Programme in PDF (A4, 2 pages, printerfriendly)
April 26, 2009 Sunday
10:00 – 17:00 Board Meeting (only IACR Board members)
17:00 – 21:00 Welcome Reception and Registration
April 27, 2009 Monday
08:30 Registration Desk open
09:00 – 09:15 Welcome / Opening Remarks
Session 1
09:15 – 10:55
Security, Proofs and Models I
09:15 – 09:40 Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, Scott Yilek
09:40 – 10:05 Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal, Ueli Maurer
10:05 – 10:30 Resettably Secure Computation
Vipul Goyal, Amit Sahai
10:30 – 10:55 On the Security Loss in Cryptographic Reductions
Chi-Jen Lu
10:55 – 11:25 Coffee Break
Invited Talk
11:25 – 12:25
Practice-Oriented Provable-Security and
the Social Construction of Cryptography

Phillip Rogaway
12:45 – 13:45 Lunch
Session 2
13:45 – 15:25
Hash Cryptanalysis 
13:45 – 14:10 On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
Praveen Gauravaram, Lars R. Knudsen
14:10 – 14:35 Cryptanalysis of MDC-2
Lars R. Knudsen, Florian Mendel, Christian Rechberger, Soeren S. Thomsen
14:35 – 15:00 Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
15:00 – 15:25 Finding Preimages in Full MD5 Faster than Exhaustive Search
Yu Sasaki, Kazumaro Aoki
15:25 – 16:25 Coffee Break + Poster Session Slot
Session 3
16:25 – 17:40
Group and Broadcast Encryption 
16:25 – 16:50 Asymmetric Group Key Agreement
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
16:50 – 17:15 Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
Craig Gentry, Brent Waters
17:15 – 17:40 Traitors Collaborating in Public: Pirates 2.0
Olivier Billet, Duong-Hieu Phan
April 28, 2009 Tuesday
08:30 Registration Desk open
Session 4
09:00 – 10:15
Cryptosystems I
09:00 – 09:25 Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi, Leonid Reyzin
09:25 – 09:50 Order-Preserving Symmetric Encryption
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill
09:50 – 10:15 A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
Kan Yasuda
10:15 11:10 Coffee Break + Poster Session Slot
Session 5
11:10 – 12:25
Cryptanalysis
11:10 – 11:35 On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
Guilhem Castagnos, Fabien Laguillaumie
11:35 – 12:00 Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur, Adi Shamir
12:00 – 12:25 Smashing SQUASH-0
Khaled Ouafi, Serge Vaudenay
12:25 – 13:45 Lunch
14:00 – 18:00 Social Program
  • City Walking Tour (2,5 h)
  • City Bike Tour (3h)
  • Chocolate Museum (1h)
  • Wallraf-Richartz Museum (1h)
  • Boat Cruise (1h)
18:00 – 23:00 Rump Session
April 29, 2009 Wednesday
09:00 – 9:15 Best Paper Award Ceremony
Session 6
09:15 – 10:30
Cryptosystems II
09:15 – 09:40 Practical Chosen Ciphertext Secure Encryption from Factoring
Dennis Hofheinz, Eike Kiltz
09:40 – 10:05 Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger, Brent Waters
10:05 – 10:30 A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Jan Camenisch, Nishanth Chandran, Victor Shoup
10:30 – 11:25 Coffee Break + Poster Session Slot
Invited Talk
11:25 – 12:25
Cryptography without (Hardly any) Secrets ?
Shafi Goldwasser
12:25 – 13:45 Lunch
Session 7
13:45 – 15:25
Security, Proofs and Models II
13:45 – 14:10 Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
14:10 – 14:35 On the Security of Padding-Based Encryption Schemes (Or: Why we cannot prove OAEP secure in the Standard Model)
Eike Kiltz, Krzysztof Pietrzak
14:35 – 15:00 Simulation without the Artifical Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare, Thomas Ristenpart
15:00 – 15:25 On the Portability of Generalized Schnorr Proofs
Jan Camenisch, Aggelos Kiayias, Moti Yung
15:25 – 15:45 Coffee Break
Session 8
15:45 – 16:35
Side Channels
15:45 – 16:10 A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Francoix-Xavier Standaert, Tal Malkin, Moti Yung
16:10 – 16:35 A Leakage-Resilient Mode of Operation
Krzysztof Pietrzak
16:45 – 18:00 IACR Membership Meeting
19:00 – 23:00 Conference Dinner - Boat Cruise (2h)
April 30, 2009 Thursday
Session 9
09:00 – 10:40
Curves
09:00 – 09:25

ECM on Graphics Cards
Daniel Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang

09:25 – 09:50 Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche, David Kohel, Francesco Sica
09:50 – 10:15 Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
Steven Galbraith, Xibin Lin, Michael Scott
10:15 – 10:40 Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields
Takakazu Satoh
10:40 – 11:10 Coffee Break + Poster Session Slot
Session 10
11:10 – 12:25
Randomness
11:10 – 11:35 Optimal Randomness Extraction from a Diffie-Hellman Element
Pierre-Alain Fouque, Sebastien Zimmer, David Pointcheval, Celine Chevalier
11:35 – 12:00 Verifiable Random Functions from Identity-based Key Encapsulation
Michel Abdalla, Dario Catalano, Dario Fiore
12:00 – 12:25 A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
12:25 – 12:40 Closing Remarks