IACR, Eurocrypt, 2009, Preface

You are holding the proceedings of Eurocrypt 2009, the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. This conference was organized by the International Association for Cryptologic Research in cooperation with the Horst Görtz Institute for IT-Security at the Ruhr-Universit&aumplt Bochum. The local organization received additional support from several sponsors: Horst Görtz Stiftung, Deutsche Forschungsgemeinschaft, Bochum 2015, Secunet, NXP, IET, Taylor & Francis, AuthentiDate. The conference was held in Cologne, Germany.

The Eurocrypt 2009 Program Committee (PC) consisted of 29 members, listed on the next page. There were 148 submissions and 33 were selected to appear in this volume. Each submission was assigned to at least three PC members and reviewed anonymously. During the review process, the PC members were assisted by 131 external reviewers. Once the reviews were available, the committee discussed the papers in depth using the EasyChair conference management system. The authors of accepted papers were given five weeks to prepare the final versions included in these proceedings. The revised papers were not reviewed again and their authors bear the responsibility for their content.

In addition to the papers included in this volume, the conference also featured a Poster and a Rump session. The list of presented posters appears in this volume before the table of contents. Dan Bernstein served as the chair of the Rump session. The conference also had the pleasure of hearing invited talks by Shafi Goldwasser and Phillip Rogaway.

The program committee decided to give the Best Paper Award to Dennis Hofheinz and Eike Kiltz for their paper "Practical Chosen Ciphertext Secure Encryption from Factoring." In addition, the committee selected two other papers for invitation to the Journal of Cryptology : "On randomizing some hash functions to strengthen the security of digital signatures" by Praveen Gauravaram and Lars Knudsen, and "Possibility and Impossibility results for Encryption and Commitment secure under selective opening" by Mihir Bellare, Dennis Hofheinz and Scott Yilek.

I wish to thank all the people who contributed to this conference. First, all the authors who submitted their work. The PC members and their external reviewers for the thorough job they did while reading and commenting the submissions. Without them, selecting the papers for this conference would have been an impossible task. I thank Andrei Voronkov for his review system EasyChair, I was especially impressed by the tools that helped me while assembling this volume. I am grateful to Arjen Lenstra for the help and advice he gave as representative of the IACR Board. I also would like to thank the General Chair, Alexander May and his co-chairs for making this conference possible.

Being the program chair for Eurocrypt 2009 was a great honor and I may only hope that the readers of these proceedings will find them as interesting as I found the task of selecting their content.

February 2009                          Antoine Joux