- 
  			Opening
 Shiho Moriai
Annoucement
- 
			ProvSec 2010  (slides) (video)
 Swee-Huay Heng and Kaoru Kurosawa
- 
			Africacrypt 2010  (slides) (video)
 Ismail M. Idris, Dan Bernstein, Tanja Lange and Antoine Joux
- 
			ACISP 2010:Call For Papers  (slides) (video)
 *Ron Steinfeld
- 
			ICITS 2011  (slides, slides) (video)
 Serge Fehr and Yvo Desmedt
- 
			Crypto and Security Project of Strategic Japanese-Indian Cooperative Program on 
Multidisciplinary Research Field, which combines Information and Communications Technology with Other Fields
  (slides) (video)
 Kanta Matsuura, Takashi Nishide, Kouichi Sakurai and Hajime Watanabe
- 
			Asiacrypt 2010  (slides) (video)
 San Ling
- 
			Asiacrypt 2011  (slides) (video)
 Hyoung Joong Kim and Kwangjo Kim
Technical
- 
			A Practical-Time Attack on the Encryption Algorithm Used in Third Generation Telephony  
 Orr Dunkelman, Nathan Keller, and Adi Shamir
- 
			A Pathetic Related-key Attacks Faster than Exhaustive Search  
 Serge Vaudenay
- 
			Free-start preimages of step-reduced Blake compression function  (slides) (video)
 Lei Wang, Kazuo Ohta, and Kazuo Sakiyama
- 
			On Hamsi  
 Jean-Philippe Aumasson, Emilia Käsper, Lars Knudsen, Rune Ødegaard, Thomas Peyrin, and Martin Schläffer
- 
			Memoryless Near-Collisions via Coding Theory  (slides) (video)
 Mario Lamberger, Florian Mendel, Vincent Rijmen and Koen Simeons
- 
			Efficient Leakage-Resilient Signatures, AKA, and CCA Encryption 
 Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, and Daniel Wichs
- 
			Proxy Re-Encryption from Learning with Errors  (slides) (video)
 Keita Xagawa and Keisuke Tanaka
- 
			A Story of "United Nations" of Post Quantum Cryptography  (slides) (video)
 Licheng Wang and Lihua Wang
- 
			Multiparty Secure Computation over Multivariate Polynomials  (slides) (video)
 Moti Yung, Dana Dachman-Soled, Tal Malkin, and Mariana Raykova
- 
			Concise, uninformative proofs  (slides) (video)
 Adam Smith
- 
			Some Consequences about Oblivious Polynomial Evaluation from Existence of the Homomorphic and Non-Committing Encryption  (slides) (video)
 Chunhua Su, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai
- 
			Constructing Full-Homomorphic Encryption Schemes from Coding Theory  (slides) (video)
 Frederik Armknecht, Daniel Augot, Ludovic Perret, and Ahmad-Reza Sadeghi
- 
			Closing
 

 . and 
Shiho Moriai (Shiho.Moriai <at> jp.sony.com) BEFORE your presentation.
. and 
Shiho Moriai (Shiho.Moriai <at> jp.sony.com) BEFORE your presentation.














