lyubashevsky |
|
09:30 - 10:00 |
Efficient Simultaneous Broadcast
|
|
|
Sebastian Faust and Emilia Kasper and Stefan Lucks |
|
10:00 - 10:30 |
SAS-Based Group Authentication and Key Agreement Protocols
|
|
|
Sven Laur and Sylvain Pasini |
|
10:30 - 11:00 |
Coffee break
|
|
Session V: Implementation of Fast Arithmetic |
Chair: Jorge Villar |
|
11:00 - 11:30 |
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm
|
|
|
Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi |
|
11:30 - 12:00 |
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields
|
|
|
Patrick Longa and Ali Miri |
|
12:00 - 12:15 |
Coffee break
|
|
Invited Talk II |
Chair: Ronald Cramer |
|
12:15 - 13:15 |
Cryptographic Test Correction
|
|
|
David Naccache (ENS Paris) |
|
13:15 - 15:00 |
Lunch
|
|
14:30 - 16:30 |
Visit to the Monastery of Pedralbes
|
|
|
Free Afternoon
|
|
20:00 |
Gala dinner
|
|
|
at the Museum of the History of Catalonia |
Wednesday, March 12, 2007 |
|
Session VI: Digital Signatures (II) |
Chair: Jens Groth |
|
09:00 - 09:30 |
Online Untransferable Signatures
|
|
|
Moses Liskov and Silvio Micali |
|
09:30 - 10:00 |
Security of Digital Signature Schemes in Weakened Random Oracle Models
|
|
|
Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka |
|
10:00 - 10:30 |
A Digital Signature Scheme based on $CVP_\infty$
|
|
|
Thomas Plantard and Willy Susilo and Khin Than Win |
|
10:30 - 11:00 |
Coffee break
|
|
Session VII: Algebraic and Number Theoretical Cryptoanalysis (II) |
Chair: Ronald Cramer |
|
11:00 - 11:30 |
An analysis of the vector decomposition problem
|
|
|
Steven D. Galbraith and Eric R. Verheul |
|
11:30 - 12:00 |
A Parameterized Splitting System and its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents
|
|
|
Sungwook Kim and Jung Hee Cheon |
|
12:00 - 12:15 |
Coffee break
|
|
Invited Talk III |
Chair: Ronald Cramer |
|
12:15 - 13:15 |
How to Secretly Extract Hidden Secret Keys: A State of the Attacks
|
|
|
Jean-Jacques Quisquater (Université Catholique de Louvain) |
|
13:15 - 15:30 |
Lunch
|
|
Session VIII: Public Key Encryption |
Chair: Victor Shoup |
|
15:30 - 16:00 |
Certificateless Encryption Schemes Strongly Secure in the Standard Model
|
|
|
Alexander W Dent and Benoit Libert and Kenneth G. Paterson |
|
16:00 - 16:30 |
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
|
|
|
Benoit Libert and Damien Vergnaud |
|
16:30 - 17:00 |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
|
|
|
Yi-Ru Liu and Wen-Guey Tzeng |
|
17:00 |
Conference adjourns
|