CRYPTO 2004

Program


 

All events are in Campbell Hall (unless otherwise noted).

Sunday, August 15, 2004
17:00 - 20:00 Registration, Santa Cruz Formal Lounge
17:30 - 21:30 Evening Reception, Anacapa/Santa Cruz Ocean Lawn
Monday, August 16, 2004
9:00 - 9:10 Opening Remarks
Jim Hughes, General Chair
Session 1:

Linear Cryptanalysis
Chair: Willi Meier
9:10 - 9:35 On Multiple Linear Approximations
Alex Biryukov, Christophe De Cannière and Michaël Quisquater
9:35 - 10:00 Feistel Schemes and Bi-linear Cryptanalysis
Nicolas T. Courtois
10:00 - 10:30 Morning Break
Session 2:

Group Signatures
Chair: Tal Malkin
10:30 - 10:55 Short Group Signatures
Dan Boneh, Xavier Boyen and Hovav Shacham
10:55 - 11:20 Signature Schemes and Anonymous Credentials from Bilinear Maps
Jan Camenisch and Anna Lysyanskaya
Session 3:

Invited Talk
Chair: Matt Franklin
11:20 - 12:20 14 Years of Chosen Ciphertext Security: A Survey of Public Key Encryption
Victor Shoup
12:30 - 13:45 Lunch - DeLaGuerra Commons
Session 4:

Foundations
Chair: Rafail Ostrovsky
14:00 - 14:25 Complete Classification of Bilinear Hard-Core Functions
Thomas Holenstein, Ueli Maurer and Johan Sjödin
14:25 - 14:50 Finding Collisions on a Public Road, or Do Secure Hash Fuctions Need Secret Coins?
Chun-Yuan Hsiao and Leonid Reyzin
14:50 - 15:15 Security of Random Feistel Schemes with 5 or more rounds
Jacques Patarin
15:15 - 15:45 Afternoon Break
Session 5:

Efficient Representations
Chair: Alice Silverberg
15:45 - 16:10 Signed Binary Representations Revisited
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn and Tsuyoshi Takagi
16:10 - 16:35 Compressed Pairings
Michael Scott and Paulo S. L. M. Barreto
16:35 - 17:00 Asymptotically Optimal Communication for Torus-Based Cryptography
Marten van Dijk and David Woodruff
17:00 - 17:25 How to Compress Rabin Ciphertexts and Signatures (and More)
Craig Gentry
19:00 - 22:00 Evening Reception, Anacapa/Santa Cruz Ocean Lawn
Tuesday August 17, 2004
Session 6:

Public Key Cryptanalysis
Chair: Pil Joong Lee
9:00 - 9:25 On the Bounded Sum-of-digits Discrete Logarithm Problem in Finite Fields
Qi Cheng
9:25 - 9:50 Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring
Alexander May
9:50 - 10:20 Morning Break
Session 7:

Zero-Knowledge
Chair: Daniele Micciancio
10:20 - 10:45 Multi-trapdoor Commitments and their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-middle Attacks
Rosario Gennaro
10:45 - 11:10 Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model
Giovanni Di Crescenzo, Giuseppe Persiano and Ivan Visconti
11:10 - 11:35 Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks
Ivan Damgård, Serge Fehr and Louis Salvail
11:35 - 12:00 The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
Mihir Bellare and Adriana Palacio
  IACR Fellows Ceremony
Chair: Andy Clark, IACR President
12:00 - 12:15 IACR Fellows Ceremony - Campbell Hall
12:30 - 13:45 Lunch - DeLaGuerra Commons
Free Afternoon
Tourism - Santa Barbara
14:00 - 17:00 Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby
Soccer - Lawn
Rump Session
Chair: Stuart Haber
18:30 - 23:00 Buffet and Open Bar - University Center
19:00 - Late Rump Session - University Center
Wednesday August 18, 2004
Session 8:

Hash Collisions
Chair: Ilya Mironov
9:00 - 9:25 Near-Collisions of SHA-0
Eli Biham and Rafi Chen
9:25 - 9:50 Multicollisions in iterated hash functions. Application to cascaded constructions
Antoine Joux
9:50 - 10:20 Morning Break
Session 9:

Secure Computation
Chair: Phil MacKenzie
10:20 - 10:45 Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
Masayuki Abe and Serge Fehr
10:45 - 11:10 Round-Optimal Secure Two-Party Computation
Jonathan Katz and Rafail Ostrovsky
Session 10:

Invited Talk
Chair: Bart Preneel
11:10 - 12:10 Security, Liberty, and Electronic Communications
Susan Landau
12:30 - 13:45 Lunch - DeLaGuerra Commons
Session 11:

Stream Cipher Cryptanalysis
Chair: Anne Canteaut
14:00 - 14:25 An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Håvard Molland and Tor Helleseth
14:25 - 14:50 Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Philip Hawkes and Gregory G. Rose
14:50 - 15:15 Faster Correlation Attack on Bluetooth Keystream Generator E0
Yi Lu and Serge Vaudenay
15:15 - 15:45 Afternoon Break
Session 12:

Public Key Encryption
Chair: Yevgeniy Dodis
15:45 - 16:10 A New Paradigm of Hybrid Encryption Scheme
Kaoru Kurosawa and Yvo Desmedt
16:10 - 16:35 Secure Identity Based Encryption Without Random Oracles
Dan Boneh and Xavier Boyen
Session 13:

Bounded Storage Model
Chair: Jee Hea An
16:35 - 17:00 Non-Interactive Timestamping in the Bounded Storage Model
Tal Moran, Ronen Shaltiel and Amnon Ta-Shma
  IACR Business Meeting
Chair: Andy Clark, IACR President
17:05 - 17:50 IACR Membership meeting - Campbell Hall
18:00 - 20:30 Beach Barbecue - Goleta Beach
20:00 - 22:30 Crypto Café - Santa Cruz Formal Lounge
Thursday August 19, 2004
Session 14:

Key Management
Chair: John Black
9:00 - 9:25 IPAKE: Isomorphisms for Password-based Authenticated Key Exchange
Dario Catalano, David Pointcheval and Thomas Pornin
9:25 - 9:50 Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk and Tal Rabin
9:50 - 10:15 Efficient Tree-Based Revocation in Groups of Low-State Devices
Michael T. Goodrich, Jonathan Z. Sun and Roberto Tamassia
10:15 - 10:45 Morning Break

Session 15:

Computationally Unbounded Adversaries
Chair: Yuval Ishai
10:45 - 11:10 Privacy-Preserving Datamining on Vertically Partitioned Databases
Cynthia Dwork and Kobbi Nissim
11:10 - 11:35 Optimal Perfectly Secure Message Transmission
K. Srinathan, Arvind Narayanan and C. Pandu Rangan
11:35 - 12:00 Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
Matthias Fitzi, Stefan Wolf and Juerg Wullschleger
12:00 Conference Adjourns
12:15 - 13:30 Lunch - DeLaGuerra Commons


If you wish to be notified of Changes, by ChangeDetect


Back to Main