All sessions and welcome reception are held at Hitotsubashi Memorial Hall,
2nd floor of National Center of Sciences Building. 
The building opens 8:30 in the morning everyday.
Please have your registration confirmation letter or conference badge with you,
which is needed to enter the building.
  
PDF Version is also available.
	
		| Sunday, December 6 | 
	
		| 17:30-20:30 | Registration | 
	
		| 18:30-20:30 | Welcome Reception | 
	|
	
		|  | 
	|
	
		| Monday, December 7 | 
	
		| 08:40 | Registration | 
		
		| 09:10-09:20 | Welcome and Opening Remarks | 
	
		| 09:20-10:35 | Session 1 - Block Ciphers (Chair: Orr Dunkelman) | 
	| 
		     
			Related-key Cryptanalysis of the Full AES-192 and AES-256 (slides) (video)Alex Biryukov and Dmitry Khovratovich
 
		     
			The Key-Dependent Attack on Block Ciphers (slides) (video)Xiaorui Sun and Xuejia Lai
 
		     
			Cascade Encryption Revisited (slides) (video)Peter Gaži and Ueli Maurer
 | 
	
		| 10:35-10:55 | Morning Break | 
	
		| 10:55-12:10 | Session 2 - Quantum and Post-Quantum (Chair: Serge Fehr) | 
	| 
		     
			Quantum-Secure Coin-Flipping and Applications (slides) (video)Ivan Damgård and Carolin Lunemann
 
		     
			On the Power of Two-Party Quantum Cryptography (slides) (video)Louis Salvail, Christian Schaffner and Miroslava Sotakova
 
		     
			Security Bounds for the Design of Code-based Cryptosystems (slides) (video)Matthieu Finiasz and Nicolas Sendrier
 | 
	
		| 12:10-13:40 | Lunch, Gakushi Kaikan | 
	
		| 13:30-15:10 | Session 3 - Hash Functions I (Chair: Josef Pieprzyk) | 
	| 
		     
			Rebound Attack on the Full LANE Compression Function (slides) (video)Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki and Martin Schläffer
 
		     
			Rebound Distinguishers: Results on the Full Whirlpool Compression Function (slides) (video)Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen and Martin Schläffer
 
		     
			MD5 is Weaker than Weak: Attacks on Concatenated Combiners (slides) (video)Florian Mendel, Christian Rechberger and Martin Schläffer
 
		     
			The Intel AES Instructions Set and the SHA-3 Candidates (slides) (video)Ryad Benadjila, Olivier Billet, Shay Gueron and Matt Robshaw
 | 
	
		| 15:20-15:40 | Afternoon Break | 
	
		| 15:40-17:20 | Session 4 - Encryption Schemes (Chair: Rei Safavi-Naini) | 
	| 
		     
			Group Encryption: Non-Interactive Realization in the Standard Model (slides) (video)Julien Cathalo, Benoît Libert and Moti Yung
 
		     
			On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations (slides) (video)Jonathan Katz and Arkady Yerukhimovich
 
		     
			Hierarchical Predicate Encryption for Inner-Products (slides) (video)Tatsuaki Okamoto and Katsuyuki Takashima
 
		     
			Hedged Public-Key Encryption: How to Protect Against Bad Randomness (slides) (video)Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham and Scott Yilek
 | 
	
		| 18:30-20:00 | Rump Session (Chair: Shiho Moriai) | 
	
		| See Rump Session page for the program. | 
	|
	
		|  | 
	|
	
		| Tuesday, December 8 | 
		
		| 08:40 | Registration | 
	
		| 09:10-10:25 | Session 5 - Multi Party Computation (Chair: Masayuki Abe) | 
	| 
		     
			Secure Two-Party Computation is Practical (slides) (video)Benny Pinkas, Thomas Schneider, Nigel P. Smart and Stephen C. Williams
 
		     
			Secure Multi-party Computation Minimizing Online Rounds (slides) (video)Seung Geol Choi, Ariel Elbaz, Tal Malkin and Moti Yung
 
		     
			Improved Non-Committing Encryption with Applications to Adaptively Secure Protocols (slides) (video)Seung Geol Choi, Dana Dachman-Soled, Tal Malkin and Hoeteck Wee
 | 
	
		| 10:25-10:45 | Morning Break | 
	
		| 10:45-12:00 | Session 6 - Cryptographic Protocols (Chair: Atsushi Fujioka) | 
	| 
		     
			Non-Malleable Statistically Hiding Commitment from Any One-Way Function (slides) (video)Zongyang Zhang, Zhenfu Cao, Ning Ding and Rong Ma
 
		     
			Proofs of Storage from Homomorphic Identification Protocols (slides) (video)Giuseppe Ateniese, Seny Kamara and Jonathan Katz
 
		     
			Simple Adaptive Oblivious Transfer Without Random Oracle (slides) (video)Kaoru Kurosawa and Ryo Nojima
 | 
	
		| 12:00-13:30 | Lunch, Gakushi Kaikan | 
		|
	
		|  | 
	|
	
		| Wednesday, December 9 | 
		| 08:40 | Registration | 
	
		| 09:10-10:25 | Session 7 - Hash Functions II (Chair: Tetsu Iwata) | 
	| 
		     
			Improved generic algorithms for 3-collisions (slides) (video)Antoine Joux and Stefan Lucks
 
		     
			A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical (slides) (video)Anja Lehmann and Stefano Tessaro
 
		     
			How to Confirm Cryptosystems Security: The Original Merkle-Damgård is Still Alive! (slides) (video)Yusuke Naito, Kazuki Yoneyama, Lei Wang and Kazuo Ohta
 | 
	
		| 10:25-10:45 | Morning Break | 
	
		| 10:45-12:00 | Session 8 - Models and Frameworks I (Chair: Ivan Visconti) | 
	| 
		     
			On the Analysis of Cryptographic Assumptions in the Generic Ring Model (slides) (video)Tibor Jager and Jörg Schwenk
 
		     
			Zero Knowledge in the Random Oracle Model, Revisited (slides) (video)Hoeteck Wee
 
		     
			A Framework for Universally Composable Non-Committing Blind Signatures (slides) (video)Masayuki Abe and Miyako Ohkubo
 | 
	
		| 12:00-13:30 | Lunch, Gakushi Kaikan | 
	
		| 13:30-14:45 | Session 9 - Cryptanalysis: Square and Quadratic (Chair: Jun Furukawa) | 
	| 
		     
			Cryptanalysis of the Square Cryptosystems (slides) (video)Olivier Billet and Gilles Macario-Rat (Yannick Seurin gives the talk)
 
		     
			Factoring $pq^2$ with Quadratic Forms: Nice Cryptanalyses (slides) (video)Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie and Phong Q. Nguyen
 
		     
			Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? (slides) (video)Mathias Herrmann and Alexander May
 | 
	
		| 14:45-15:05 | Afternoon Break | 
	
		| 15:05-15:55 | Session 10 - Models and Frameworks II (Chair: Serge Vaudenay) | 
	| 
		     
			Security Notions and Generic Constructions for Client Puzzles (slides) (video)Liqun Chen, Paul Morrissey, Nigel P. Smart and Bogdan Warinschi
 
		     
			Foundations of Non-Malleable Hash and One-Way Functions (slides) (video)Alexandra Boldyreva, David Cash, Marc Fischlin and Bogdan Warinschi
 | 
	
		| 16:00-17:00 | IACR Distinguished Lecture (Chair: Bart Preneel) | 
	| 
		     
			A New Approach on Bilinear Pairings and Its Applications (slides) (video)Tatsuaki Okamoto
 | 
	
		| 17:00-18:00 | IACR Business Meeting | 
	
		| 19:00-21:00 | Banquet, Meiji Kinenkan (Shuttle buses to/from the banquet venue available)
 | 
	|
	
		|  | 
	|
	
		| Thursday, December 10 | 
		
		| 08:40 | Registration | 
	
		| 09:10-10:25 | Session 11 - Hash Functions III (Chair: Xuejia Lai) | 
	| 
		     
			Improved Cryptanalysis of Skein (slides) (video)Jean-Philippe Aumasson, Çağdaş Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan and Kerem Varıcı
 
		     
			Linearization Framework for Collision Attacks: Application to CubeHash and MD6 (slides) (video)Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin
 
		     
			Preimages for Step-Reduced SHA-2 (slides) (video)Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki and Lei Wang
 | 
	
		| 10:25-10:45 | Morning Break | 
	
		| 10:45-12:00 | Session 12 - Lattice-Based (Chair: Phong Nguyen) | 
	| 
		     
			Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures (slides) (video)Vadim Lyubashevsky
 
		     
			Efficient Public Key Encryption Based on Ideal Lattices (slides) (video)Damien Stehlé, Ron Steinfeld, Keisuke Tanaka and Keita Xagawa
 
		     
			Smooth Projective Hashing and Password-Based Authenticated Key Exchange Based on Lattices (slides) (video)Jonathan Katz and Vinod Vaikuntanathan
 | 
	
		| 12:00-13:30 | Lunch, Gakushi Kaikan | 
	
		| 13:30-15:10 | Session 13 - Side Channels (Chair: Goichiro Hanaoka) | 
	| 
		     
			PSS is Secure against Random Fault Attacks (slides) (video)Jean-Sébastien Coron and Avradip Mandal
 
		     
			Cache-Timing Template Attacks (slides) (video)Billy Brumley and Risto Hakala
 
		     
			Memory Leakage-Resilient Encryption based on Physically Unclonable Functions (slides) (video)Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar and Pim Tuyls
 
		     
			Signature Schemes with Bounded Leakage Resilience (slides) (video)Jonathan Katz and Vinod Vaikuntanathan
 | 
	
		| 15:10-15:20 | Sayonara | 
   
  
  	The final version that will appear at the conference and proceedings is subject to change.
	PDF version is also available.
	
  	110. Improved Cryptanalysis of Skein
	Jean-Philippe Aumasson, Çağdaş Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan and Kerem Varıcı
	116. Secure Two-Party Computation is Practical
	Benny Pinkas, Thomas Schneider, Nigel P. Smart and Stephen C. Williams
	128. Security Notions and Generic Constructions for Client Puzzles
	Liqun Chen, Paul Morrissey, Nigel P. Smart and Bogdan Warinschi
	130. On the Analysis of Cryptographic Assumptions in the Generic Ring Model
	Tibor Jager and Jörg Schwenk
	134 .Fiat-Shamir With Aborts: Applications to Lattice and Factoring-Based Signatures
	Vadim Lyubashevsky
	145. Rebound Distinguishers: Results on the Full Whirlpool Compression Function
	Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen and Martin Schläffer
	152. PSS is Secure against Random Fault Attacks
	Jean-Sébastien Coron and Avradip Mandal
	157. Zero Knowledge in the Random Oracle Model, Revisited
	Hoeteck Wee
	168. Linearization Framework for Collision Attacks: Application to CubeHash and MD6
	Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin
	173. Improved generic algorithms for 3-collisions
	Antoine Joux and Stefan Lucks
	189. Non-Malleable Statistically Hiding Commitment from Any One-Way Function
	Zongyang Zhang, Zhenfu Cao, Ning Ding and Rong Ma
	202+302. Preimages for Step-Reduced SHA-2
	Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki and Lei Wang
	207. Cache-Timing Template Attacks
	Billy Brumley and Risto Hakala
	221. Related-key Cryptanalysis of the Full AES-192 and AES-256
	Alex Biryukov and Dmitry Khovratovich
	225. A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
	Anja Lehmann and Stefano Tessaro
	228. Security Bounds for the Design of Code-based Cryptosystems
	Matthieu Finiasz and Nicolas Sendrier
	231. On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
	Jonathan Katz and Arkady Yerukhimovich
	235. Memory Leakage-Resilient Encryption based on Physically Unclonable Functions
	Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar and Pim Tuyls
	246. Quantum-Secure Coin-Flipping and Applications
	Ivan Damgård and Carolin Lunemann
	250. Signature Schemes with Bounded Leakage Resilience
	Jonathan Katz and Vinod Vaikuntanathan
	255. Simple Adaptive Oblivious Transfer Without Random Oracle
	Kaoru Kurosawa and Ryo Nojima
	256. Improved Non-Committing Encryption with Applications to Adaptively Secure Protocols
	Seung Geol Choi, Dana Dachman-Soled, Tal Malkin and Hoeteck Wee
	262. Secure Multi-party Computation Minimizing Online Rounds
	Seung Geol Choi, Ariel Elbaz, Tal Malkin and Moti Yung
	268. Group Encryption: Non-Interactive Realization in the Standard Model
	Julien Cathalo, Benoît Libert and Moti Yung
	272. Foundations of Non-Malleable Hash and One-Way Functions
	Alexandra Boldyreva, David Cash, Marc Fischlin and Bogdan Warinschi
	274. Proofs of Storage from Homomorphic Identification Protocols
	Giuseppe Ateniese, Seny Kamara and Jonathan Katz
	276. Hierarchical Predicate Encryption for Inner-Products
	Tatsuaki Okamoto and Katsuyuki Takashima
	289. A Framework for Universally Composable Non-Committing Blind Signatures
	Masayuki Abe and Miyako Ohkubo
	296. How to Confirm Cryptosystems Security: The Original Merkle-Damgård is Still Alive!
	Yusuke Naito, Kazuki Yoneyama, Lei Wang and Kazuo Ohta
	303. Efficient Public Key Encryption Based on Ideal Lattices
	Damien Stehlé, Ron Steinfeld, Keisuke Tanaka and Keita Xagawa
	322. Cryptanalysis of the Square Cryptosystems
	Olivier Billet and Gilles Macario-Rat
	325. Cascade Encryption Revisited
	Peter Gaži and Ueli Maurer
	326. Factoring $pq^2$ with Quadratic Forms: Nice Cryptanalyses
	Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie and Phong Q. Nguyen
	331. The Key-Dependent Attack on Block Ciphers
	Xiaorui Sun and Xuejia Lai
	332. On the Power of Two-Party Quantum Cryptography
	Louis Salvail, Christian Schaffner and Miroslava Sotakova
	343. The Intel AES Instructions Set and the SHA-3 Candidates
	Ryad Benadjila, Olivier Billet, Shay Gueron and Matt Robshaw
	358. MD5 is Weaker than Weak: Attacks on Concatenated Combiners
	Florian Mendel, Christian Rechberger and Martin Schläffer
	368. Rebound Attack on the Full LANE Compression Function
	Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki and Martin Schläffer
	370. Hedged Public-Key Encryption: How to Protect Against Bad Randomness
	Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham and Scott Yilek
	385. Smooth Projective Hashing and Password-Based Authenticated Key Exchange Based on Lattices
	Jonathan Katz and Vinod Vaikuntanathan
	404. Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
	Mathias Herrmann and Alexander May