Welcome reception and all technical sessions will be held at the Merchant Court Ballroom. PDF version of the program is available.

Sunday, December 5
17:30 – 20:30 Registration
18:30 – 20:30 Welcome Reception (Merchant Court Ballroom, Section B)

Monday, December 6
08:00 – 09:00 Registration
09:00 – 09:15 Welcome and Opening Remarks
09:15 – 10:30 Session 1: Hash Attacks (I) (Chair: Mitsuru Matsui)
  Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger
Finding Second Preimages of Short Messages for Hamsi-256
Thomas Fuhr
Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl
Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama and Kazuo Ohta
10:30 – 11:00 Morning Break
11:00 – 12:00 Invited Talk 1: Bart Preneel (Chair: Masayuki Abe)
Cryptographic Hash Functions and the SHA-3 Competition
12:00 – 13:40 Lunch
13:40 – 14:30 Session 2: Hash Attacks (II) (Chair: Francois-Xavier Standaert)
  Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo, San Ling, Christian Rechberger and Huaxiong Wang
Collision Attacks against the Knudsen-Preneel Compression Functions
Onur Özen and Martijn Stam
14:30 – 15:20 Session 3: Symmetric-Key Cryptosystems (Chair: Hongjun Wu)
  Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Emmanuel Volte, Valerie Nachef and Jacques Patarin
The World is Not Enough: Another Look on Second-Order DPA
Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth
Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper and Stefan Mangard
15:20 – 15:45 Afternoon Break
15:45 – 17:00 Session 4: Block and Stream Ciphers (Chair: Claude Carlet)
  Conditional Differential Cryptanalysis of NLFSR-based Cryptosystems
Simon Knellwolf, Willi Meier and Maria Naya-Plasencia
  A Byte-Based Guess and Determine Attack on SOSEMANUK
Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng
  Improved Single-Key Attacks on 8-round AES-192 and AES-256
Orr Dunkelman, Nathan Keller and Adi Shamir
18:30 – 21:30 Asiacrypt Steering Committee Meeting (Rosewood Room)

Tuesday, December 7
08:30 – 09:00 Registration
09:00 – 10:15 Session 5: Protocols (Chair: Dong-Hoon Lee)
  Constant-Size Commitments to Polynomials and Their Applications
Aniket Kate, Gregory M. Zaverucha and Ian Goldberg
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Carmit Hazay and Tomas Toft
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro, Jihye Kim and Gene Tsudik
10:15 – 10:40 Morning Break
10:40 – 11:30 Session 6: Key Exchange (Chair: Serge Vaudenay)
  Generic Compilers for Authenticated Key Exchange
Tibor Jager, Florian Kohlar, Sven Schäge and Jörg Schwenk
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT
Eric Brier and Thomas Peyrin
11:30 – 12:30 Invited Talk 2: Hugo Krawczyk (Chair: Serge Vaudenay)
Cryptography, from Theory to Practice: A Personal Perspective
12:30 – 14:00 Lunch
14:00 – 18:00 Guided Excursion (Optional)
19:00 – 22:00 Rump Session (Merchant Court Ballroom)

Wednesday, December 8
08:30 – 09:00 Registration
09:00 – 10:15 Session 7: Foundation (Chair: Hugo Krawczyk)
  Efficient String-Commitment from Weak Bit-Commitment
Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu and Bo-Yin Yang
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
Random Oracles With(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam and Stefano Tessaro
10:15 – 10:45 Morning Break
10:45 – 12:00 Session 8: Zero-Knowledge (Chair: Payman Mohassel)
  Short Pairing-based Non-interactive Zero-Knowledge Arguments
Jens Groth
Short Non-interactive Zero-Knowledge Proofs
Jens Groth
Optimistic Concurrent Zero Knowledge
Alon Rosen and abhi shelat
12:00 – 13:30 Lunch
13:30 – 14:45 Session 9: Lattice-Based Cryptography (Chair: Willy Susilo)
  Faster Fully Homomorphic Encryption
Damien Stehlé and Ron Steinfeld
A Group Signature Scheme from Lattice Assumptions
Dov Gordon, Jonathan Katz and Vinod Vaikuntanathan
Lattice-based Blind Signatures
Markus Rückert
14:45 – 15:10 Afternoon Break
15:10 – 16:50 Session 10: Secure Communication and Computation (Chair: Huaxiong Wang)
  The Round Complexity of Verifiable Secret Sharing: The Statistical Case
Ranjit Kumaresan, Arpita Patra and C. Pandu Rangan
General Perfectly Secure Message Transmission Using Linear Codes
Qiushi Yang and Yvo Desmedt
On Invertible Sampling and Adaptive Security
Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi and Amit Sahai
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
17:00 – 18:00 IACR Membership Meeting (Merchant Court Ballroom)
18:30 – 21:30 Conference Banquet at Grand Shanghai Restaurant (Shuttle buses to and from the banquet venue will be provided)

Thursday, December 9
08:30 – 09:00 Registration
09:00 – 10:15 Session 11: Models, Notions and Assumptions (Chair: Rei Safavi-Naini)
  A Closer Look at Anonymity and Robustness in Encryption Schemes
Payman Mohassel
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn, Hovav Shacham and David Mandell Freeman
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Tibor Jager and Andy Rupp
10:15 – 10:40 Morning Break
10:40 – 12:20 Session 12: Public-Key Encryption (Chair: San Ling)

The Degree of Regularity of HFE Systems
Vivien Dubois and Nicolas Gama

Structured Encryption and Controlled Disclosure
Melissa Chase and Seny Kamara

Leakage Resilient ElGamal Encryption
Eike Kiltz and Krzysztof Pietrzak

Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt and Daniel Wichs

12:20 – 12:30 Closing Remarks
12:30 – 14:00 Lunch