ASIACRYPT 2014 Program

DAY 0 Sunday, December 7

16:00 - 18:30 Registration @ Lobby
18:00 - 20:00 Welcome Reception @ Market Café, 1F

DAY 1 Monday, December 8

08:00 - 17:00 Registration
08:50 - 09:00 Opening Remarks
09:00 - 09:50 Technical session 1: Cryptology and Coding Theory
Session Chair: Huaxiong Wang
  S1-1 Solving LPN Using Covering Codes
Qian Guo; Thomas Johansson; Carl Löndahl
S1-2 Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form
Jean-Charles Faugère; Ludovic Perret; Frédéric de Portzamparc
09:50 - 10:40 Technical session 2: New Proposals
Session Chair: Serge Vaudenay
  S2-1 Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh; Henry Corrigan-Gibbs
S2-2 Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov; Charles Bouillaguet; Dmitry Khovratovich
10:40 - 11:10 Coffee Break
11:10 - 12:25 Technical session 3: Authenticated Encryption
Session Chair: Thomas Peyrin
  S3-1 Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic; Atul Luykx; Bart Mennink
S3-2 How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva; Andrey Bogdanov; Atul Luykx; Bart Mennink; Nicky Mouha; Kan Yasuda
S3-3 Forging Attacks on two Authenticated Encryption Schemes COBRA and POET
Mridul Nandi
12:25 - 14:00 Lunch @ Market Café, 1F
14:00 - 15:40 Technical session 4: Symmetric Key Cryptanalysis
Session Chair: Itai Dinur
  S4-1 Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami; San Ling; Ivica Nikolić; Josef Pieprzyk; Huaxiong Wang
S4-2 Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun; Lei Hu; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Ling Song
S4-3 Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
Christina Boura; María Naya-Plasencia; Valentin Suder
S4-4 A Simplified Representation of AES
Henri Gilbert
15:40 - 16:10 Coffee Break
16:10 - 17:50 Technical session 5: Side Channel Analysis I
Session Chair: Mitsuru Matsui
  S5-1 Simulatable Leakage: Analysis, Pitfalls, and new Constructions
Jake Longo; Daniel P. Martin; Elisabeth Oswald; Daniel Page; Martijn Stam; Michael J. Tunstall
S5-2 Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather; Elisabeth Oswald; Carolyn Whitnall
S5-3 GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias
Diego F. Aranha; Pierre-Alain Fouque; Benoît Gérard; Jean-Gabriel Kammerer; Mehdi Tibouchi; Jean-Christophe Zapalowicz
S5-4 Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon; Benoît Gérard; François-Xavier Standaert
18:00 - 20:00 AsiaCrypt Steering Committee Meeting @ Union Hall, 2F

DAY 2 Tuesday, December 9

08:00 - 17:00 Registration
09:00 - 10:15 Technical session 6: Hyperelliptic Curve Cryptography
Session Chair: Steven Galbraith
  S6-1 On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
S6-2 Kummer strikes back: new DH speed records
Daniel J. Bernstein; Chitchanok Chuengsatiansup; Tanja Lange; Peter Schwabe
S6-3 Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil; Craig Costello
10:15 - 11:05 Technical session 7: Factoring and Discrete Log
Session Chair: Tanja Lange
  S7-1 Mersenne factorization factory
Thorsten Kleinjung; Joppe W. Bos; Arjen K. Lenstra
S7-2 Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux; Cécile Pierrot
11:05 - 11:35 Coffee Break
11:35 - 12:35 Technical session 8: Invited Talk I
Session Chair: Tetsu Iwata
Big Bias Hunting in Amazonia: Large-scale Computation and Exploitation of RC4 Biases
Kenneth G. Paterson
12:35 - 14:00 Lunch @ Top of Ambassador, 20F
14:00 - 15:40 Technical session 9: Cryptanalysis
Session Chair: Xuejia Lai
  S9-1 Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque; Antoine Joux; Chrysanthi Mavromati
S9-2 Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur; Orr Dunkelman; Nathan Keller; Adi Shamir
S9-3 Meet-in-the-Middle Attacks on Generic Feistel Constructions
Jian Guo; Jérémy Jean; Ivica Nikolić; Yu Sasaki
S9-4 XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
15:40 - 16:10 Coffee Break
16:10 - 17:00 Technical session 10: Signatures
Session Chair: Mehdi Tibouchi
  S10-1 Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser; Daniel Slamanig
S10-2 On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker; Tibor Jager; Dominique Schröder
17:00 - 17:50 Technical session 11: Zero-Knowledge
Session Chair: Eiichiro Fujisaki
  S11-1 Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis; Cédric Fournet; Jens Groth; Markulf Kohlweiss
S11-2 Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
Fabrice Benhamouda; Jan Camenisch; Stephan Krenn; Vadim Lyubashevsky; Gregory Neven
19:30 - 21:30 Rump Session

DAY 3 Wednesday, December 10

08:00 - 17:00 Registration
09:00 - 10:15 Technical session 12: Encryption Schemes
Session Chair: Duong-Hieu Phan
  S12-1 Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoît Libert; Marc Joye; Moti Yung; Thomas Peters
S12-2 Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas; Vadim Lyubashevsky; Thomas Prest
S12-3 Order-Preserving Encryption Secure Beyond One-Wayness
Isamu Teranishi; Moti Yung; Tal Malkin
10:15 - 11:05 Technical session 13: Outsourcing and Delegation
Session Chair: Hugo Krawczyk
  S13-1 Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
Kai-Min Chung; Zhenming Liu; Rafael Pass
S13-2 Adaptive Security of Constrained PRFs
Georg Fuchsbauer; Momchil Konstantinov; Krzysztof Pietrzak; Vanishree Rao
11:05 - 11:35 Coffee Break
11:35 - 12:35 Technical session 14: Invited Talk II
Session Chair: Palash Sarkar
The Legal Infrastructure Around Information Security in Asia
Helaine Leggat
12:35 - 14:00 Lunch @ Market Café, 1F
14:00 - 15:40 Technical session 15: Obfuscation
Session Chair: Jens Groth
  S15-1 Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare; Igors Stepanovs; Stefano Tessaro
S15-2 Using Indistinguishability Obfuscation via UCEs
Christina Brzuska; Arno Mittelbach
S15-3 Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska; Arno Mittelbach
S15-4 Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum
15:40 - 16:10 Coffee Break
16:10 - 17:25 Technical session 16: Homomorphic Cryptography
Session Chair: Sherman S.M. Chow
  S16-1 Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo; Aaram Yun
S16-2 Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano; Antonio Marcedone; Orazio Puglisi
S16-3 Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård; Bernardo David; Irene Giacomelli; Jesper Buus Nielsen
17:30 –18:30 IACR Membership Meeting
19:30 - 22:00 Banquet @ International Hall, 2F

DAY 4 Thursday, December 11

08:00 - 17:00 Registration
09:00 - 09:50 Technical session 17: Secret Sharing
Session Chair: Moti Yung
  S17-1 Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki; Aggelos Kiayias; Hugo Krawczyk
S17-2 Secret-Sharing for NP
Ilan Komargodski; Moni Naor; Eylon Yogev
09:50 - 10:40 Technical session 18: Block Ciphers and Passwords
Session Chair: Christina Boura
  S18-1 Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean; Ivica Nikolić; Thomas Peyrin
S18-2 Memory-Demanding Password Scrambling
Christian Forler; Stefan Lucks; Jakob Wenzel
10:40 - 11:10 Coffee Break
11:10 - 12:25 Technical session 19: Side Channel Analysis II
Session Chair: Marc Stevens
  S19-1 Side-Channel Analysis of Multiplications in $GF(2^{128})$: Application to AES-GCM
Sonia Belaïd; Pierre-Alain Fouque; Benoît Gérard
S19-2 Higher-Order Threshold Implementations
Begül Bilgin; Benedikt Gierlichs; Svetla Nikova; Ventzislav Nikov; Vincent Rijmen
S19-3 Masks will Fall Off: Higher-Order Optimal Distinguishers
Nicolas Bruneau; Sylvain Guilley; Annelie Heuser; Olivier Rioul
12:25 - 14:00 Lunch @ Top of Ambassador, 20F
14:00 - 14:50 Technical session 20: Black-Box Separation
Session Chair: Kai-Min Chung
  S20-1 Black-Box Separations for One-More (Static) CDH and Its Generalization
Jiang Zhang; Zhenfeng Zhang; Yu Chen; Yanfei Guo; Zongyang Zhang
S20-2 Black-Box Separations for Differentially Private Protocols
Dakshita Khurana; Hemanta K. Maji; Amit Sahai
14:50 - 15:40 Technical session 21: Composability
Session Chair: Benoit Libert
  S21-1 Composable Security of Delegated Quantum Computation
Vedran Dunjko; Joseph F. Fitzsimons; Christopher Portmann; Renato Renner
S21-2 All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
15:40 - 16:10 Coffee Break
16:10 - 17:50 Technical session 22: Multi-Party Computation
Session Chair: Josef Pieprzyk
  S22-1 Multi-Valued Byzantine Broadcast: the t < n Case
Martin Hirt; Pavel Raykov
S22-2 Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen; Yehuda Lindell
S22-3 Actively Secure Private Function Evaluation
Payman Mohassel; Saeed Sadeghian; Nigel P. Smart
S22-4 Efficient, Oblivious Data Structures for MPC
Marcel Keller; Peter Scholl