| Tuesday, April 17, 2012 | |
|---|---|
| 19.00 |
Rump Session Chair: Martijn Stam |
| 19.00 | Finger Food |
| 19:30 |
Fellows Award
Bart Preneel IACR Fellows page |
| 19:45 |
PC on the PC
Thomas Johansson and David Pointcheval |
| 19:50 |
EuroStats
Nigel P. Smart |
| 19:53 |
Titan of Craptology
Simon Hoerder |
| 19:58 |
Complete cover decryption: the challenge of LNCS 6805
Jean-Jacques Quisquater LNCS 6805 |
| 20:03 |
Multiple Results on Multiple Encryption
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir IACR Eprint |
| 20:10 |
One Little Cipher Story
Alisa Koreneva and Vladimir Fomichev |
| 20:14 |
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov, Vinod Vaikuntanathan, and Hoeteck Wee |
| 20:17 |
Non-uniform cracks in the concrete
Daniel J. Bernstein and Tanja Lange |
| 20:24 |
DIAC - Directions in Authenticated Ciphers, July 05 - 06, 2012
Tanja Lange et al. Workshop Website |
| 20.25 | Dessert Break |
| 20:55 |
How to tell the birds from the primes
Ilya Mironov |
| 21:00 |
A Professional Science Masters in Applied Math in Information Security
Gregory V. Bard |
| 21:03 |
Event Announcement: FridgeCrypt 2013
Jon Callas, Tamzen Cannoy, and Nicko van Someren |
| 21:07 |
Secure Computation and the Combinatorics of Hidden Diversity
Juan Garay, David Johnson, Aggelos Kiayias, and Moti Yung |
| 21:12 |
Official Arbitration for Cloud Storage
Alptekin Küpçü Website |
| 21:17 |
The Cryptography of John Nash
Ron Rivest and Adi Shamir |
| 21:24 |
U-Prove Revocation with Accumulators
Lan Nguyen and Sherman S.M. Chow |
| 21:26 |
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro,Ivan Visconti, and Akshay Wadia IACR Eprint |
| 21:31 |
Efficient attacks and real-world provable security
Alexander W. Dent |
| 21:36 |
Singalong Song
Saqib A. Kakvi |
| 21:39 |
Provable Privacy Workshop
Bart Preneel Workshop Website |
| 21:39 |
Pub Quiz
Martijn Stam Answers |
| 22.00 | Closing Remarks |