Asiacrypt 2010 Rump Session Program

1900 - 1930: Drinks and Food
1930 - 1934: Rump Session Chair
1934 - 1941:

Cryptanalysis of Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3
Hongjun Wu
, Phuong Ha Nguyen, Huaxiong Wang, San Ling

1941 - 1947:

How to Generate Random Keys from Channel Noise
Rei Safavi-Naini, Hadi Ahmadi

1947 - 1953:

Retro hits Crypto – or what can YOU do with one single plaintext
Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Pierre-Alain Fouque

1953 - 1959:

State Space convergence in the A5/1 keystream generator
Ali Al Handan and Harry Bartlett

1959 - 2003:

Paring-based cryptography and other hidden secrets
Dic Bolony and Ed I. Blast

2003 - 2006:

ECRYPT Hash Workshop 2011
Christian Rechberger

2006 - 2009:

Information Security Positions in UAE
Chan Yeob Yeun

2011 - 2014:

Statistics from ASIACRYPT 2010 Submissions
Masayuki Abe
, ASIACRYPT 2010 Program Committee

2014 - 2017:

FSE 2011 + SKEW 2011
Valerie Umana Gauthier
, Knudsen, Leander, Thomsen

2017 - 2019:

IACR Book Review
Axel Poshmann, IACR

2019 - 2045: Break Time
2045 - 2051:

The Blues for ALRED
Orr Dunkelman, Nathan Keller, Adi Shamir

2051 - 2058:

An Optimal Attack On Cryptosystems With Pre/Post Whitening Keys
Orr Dunkelman and Adi Shamir

2058 - 2103:

Scrutinizing rebound attacks: New Algorithms for improving the complexities… and a bit more
Maria Naya-Plasencia

2103 - 2106:

A New Subexponential Factoring Algorithm
Francesco Sica

2106 - 2112:

The related key attack on the full GOST 28147-89 block cipher with four or two related keys
Marina Pudovkina

2112 - 2118:

On Smart Cards Security
Ilya O. Levin

2118 - 2124: (If) Size Matters: Size-Hiding Private Set Intersection
Emiliano De Cristofaro
2124 - 2128: Rump Session Chair
2128 - 2200: Drinks

Asiacrypt 2010 Rump Session Call for Submissions:

Asiacrypt delegates are invited to submit the rump session abstracts via the Submission Form to the Rump Session Chair (Prof Ed Dawson) at ac2010-rumpsession@ntu.edu.sg by 9 AM on December 7. Presentations are invited in three categories:

A. New research in cryptology
B. Humorous cryptology presentation
C. Conference and other announcements