Main Page Call for Papers Contact Info Program Local Info Registration Rump Session BoFs


 

CRYPTO 2005

Rump Session Program

 

IACR logo

[Note: Presenters. Please let me know if you want the status of your presentation changed].
19:30 - 19:35 Introduction
      Phong Nguyen    
     
Session 1: Cryptanalysis    
           
19:35 - 19:44 New Collision Search for SHA-1
      Xiaoyun Wang, Andrew Yao and Frances Yao (communicated by Adi Shamir) Presentation Video
     
19:44 - 19:49 Experiments with DSA
      Daniel Bleichenbacher Presentation Video
     
19:49 - 19:54 Discrete Logarithms in GF(p) and GF(2^n)
      Antoine Joux and Reynald Lercier Presentation Video
     
19:54 - 19:57 Replication Attack and Cryptographic Research
      John Kelsey, Bruce Schneier, Serge Vaudenay, and David Wagner Presentation Video
     
Session 2: Side-Channel Cryptanalysis    
     
19:57 - 20:03 Full AES key extraction in 65 milliseconds using cache attacks Presentation Video
      Dag Arne Osvik, Adi Shamir, Eran Tromer
     
20:03 - 20:09 Implementing crypto algorithms to defend against software side channels
      Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
     
20:09 - 20:11 The geobacter attack: when nanotechnology meets chips
      Jean-Jacques Quisquater Presentation Video
     
Session 3: Announcements    
     
20:11 - 20:15 A Colossal Problem (revisited)
      Andy Clark
     
20:15 - 20:16 EUROCRYPT2006
      Anatoly Lebedev
     
20:16 - 20:18 ECC2005, ECC summer school, SHARCS'06 www.sharcs.org
      Tanja Lange Presentation Video
     
20:18 - 20:19 PQCrypto 2006 workshop, http://postquantum.cr.yp.to
      Dan Bernstein Presentation Video
     
20:19 - 20:20 Southern California Security and Cryptography Workshop
      Stanislaw Jarecki Presentation Video
     
20:20 - 20:21 Mycrypt 2005
      Ed Dawson, Serge Vaudenay, Raphael C.-W. Phan Presentation Video
     
20:21 - 20:22 Security In Storage Workshop
      James Hughes Presentation Video
     
20:22 - 20:23 TCC2006
      Tal Rabin
     
20:23 - 20:24 How to experience Italy with Unconditional Security
      Ivan Damgard
     
20:24 - 20:25 The IACR fellows program
      Ivan Damgard
     
20:25 - 20:26 IEEE P1363 Standards Activity
      William Whyte Presentation Video
     
20:26 - 20:27 2005 IEEE Information Theory Workshop
      Yuliang Zheng
     
20:27 - 20:37 BREAK
     
Session 4: Hash Functions    
     
20:37 - 20:43 Herding Hash Functions
      John Kelsey and Tadayoshi Kohno   Video
     
20:43 - 20:47 Reusable Hash Collisions for Special File Formats
      Max Gebhardt, Georg Illies, Werner Schindler
     
20:47 - 20:50 Collisions in Culture
      Hilarie Orman Presentation Video
     
20:50 - 20:56 A Simple and Provably Good Code for SHA Message Expansion
      C. S. Jutla and A. C. Patthak
     
20:56 - 21:02 VSH, an efficient and provable collision resistant hash function.
      Scott Contini, Arjen K. Lenstra, Ron Steinfeld Presentation Video
     
21:02 - 21:06 Can we get a Reduction Proof for Truncated Hashes?
      John Kelsey   Video
     
21:06 - 21:09 New Hash Function with Chaos
      Chil-Min Kim
     
21:09 - 21:13 Paradoxes of the Birthday Paradox
      lya Mironov
     
Session 5: Provable Security    
     
21:13 - 21:17 Perfect NIZK for NP
      Jens Groth and Rafail Ostrovsky and Amit Sahai Presentation Video
     
21:17 - 21:20 Cramer-Shoup is Plaintext-Aware in the Standard Model
      Alexander W. Dent Presentation Video
     
21:20 - 21:24 Stanford vs. UC: The Big Game
      A Datta, A Derek, J Mitchell, A Ramanathan, A Scedrov Presentation Video
     
21:24 - 21:28 Provably Secure Substitution of Cryptographic Tools
      Lea Kissner and David Molnar Presentation Video
     
21:28 - 21:30 Security Rituals <> the Pair-wise Union of Two Unbound Variables
      M. Briceno, J. Callas, T. Cannoy, J. Merchant, A. Shostack, N. Van Someren, R. Wagner
     
Session 6: Signatures    
     
21:30 - 21:33 NTRUSign Parameters Challenge
      Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte Presentation Video
     
21:33 - 21:36 Efficient Designated Confirmer Signatures Without Random Oracles or Generic ZK Proofs
      Craig Gentry, David Molnar, and Zulfikar Ramzan
     
21:36 - 21:40 Two Stories of Ring Signatures
      Yoshikazu Hanatani and Kazuo Ohta Presentation Video
     
Session 7: Symmetric stuff    
     
21:40 - 21:44 Designing cipher backwards
      Stephen Miller, Ilya Mironov, Venkie
     
21:44 - 21:48 On the (im)possibility of blind MACs
      Michel Abdalla, Chanathip Namprempre, Gregory Neven Presentation Video
     
21:48 - 21:51 Power Functions Over GF(2^n) for Infinitely Many n
      David Jedlicka Presentation Video
     
21:51 - 22:01 BREAK
     
Session 8: About Crypto '05    
     
22:01 - 22:06 Anonymous IBE without Random Oracles
      Dan Boneh and Brent Waters
     
22:06 - 22:10 Klein Bottle Onion Routing: An Efficient Alternative to the Onion Routing by Camenisch and Lysyanskaya
      Kun Peng, Juanma González, Yvo Desmedt and Ed Dawson
     
22:10 - 22:15 On Parallel and Concurrent Security of the HB and HB+ Protocols
      Jonathan Katz and Ji-Sun Shin Presentation Video
     
Session 9: Human Crypto    
     
22:15 - 22:19 Passwords – No Longer Viable
      Arvind Narayanan and Vitaly Shmatikov Presentation Video
     
22:19 - 22:23 Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares
      Kazuki Yoneyama, Mitsugu Iwamoto, Lei Wang, Noboru Kunihiro, Kazuo Ohta Presentation Video
     
22:23 - 22:26 Ceremonies
      Carl Ellison Presentation Video
     
22:26 - 22:29 Human-oriented encryption: from Solitaire to Multitaire
      Jean-Jacques Quisquater Presentation Video
     
Session 10: The End    
     
22:29 - 22:33 Secure Triggers
      Ariel Futoransky, Emiliano Kargieman, Carlos Sarruate, Ariel Waissbein Presentation Video
     
22:33 - 22:37 Secure Computation with Honest Majority in Expected Constant Rounds
      Jonathan Katz and Chiu-Yuen Koo Presentation Video
     
22:37 - 22:40 Password Authenticated Key Exchange Using Hidden Smooth Subgroups
      Craig Gentry, Phil Mackenzie, and Zulfikar Ramzan   Video
     
22:40 - 22:43 Digital Cinema System Specification V1.0
      Jean-Jacques Quisquater Presentation Video
     
22:43     GOOD NIGHT!