[HGI-News-de] Eurocrypt 2009: Early Bird Registration

Newsletter des Horst Görtz Instituts hgi-news-deutschland at lists.ruhr-uni-bochum.de
Mo Mär 16 15:07:11 CET 2009


Dear all,

Early bird registration for Eurocrypt 2009 closes on March 26 (Moutain 
Standard Time). You can register at 
http://www.iacr.org/conferences/eurocrypt2009/registration.html

Best regards,
Christopher


http://www.iacr.org/conferences/eurocrypt2009/program.html

April 26, 2009 Sunday
17:00 – 21:00 	Welcome Reception and Registration
April 27, 2009 Monday
08:30 	Registration Desk open
09:00 – 09:15 	Welcome / Opening Remarks

Session 1
09:15 – 10:55 	Security, Proofs and Models I
09:15 – 09:40 	Possibility and Impossibility Results for Encryption and 
Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, Scott Yilek
09:40 – 10:05 	Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal, Ueli Maurer
10:05 – 10:30 	Resettably Secure Computation
Vipul Goyal, Amit Sahai
10:30 – 10:55 	On the Security Loss in Cryptographic Reductions
Chi-Jen Lu
10:55 – 11:25 	Coffee Break

Invited Talk
11:25 – 12:25 	Phillip Rogaway
12:45 – 13:45 	Lunch

Session 2
13:45 – 15:25 	Hash Cryptanalysis
13:45 – 14:10 	On Randomizing Hash Functions to Strengthen the Security 
of Digital Signatures
Praveen Gauravaram, Lars R. Knudsen
14:10 – 14:35 	Cryptanalysis of MDC-2
Lars R. Knudsen, Florian Mendel, Christian Rechberger, Soeren S. Thomsen
14:35 – 15:00 	Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
15:00 – 15:25 	Finding Preimages in Full MD5 Faster than Exhaustive Search
Yu Sasaki, Kazumaro Aoki
15:25 – 16:25 	Coffee Break + Poster Session Slot

Session 3
16:25 – 17:40 	Group and Broadcast Encryption
16:25 – 16:50 	Asymmetric Group Key Agreement
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
16:50 – 17:15 	Adaptive Security in Broadcast Encryption Systems (with 
Short Ciphertexts)
Craig Gentry, Brent Waters
17:15 – 17:40 	Traitors Collaborating in Public: Pirates 2.0
Olivier Billet, Duong-Hieu Phan
April 28, 2009 Tuesday
08:30 	Registration Desk open
Session 4
09:00 – 10:15 	Cryptosystems I
09:00 – 09:25 	Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi, Leonid Reyzin
09:25 – 09:50 	Order-Preserving Symmetric Encryption
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill
09:50 – 10:15 	A Double-Piped Mode of Operation for MACs, PRFs and PROs: 
Security beyond the Birthday Barrier
Kan Yasuda
10:15 – 11:10 	Coffee Break + Poster Session Slot

Session 5
11:10 – 12:25 	Cryptanalysis
11:10 – 11:35 	On the Security of Cryptosystems with Quadratic 
Decryption: The Nicest Cryptanalysis
Guilhem Castagnos, Fabien Laguillaumie
11:35 – 12:00 	Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur, Adi Shamir
12:00 – 12:25 	Smashing SQUASH-0
Khaled Ouafi, Serge Vaudenay
12:25 – 13:45 	Lunch
14 : 00 – 18:00 	Social Program

     * City Walking Tour (2,5 h)
     * City Bike Tour (3h)
     * Chocolate Museum (1h)
     * Wallraf-Richartz Museum (1h)
     * Boat Cruise (4h)

18:00 – 23:00 	Rump Session
April 29, 2009 Wednesday
09:00 – 9:15 	Best Paper Award Ceremony

Session 6
09:15 – 10:30 	Cryptosystems II
09:15 – 09:40 	Practical Chosen Ciphertext Secure Encryption from Factoring
Dennis Hofheinz, Eike Kiltz
09:40 – 10:05 	Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger, Brent Waters
10:05 – 10:30 	A Public Key Encryption Scheme Secure against Key 
Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Jan Camenisch, Nishanth Chandran, Victor Shoup
10:30 – 11:25 	Coffee Break + Poster Session Slot
Invited Talk
11:25 – 12:25 	Cryptography without (Hardly any) Secrets ?
Shafi Goldwasser
12:25 – 13:45 	Lunch

Session 7
13:45 – 15:25 	Security, Proofs and Models II
13:45 – 14:10 	Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
14:10 – 14:35 	On the Security of Padding-Based Encryption Schemes (Or: 
Why we cannot prove OAEP secure in the Standard Model)
Eike Kiltz, Krzysztof Pietrzak
14:35 – 15:00 	Simulation without the Artifical Abort: Simplified Proof 
and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare, Thomas Ristenpart
15:00 – 15:25 	On the Portability of Generalized Schnorr Proofs
Jan Camenisch, Aggelos Kiayias, Moti Yung
15:25 – 15:45 	Coffee Break

Session 8
15:45 – 16:35 	Side Channels
15:45 – 16:10 	A Unified Framework for the Analysis of Side-Channel Key 
Recovery Attacks
Francoix-Xavier Standaert, Tal Malkin, Moti Yung
16:10 – 16:35 	A Leakage-Resilient Mode of Operation
Krzysztof Pietrzak
16:45 – 18:00 	IACR Business Meeting
April 30, 2009 Thursday

Session 9
09:00 – 10:40 	Curves
09:00 – 09:25 	

ECM on Graphics Cards
Daniel Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
09:25 – 09:50 	Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche, David Kohel, Francesco Sica
09:50 – 10:15 	Endomorphisms for Faster Elliptic Curve Cryptography on a 
Large Class of Curves
Steven Galbraith, Xibin Lin, Michael Scott
10:15 – 10:40 	Generating Genus Two Hyperelliptic Curves over Large 
Characteristic Finite Fields
Takakazu Satoh
10:40 – 11:10 	Coffee Break + Poster Session Slot

Session 10
11:10 – 12:25	Randomness
11:10 – 11:35 	Verifiable Random Functions from Identity-based Key 
Encapsulation
Michel Abdalla, Dario Catalano, Dario Fiore
11:35 – 12:00 	Optimal Randomness Extraction from a Diffie-Hellman Element
Pierre-Alain Fouque, Sebastien Zimmer, David Pointcheval, Celine Chevalier
12:00 – 12:25 	A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
12:25 – 12:40 	Closing Remarks



Mehr Informationen über die Mailingliste Hgi-News-Deutschland