
Program
Welcome reception and all technical sessions will be held at the Merchant Court Ballroom. PDF version of the program is available.
| Sunday, December 5 | |
| 17:30 – 20:30 | Registration |
| 18:30 – 20:30 | Welcome Reception (Merchant Court Ballroom, Section B) |
| Monday, December 6 | |
| 08:00 – 09:00 | Registration |
| 09:00 – 09:15 | Welcome and Opening Remarks |
| 09:15 – 10:30 | Session 1: Hash Attacks (I) (Chair: Mitsuru Matsui) |
| Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger |
|
| Finding Second Preimages of Short Messages for Hamsi-256 Thomas Fuhr |
|
| Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama and Kazuo Ohta |
|
| 10:30 – 11:00 | Morning Break |
| 11:00 – 12:00 | Invited Talk 1: Bart Preneel (Chair: Masayuki Abe) Cryptographic Hash Functions and the SHA-3 Competition |
| 12:00 – 13:40 | Lunch |
| 13:40 – 14:30 | Session 2: Hash Attacks (II) (Chair: Francois-Xavier Standaert) |
| Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo, San Ling, Christian Rechberger and Huaxiong Wang |
|
| Collision Attacks against the Knudsen-Preneel Compression Functions Onur Özen and Martijn Stam |
|
| 14:30 – 15:20 | Session 3: Symmetric-Key Cryptosystems (Chair: Hongjun Wu) |
| Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Emmanuel Volte, Valerie Nachef and Jacques Patarin |
|
| The World is Not Enough: Another Look on Second-Order DPA Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper and Stefan Mangard |
|
| 15:20 – 15:45 | Afternoon Break |
| 15:45 – 17:00 | Session 4: Block and Stream Ciphers (Chair: Claude Carlet) |
| Conditional Differential Cryptanalysis of NLFSR-based Cryptosystems Simon Knellwolf, Willi Meier and Maria Naya-Plasencia |
|
| A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng |
|
| Improved Single-Key Attacks on 8-round AES-192 and AES-256 Orr Dunkelman, Nathan Keller and Adi Shamir |
|
| 18:30 – 21:30 | Asiacrypt Steering Committee Meeting (Rosewood Room) |
| Tuesday, December 7 | |
| 08:30 – 09:00 | Registration |
| 09:00 – 10:15 | Session 5: Protocols (Chair: Dong-Hoon Lee) |
| Constant-Size Commitments to Polynomials and Their Applications Aniket Kate, Gregory M. Zaverucha and Ian Goldberg |
|
| Computationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay and Tomas Toft |
|
| Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro, Jihye Kim and Gene Tsudik |
|
| 10:15 – 10:40 | Morning Break |
| 10:40 – 11:30 | Session 6: Key Exchange (Chair: Serge Vaudenay) |
| Generic Compilers for Authenticated Key Exchange Tibor Jager, Florian Kohlar, Sven Schäge and Jörg Schwenk |
|
| A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT Eric Brier and Thomas Peyrin |
|
| 11:30 – 12:30 | Invited Talk 2: Hugo Krawczyk (Chair: Serge Vaudenay) Cryptography, from Theory to Practice: A Personal Perspective |
| 12:30 – 14:00 | Lunch |
| 14:00 – 18:00 | Guided Excursion (Optional) |
| 19:00 – 22:00 | Rump Session (Merchant Court Ballroom) |
| Wednesday, December 8 | |
| 08:30 – 09:00 | Registration |
| 09:00 – 10:15 | Session 7: Foundation (Chair: Hugo Krawczyk) |
| Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu and Bo-Yin Yang |
|
| On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger |
|
| Random Oracles With(out) Programmability Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam and Stefano Tessaro |
|
| 10:15 – 10:45 | Morning Break |
| 10:45 – 12:00 | Session 8: Zero-Knowledge (Chair: Payman Mohassel) |
| Short Pairing-based Non-interactive Zero-Knowledge Arguments Jens Groth |
|
| Short Non-interactive Zero-Knowledge Proofs Jens Groth |
|
| Optimistic Concurrent Zero Knowledge Alon Rosen and abhi shelat |
|
| 12:00 – 13:30 | Lunch |
| 13:30 – 14:45 | Session 9: Lattice-Based Cryptography (Chair: Willy Susilo) |
| Faster Fully Homomorphic Encryption Damien Stehlé and Ron Steinfeld |
|
| A Group Signature Scheme from Lattice Assumptions Dov Gordon, Jonathan Katz and Vinod Vaikuntanathan |
|
| Lattice-based Blind Signatures Markus Rückert |
|
| 14:45 – 15:10 | Afternoon Break |
| 15:10 – 16:50 | Session 10: Secure Communication and Computation (Chair: Huaxiong Wang) |
| The Round Complexity of Verifiable Secret Sharing: The Statistical Case Ranjit Kumaresan, Arpita Patra and C. Pandu Rangan |
|
| General Perfectly Secure Message Transmission Using Linear Codes Qiushi Yang and Yvo Desmedt |
|
| On Invertible Sampling and Adaptive Security Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi and Amit Sahai |
|
| Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition Chao Ning and Qiuliang Xu |
|
| 17:00 – 18:00 | IACR Membership Meeting (Merchant Court Ballroom) |
| 18:30 – 21:30 | Conference Banquet at Grand Shanghai Restaurant (Shuttle buses to and from the banquet venue will be provided) |
| Thursday, December 9 | |
| 08:30 – 09:00 | Registration |
| 09:00 – 10:15 | Session 11: Models, Notions and Assumptions (Chair: Rei Safavi-Naini) |
| A Closer Look at Anonymity and Robustness in Encryption Schemes Payman Mohassel |
|
| Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn, Hovav Shacham and David Mandell Freeman |
|
| The Semi-Generic Group Model and Applications to Pairing-Based Cryptography Tibor Jager and Andy Rupp |
|
| 10:15 – 10:40 | Morning Break |
| 10:40 – 12:20 | Session 12: Public-Key Encryption (Chair: San Ling) |
The Degree of Regularity of HFE Systems |
|
Structured Encryption and Controlled Disclosure |
|
| Leakage Resilient ElGamal Encryption Eike Kiltz and Krzysztof Pietrzak |
|
Efficient Public-Key Cryptography in the Presence of Key Leakage |
|
| 12:20 – 12:30 | Closing Remarks |
| 12:30 – 14:00 | Lunch |

