IACR Eurocrypt 2007Eurocrypt 2007
Home
Call for Papers
FAQ
Submission
Accepted Papers
Program
Proceedings
Rump Session
Venue
Excursion
Accommodation
Travel Info
Registration
Sponsors
Contact
Related Events
 

Program

Eurocrypt 2007, May 20-24, 2007, Barcelona, Spain

Last minute changes could be introduced in the conference program. Please, check the information on this page before and during the conference.

All events take place at the Catalonia Barcelona Plaza hotel, except for the Welcome Cocktail (on Monday evening) and the Gala Dinner (on Wednesday evening).

Sunday Monday Tuesday Wednesday Thursday
Registration
Session 1
Session 5 Session 8 Session 12
Session 2 Session 6
IACR Distinguished Talk
Session 9 Session 13
Invited Talk
Lunch
Session 3 Excursion Session 10
Registration
Welcome Reception
Session 4 Session 11
IACR Membership Meeting
Welcome Cocktail Rump Session Gala Dinner

       
Sunday, May 20, 2007
  17:00 - 20:30 Registration is open
  18:30 - 20:30 Welcome reception
Monday, May 21, 2007
  08:00 - 09:00 Registration
  09:00 - 09:10 Opening Remarks
  Session 1: Chair: Yuval Ishai 
  09:10 - 09:40 Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities PDF
    Marc Stevens, Arjen Lenstra and Benne de Weger
  09:40 - 10:10 Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist PDF
    Krzysztof Pietrzak
  10:10 - 10:40 The collision intractability of MDC-2 in the ideal-cipher model
    John P. Steinberger
  10:40 - 11:10 Coffee break
  Session 2: Chair: Serge Fehr 
  11:10 - 11:40 An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries PDF
    Yehuda Lindell and Benny Pinkas
  11:40 - 12:10 Revisiting the Efficiency of Malicious Two-Party Computation
    David P. Woodruff
  12:10 - 12:40 Efficient Two-Party Secure Computation on Committed Inputs PowerPoint
    Stanislaw Jarecki and Vitaly Shmatikov
  12:45 - 14:30 Lunch break
  Session 3: Chair: Giuseppe Persiano 
  14:30 - 15:00 Universally Composable Secure Computation Using Tamper-Proof Hardware PowerPoint
    Jonathan Katz
  15:00 - 15:30 Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model PowerPoint
    Moti Yung and Yunlei Zhao
  15:30 - 16:00 Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
    Yi Deng and Dongdai Lin
  16:00 - 16:30 Coffee break
  Session 4: Chair: Moni Naor 
  16:30 - 17:00 Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility PowerPoint
    Chun-Yuan Hsiao, Chi-Jen Lu and Leonid Reyzin
  17:00 - 17:50 Zero Knowledge and Soundness are Symmetric PowerPoint
    Shien Jin Ong and Salil Vadhan
  19:00 Welcome Cocktail
Tuesday, May 22, 2007
  Session 5: Chair: Dario Catalano 
  09:00 - 09:30 Mesh Signatures
    Xavier Boyen
  09:30 - 10:00 The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
    Thomas Ristenpart and Scott Yilek
  10:00 - 10:30 Batch Verification of Short Signatures
    Jan Camenisch, Susan Hohenberger and Michael Ostergaard Pedersen
  10:30 - 11:00 Coffee break
  Session 6: Chair: Xiaoyun Wang 
  11:00 - 11:30 Cryptanalysis of SFLASH with Slightly Modified Parameters PDF
    Vivien Dubois, Pierre-Alain Fouque and Jacques Stern
  11:30 - 12:00 Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy PDF
    Hongjun Wu and Bart Preneel
  12:00 - 12:10 Short break
  Session 7: IACR Distinguished Lecture Chair: Andy Clark 
  12:10 - 13:10 Cryptography from A to Z
    Jacques Stern
  13:10 - 14:40 Lunch
  Excursion
  15:00 - 19:00 Excursion
    Visit to 'Caves Codorniu' (Codorniu cellars)
  Rump Session
  20:00 Rump Session
Wednesday, May 23, 2007
  Session 8: Chair: Brent Waters 
  09:00 - 09:30 Secure Computation from Random Error Correcting Codes
    Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan and Vinod Vaikuntanathan
  09:30 - 10:00 Round-Efficient Secure Computation in Point-to-Point Networks
    Jonathan Katz and Chiu-Yuen Koo
  10:00 - 10:30 Atomic Secure Multi-Party Multiplication with Low Communication
    Ronald Cramer, Ivan Damgaard and Robbert de Haan
  10:30 - 11:00 Coffee break
  Session 9: Chair: Victor Miller 
  11:00 - 11:30 Cryptanalysis of the Sidelnikov cryptosystem PDF
    Lorenz Minder
  11:30 - 12:00 Toward a rigorous variation of Coppersmith's algorithm on three variables PDF
    Aurelie Bauer and Antoine Joux
  12:00 - 12:30 An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves
    Andreas Enge and Pierrick Gaudry
  12:45 - 14:30 Lunch break
  Session 10: Chair: Michel Abdalla 
  14:30 - 15:00 General Ad Hoc Encryption from Exponent Inversion IBE
    Xavier Boyen
  15:00 - 15:30 Non-Interactive Proofs for Integer Multiplication
    Ivan Damgard and Rune Thorbek
  15:30 - 16:00 Ate Pairing on Hyperelliptic Curves PDF
    Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault and Frederik Vercauteren
  16:00 - 16:30 Coffee break
  Session 11: Chair: Eran Tromer 
  16:30 - 17:00 Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit PDF
    Willi Geiselmann and Rainer Steinwandt
  17:00 - 17:30 Ideal Multipartite Secret Sharing Schemes PDF
    Oriol Farras, Jaume Marti-Farre and Carles Padro
  17:30 - 18:00 Divisible e-cash systems can be truly anonymous PowerPoint
    Sebastien Canard and Aline Gouget
  IACR Membership Meeting
  18:00 - 19:00 IACR Membership Meeting
  21:00 Gala dinner
Thursday, May 24, 2007
  Session 12: Chair: Nigel Smart 
  09:00 - 09:30 A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security PDF
    Ueli Maurer and Johan Sjodin
  09:30 - 10:00 Range Extension for Weak PRFs; The Good, the Bad, and the Ugly PDF
    Krzysztof Pietrzak and Johan Sjodin
  10:00 - 10:30 Feistel Networks made Public, and Applications PowerPoint
    Yevgeniy Dodis and Prashant Puniya
  10:30 - 11:00 Coffee break
  Session 13: Chair: Stefan Dziemowski 
  11:00 - 11:30 Oblivious-Transfer Amplification
    Juerg Wullschleger
  11:30 - 12:00 Simulatable Adaptive Oblivious Transfer
    Jan Camenisch, Gregory Neven and abhi shelat
  12:00 - 12:10 Short break
  Session 14: Invited Talk Chair: Bart Preneel 
  12:10 - 13:10 Elliptic Curves and Cryptography: Invention and Impact PDF
    Victor Miller
  13:10 - 13:15 Closing remarks
Last updated: Jul 3 18:25:23 2007 by webmaster_ec07 (at) ma4.upc.edu
Valid HTML 4.01 Transitional   Valid CSS