CRYPTO 2004Program |
|
All events are in Campbell Hall (unless otherwise noted).
| Sunday, | August 15, 2004 | ||
| 17:00 | - | 20:00 | Registration, Santa Cruz Formal Lounge |
| 17:30 | - | 21:30 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn |
| Monday, | August 16, 2004 | ||
| 9:00 | - | 9:10 | Opening Remarks |
| Jim Hughes, General Chair | |||
| Session 1: |
Linear Cryptanalysis Chair: Willi Meier |
||
| 9:10 | - | 9:35 | On Multiple Linear Approximations |
| Alex Biryukov, Christophe De Cannière and Michaël Quisquater | |||
| 9:35 | - | 10:00 | Feistel Schemes and Bi-linear Cryptanalysis |
| Nicolas T. Courtois | |||
| 10:00 | - | 10:30 | Morning Break |
| Session 2: |
Group Signatures Chair: Tal Malkin |
||
| 10:30 | - | 10:55 | Short Group Signatures |
| Dan Boneh, Xavier Boyen and Hovav Shacham | |||
| 10:55 | - | 11:20 | Signature Schemes and Anonymous Credentials from Bilinear Maps |
| Jan Camenisch and Anna Lysyanskaya | |||
| Session 3: |
Invited Talk Chair: Matt Franklin |
||
| 11:20 | - | 12:20 | 14 Years of Chosen Ciphertext Security: A Survey of Public Key Encryption |
| Victor Shoup | |||
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
| Session 4: |
Foundations Chair: Rafail Ostrovsky |
||
| 14:00 | - | 14:25 | Complete Classification of Bilinear Hard-Core Functions |
| Thomas Holenstein, Ueli Maurer and Johan Sjödin | |||
| 14:25 | - | 14:50 | Finding Collisions on a Public Road, or Do Secure Hash Fuctions Need Secret Coins? |
| Chun-Yuan Hsiao and Leonid Reyzin | |||
| 14:50 | - | 15:15 | Security of Random Feistel Schemes with 5 or more rounds |
| Jacques Patarin | |||
| 15:15 | - | 15:45 | Afternoon Break |
| Session 5: |
Efficient Representations Chair: Alice Silverberg |
||
| 15:45 | - | 16:10 | Signed Binary Representations Revisited |
| Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn and Tsuyoshi Takagi | |||
| 16:10 | - | 16:35 | Compressed Pairings |
| Michael Scott and Paulo S. L. M. Barreto | |||
| 16:35 | - | 17:00 | Asymptotically Optimal Communication for Torus-Based Cryptography |
| Marten van Dijk and David Woodruff | |||
| 17:00 | - | 17:25 | How to Compress Rabin Ciphertexts and Signatures (and More) |
| Craig Gentry | |||
| 19:00 | - | 22:00 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn |
| Tuesday | August 17, 2004 | ||
| Session 6: |
Public Key Cryptanalysis Chair: Pil Joong Lee |
||
| 9:00 | - | 9:25 | On the Bounded Sum-of-digits Discrete Logarithm Problem in Finite Fields |
| Qi Cheng | |||
| 9:25 | - | 9:50 | Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring |
| Alexander May | |||
| 9:50 | - | 10:20 | Morning Break |
| Session 7: |
Zero-Knowledge Chair: Daniele Micciancio |
||
| 10:20 | - | 10:45 | Multi-trapdoor Commitments and their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-middle Attacks |
| Rosario Gennaro | |||
| 10:45 | - | 11:10 | Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model |
| Giovanni Di Crescenzo, Giuseppe Persiano and Ivan Visconti | |||
| 11:10 | - | 11:35 | Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks |
| Ivan Damgård, Serge Fehr and Louis Salvail | |||
| 11:35 | - | 12:00 | The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols |
| Mihir Bellare and Adriana Palacio | |||
| IACR Fellows Ceremony Chair: Andy Clark, IACR President |
|||
| 12:00 | - | 12:15 | IACR Fellows Ceremony - Campbell Hall |
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
| Free Afternoon | |||
| Tourism - Santa Barbara | |||
| 14:00 | - | 17:00 | Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby |
| Soccer - Lawn | |||
| Rump Session Chair: Stuart Haber |
|||
| 18:30 | - | 23:00 | Buffet and Open Bar - University Center |
| 19:00 | - | Late | Rump Session - University Center |
| Wednesday | August 18, 2004 | ||
| Session 8: |
Hash Collisions Chair: Ilya Mironov |
||
| 9:00 | - | 9:25 | Near-Collisions of SHA-0 |
| Eli Biham and Rafi Chen | |||
| 9:25 | - | 9:50 | Multicollisions in iterated hash functions. Application to cascaded constructions |
| Antoine Joux | |||
| 9:50 | - | 10:20 | Morning Break |
| Session 9: |
Secure Computation Chair: Phil MacKenzie |
||
| 10:20 | - | 10:45 | Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography |
| Masayuki Abe and Serge Fehr | |||
| 10:45 | - | 11:10 | Round-Optimal Secure Two-Party Computation |
| Jonathan Katz and Rafail Ostrovsky | |||
| Session 10: |
Invited Talk Chair: Bart Preneel |
||
| 11:10 | - | 12:10 | Security, Liberty, and Electronic Communications |
| Susan Landau | |||
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons |
| Session 11: |
Stream Cipher Cryptanalysis Chair: Anne Canteaut |
||
| 14:00 | - | 14:25 | An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators |
| Håvard Molland and Tor Helleseth | |||
| 14:25 | - | 14:50 | Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers |
| Philip Hawkes and Gregory G. Rose | |||
| 14:50 | - | 15:15 | Faster Correlation Attack on Bluetooth Keystream Generator E0 |
| Yi Lu and Serge Vaudenay | |||
| 15:15 | - | 15:45 | Afternoon Break |
| Session 12: |
Public Key Encryption Chair: Yevgeniy Dodis |
||
| 15:45 | - | 16:10 | A New Paradigm of Hybrid Encryption Scheme |
| Kaoru Kurosawa and Yvo Desmedt | |||
| 16:10 | - | 16:35 | Secure Identity Based Encryption Without Random Oracles |
| Dan Boneh and Xavier Boyen | |||
| Session 13: |
Bounded Storage Model Chair: Jee Hea An |
||
| 16:35 | - | 17:00 | Non-Interactive Timestamping in the Bounded Storage Model |
| Tal Moran, Ronen Shaltiel and Amnon Ta-Shma | |||
| IACR Business Meeting Chair: Andy Clark, IACR President |
|||
| 17:05 | - | 17:50 | IACR Membership meeting - Campbell Hall |
| 18:00 | - | 20:30 | Beach Barbecue - Goleta Beach |
| 20:00 | - | 22:30 | Crypto Café - Santa Cruz Formal Lounge |
| Thursday | August 19, 2004 | ||
| Session 14: |
Key Management Chair: John Black |
||
| 9:00 | - | 9:25 | IPAKE: Isomorphisms for Password-based Authenticated Key Exchange |
| Dario Catalano, David Pointcheval and Thomas Pornin | |||
| 9:25 | - | 9:50 | Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes |
| Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk and Tal Rabin | |||
| 9:50 | - | 10:15 | Efficient Tree-Based Revocation in Groups of Low-State Devices |
| Michael T. Goodrich, Jonathan Z. Sun and Roberto Tamassia | |||
| 10:15 | - | 10:45 | Morning Break |
Session 15: |
Computationally Unbounded Adversaries Chair: Yuval Ishai |
||
| 10:45 | - | 11:10 | Privacy-Preserving Datamining on Vertically Partitioned Databases |
| Cynthia Dwork and Kobbi Nissim | |||
| 11:10 | - | 11:35 | Optimal Perfectly Secure Message Transmission |
| K. Srinathan, Arvind Narayanan and C. Pandu Rangan | |||
| 11:35 | - | 12:00 | Pseudo-signatures, broadcast, and multi-party computation from correlated randomness |
| Matthias Fitzi, Stefan Wolf and Juerg Wullschleger | |||
| 12:00 | Conference Adjourns | ||
| 12:15 | - | 13:30 | Lunch - DeLaGuerra Commons |