| Program at a glance | Sunday, December 1 -- Reception @ JW Marriott | |||
|---|---|---|---|---|
| Monday, December 2 |
Tuesday, December 3 |
Wednesday, December 4 |
Thursday, December 5 |
|
| Session 1 | Zero-Knowledge | Theoretical Cryptography-II | Message Authentication Codes | Cryptographic Primitives |
| Session 2 | Algebraic Cryptography | Symmetric Key Cryptanalysis | Signatures | Cryptanalysis and Passwords |
| Session 3 | Theoretical Cryptography-I | invited talk by Lars R. Knudsen | invited talk by George Danezis | Leakage Resilient Cryptography |
| Session 4 | Protocols | Symmetric Key Cryptology: Schemes and Analysis | Cryptography Based upon Physical Assumptions | Two-Party Computation |
| Session 5 | - | Side-Channel Cryptanalysis | Multi-Party Computation | Hash Functions |
| Evening | - | 18:00 -- 19:00 IACR General Meeting 19:30 -- 21:30 Rump Session | 19:30 -- 22:00 Banquet | - |
| ASIACRYPT 2013 SCHEDULE | |
| Sunday, December 1 | |
| Reception: JW Marriott | 19:30 -- 23:00 |
| Registration: JW Marriott | 19:00 -- 21:00 |
| Monday, December 2 | |
| General Chair's Opening Remarks | 08:50 -- 09:00 |
| Session 1: Zero-Knowledge Chair: Tanja Lange |
09:00 -- 10:15 |
| Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces (Best Paper Award) [PPT] |
|
| Constant-Round Concurrent Zero Knowledge in the Bounded Player Model [PPT] |
|
| Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes |
|
| Coffee Break | 10:15 -- 10:45 |
| Session 2: Algebraic Cryptography Chair: Damien Stehlé |
10:45 -- 12:25 |
| Families of fast elliptic curves from Q-curves [PDF] |
|
| Four-dimensional GLV via the Weil restriction [PDF] |
|
| Discrete Gaussian Leftover Hash Lemma over Infinite Domains [PPT] |
|
| New Insight into the Isomorphism of Polynomial Problem IP1S and its Use in Cryptography [PDF] |
|
| Lunch Break | 12:25 -- 14:00 |
| Session 3: Theoretical Cryptography-I Chair: Helger Lipmaa | 14:00 -- 15:40 |
| Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited [PDF] |
|
| Reset Indifferentiability and its Consequences [PDF] |
|
| Computational Fuzzy Extractors [PDF] |
|
| Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization [PDF] |
|
| Coffee Break | 15:40 -- 16:10 |
| Session 4: Protocols Chair: Manoj Prabhakaran |
16:10 -- 17:50 |
| SPHF-Friendly Non-Interactive Commitments [PDF] |
|
| Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency [PDF] |
|
| Function-Private Subspace-Membership Encryption and Its Applications [PDF] |
|
| Random Projections, Graph Sparsification, and Differential Privacy [PDF] |
|
| Tuesday, December 3 | |
| Session 1: Theoretical Cryptography-II Chair: Shweta Agrawal |
09:00 -- 09:50 |
| Notions of Black-Box Reductions, Revisited [PDF] |
|
| Adaptive and Concurrent Secure Computation from New Adaptive, Non-Malleable Commitments |
|
| Session 2: Symmetric Key Cryptanalysis Chair: Yu Sasaki |
09:50 -- 11:05 |
| Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$ [PDF] |
|
| Key Difference Invariant Bias in Block Ciphers |
|
| Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE [PDF] |
|
| Coffee Break | 11:05 -- 11:35 |
| Session 3: Invited Talk Chair: Palash Sarkar |
11:35 -- 12:35 |
| Block ciphers - past and present |
|
| Lunch Break | 12:35 -- 14:00 |
| Session 4: Symmetric Key Cryptology: Schemes and Analysis Chair: Nicolas Sendrier |
14:00 -- 15:40 |
| A Modular Framework for Building Variable-Input-Length Tweakable Ciphers [PDF] |
|
| Parallelizable and Authenticated Online Ciphers [PDF] |
|
| How to Construct an Ideal Cipher from a Small Set of Public Permutations [PDF] |
|
| Generic Key Recovery Attack on Feistel Scheme |
|
| Coffee Break | 15:40 -- 16:10 |
| Session 5: Side-Channel Cryptanalysis Chair: Aggelos Kiayias |
16:10 -- 17:25 |
| Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests |
|
| Behind the Scene of Side Channel Attacks [PDF] |
|
| SCARE of Secret Ciphers with SPN Structures [PDF] |
|
| IACR General Meeting | 18:00 -- 19:00 |
| Rump Session | 19:30 -- 21:30 |
| Wednesday, December 4 | |
| Session 1: Message Authentication Codes Chair: Nadia Heninger |
09:00 -- 09:50 |
| New Generic Attacks Against Hash-based MACs [PDF] |
|
| Cryptanalysis of HMAC/NMAC-Whirlpool [PDF] |
|
| Session 2: Signatures Chair: Serge Vaudenay |
09:50 -- 11:05 |
| Lattice-Based Group Signatures with Logarithmic Signature Size [PDF] |
|
| The Fiat--Shamir Transformation in a Quantum World [PDF] |
|
| On the Security of One-Witness Blind Signature Schemes [PDF] |
|
| Coffee Break | 11:05 -- 11:35 |
| Session 3: Invited Talk Chair: Kazue Sako |
11:35 -- 12:35 |
| Engineering Privacy-Friendly Computations |
|
| Lunch Break | 12:35 -- 14:00 |
| Session 4: Cryptography Based upon Pysical Assumptions Chair: Moti Yung |
14:00 -- 15:40 |
| Unconditionally Secure and Universally Composable Commitments from Physical Assumptions [PDF] |
|
| Functional Encryption from (Small) Hardware Tokens |
|
| Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [PDF] |
|
| Tamper Resilient Circuits: The Adversary at the Gates [PDF] |
|
| Coffee Break | 15:40 -- 16:10 |
| Session 5: Multi-Party Computation Chair: Tatsuaki Okamoto |
16:10 -- 17:25 |
| Efficient General-Adversary Multi-Party Computation [PDF] |
|
| Fair and Efficient Secure Multiparty Computation with Reputation Systems |
|
| Between a Rock and a Hard Place: Interpolating Between MPC and FHE [PPTX] |
|
| Banquet | 19:30 -- 22:00 |
| Thursday, December 5 | |
| Session 1: Cryptographic Primitives Chair: Vipul Goyal | 09:00 -- 10:40 |
| Building Lossy Trapdoor Functions from Lossy Encryption [PDF] |
|
| Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters [PDF] |
|
| Constrained Pseudorandom Functions and Their Applications |
|
| Fully Homomorphic Message Authenticators [PDF] |
|
| Coffee Break | 10:40 -- 11:10 |
| Session 2: Cryptanalysis and Passwords Chair: Sanjit Chatterjee |
11:10 -- 12:25 |
| Non-uniform cracks in the concrete: the power of free precomputation [PDF] |
|
| Naturally Rehearsing Passwords [PPTX] |
|
Factoring RSA keys from certified smart cards: Coppersmith in the wild [PDF] |
|
| Lunch Break | 12:25 -- 14:00 |
| Session 3: Leakage Resilient Cryptography Chair: Rosario Gennaro |
14:00 -- 14:50 |
| Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter [PDF] |
|
| On Continual Leakage of Discrete Log Representations [PPTX] |
|
| Session 4: Two-Party Computation Chair: Arpita Patra |
14:50 -- 15:40 |
| Hiding the Input-Size in Secure Two-Party Computation [PDF] |
|
| Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique [PDF] |
|
| Coffee Break | 15:40 -- 16:10 |
| Session 5: Hash Functions Chair: Bart Preneel |
16:10 -- 17:50 |
| A heuristic for finding compatible differential paths with application to HAS-160 [PDF] |
|
| Improved Cryptanalysis of Reduced RIPEMD-160 [PDF] |
|
| Limited-birthday Distinguishers for Hash Functions Collisions Beyond the Birthday Bound can be Meaningful [PDF] |
|
| On Diamond Structures and Trojan Message Attacks |
|