| Main Page | Call for Papers | Contact Info | Program | Local Info | Registration | Rump Session | BoFs |
CRYPTO 2005ProgramPreliminary - subject to change |
| Sunday, August 14, 2005 | ||||
| 17:00 | - | 20:00 | Registration, Anacapa Formal Lounge | |
| 17:30 | - | 21:30 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn | |
| Monday, August 15, 2005 | ||||
| 09:00 | - | 09:10 | Opening Remarks | |
| Stuart Haber, General Chair | ||||
| Session 1 | Hash Functions | |||
| Chair | Victor Shoup | |||
| 09:10 | - | 09:35 | Efficient Collision Search Attacks on SHA-0 | |
| Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin | ||||
| 09:35 | - | 10:00 | Finding Collisions in the Full SHA-1 | |
| Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu | ||||
| 10:00 | - | 10:30 | Morning Break | |
| Session 2 | Theory | |||
| Chair | Stanislaw Jarecki | |||
| 10:30 | - | 10:55 | Pebbling and Proofs of Work | |
| Cynthia Dwork, Moni Naor, and Hoeteck Wee | ||||
| 10:55 | - | 11:20 | Composition Does Not Imply Adaptive Security | |
| Krzysztof Pietrzak | Presentation | |||
| Session 3 | IACR Distinguished Lecture | |||
| Chair | Andrew Clark | |||
| 11:20 | - | 12:20 | The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology | |
| Ralph Merkle | ||||
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
| Session 4 | Cryptanalysis | |||
| Chair | Arjen Lenstra | |||
| 14:00 | - | 14:25 | On the Discrete Logarithm Problem on Algebraic Tori | |
| Robert Granger and Fréderik Vercauteren | Presentation | |||
| 14:25 | - | 14:50 | A Practical Attack on a Braid Group Based Cryptographic Protocol | |
| Alexei Myasnikov, Vladimir Shpilrain, and Alexander Ushakov | ||||
| 14:50 | - | 15:15 | The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption | |
| Yi Lu, Willi Meier, and Serge Vaudenay | Presentation | |||
| 15:15 | - | 15:45 | Afternoon Break | |
| Session 5 | Zero Knowledge | |||
| Chair | Louis Salvail | |||
| 15:45 | - | 16:10 | Unconditional Characterizations of Non-Interactive Zero-Knowledge | |
| Rafael Pass and abhi shelat | ||||
| 16:10 | - | 16:35 | Impossibility and Feasibility Results for Zero Knowledge with Public Keys | |
| Joël Alwen, Giuseppe Persiano, and Ivan Visconti | Presentation | |||
| 16:35 | - | 17:00 | Communication-Efficient Non-Interactive Proofs of Knowledge with Online Extractors | |
| Marc Fischlin | ||||
| Nightlife | ||||
| 19:00 | - | 22:00 | Evening Reception, Anacapa/Santa Cruz Ocean Lawn | |
| Tuesday, August 16, 2005 | ||||
| Session 6 | Anonymity | |||
| Chair | Alice Silverberg | |||
| 09:00 | - | 09:25 | A Formal Treatment of Onion Routing | |
| Jan Camenisch and Anna Lysyanskaya | ||||
| 09:25 | - | 09:50 | Simple and Efficient Shuffling with Provable Correctness and ZK Privacy | |
| Kun Peng, Colin Boyd, and Ed Dawson | ||||
| 09:50 | - | 10:15 | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | |
| Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi | Presentation | |||
| 10:15 | - | 10:45 | Morning Break | |
| Session 7 | Privacy | |||
| Chair | Jonathan Katz | |||
| 10:45 | - | 11:10 | Private Searching on Streaming Data | |
| Rafail Ostrovsky and William Skeith | ||||
| 11:10 | - | 11:35 | Privacy-Preserving Set Operations | |
| Lea Kissner and Dawn Song | Presentation | |||
| Session 8 | Broadcast Encryption | |||
| Chair | Alexandra Boldyreva | |||
| 11:35 | - | 12:00 | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | |
| Dan Boneh, Craig Gentry, and Brent Waters | ||||
| 12:00 | - | 12:25 | Generic Transformation for Scalable Broadcast Encryption Schemes | |
| Jung Yeon Hwang, Dong Hoon Lee, and Jongin Lim | Presentation | |||
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
| Free Afternoon | ||||
| Tourism - Santa Barbara | ||||
| 14:00 | - | 17:00 | Birds of a Feather Sessions - See Schedule in Santa Cruz Lobby | |
| Soccer - Lawn | ||||
| 17:45 | - | 19:30 | Dinner - DeLaGuerra Commons | |
| Rump Session | ||||
| Chair | Phong Nguyen | |||
| 19:30 | - | 23:00 | Snacks and Open Bar - University Center | |
| 19:30 | - | Late | Rump Session - University Center | |
| Wednesday, August 17, 2005 | ||||
| Session 9 | Human-oriented Cryptography | |||
| Chair | Leonid Reyzin | |||
| 09:00 | - | 09:25 | Authenticating Pervasive Devices with Human Protocols | |
| Ari Juels and Stephen A. Weis | Presentation | |||
| 09:25 | - | 09:50 | Secure Communications over Insecure Channels Based on Short Authenticated Strings | |
| Serge Vaudenay | Presentation | |||
| 09:50 | - | 10:20 | Morning Break | |
| Session 10 | Secret Sharing | |||
| Chair | Amos Beimel | |||
| 10:20 | - | 10:45 | On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes | |
| Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimégnez Urroz, Gregor Leander, Jaume Martí-Farré, and Carles Padró | Presentation | |||
| 10:45 | - | 11:10 | Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | |
| Ronald Cramer, Serge Fehr, and Martijn Stam | Presentation | |||
| Session 11 | Invited Talk | |||
| Chair | Victor Shoup | |||
| 11:10 | - | 12:10 | Bilinear Maps in Cryptography | |
| Dan Boneh | ||||
| 12:30 | - | 13:45 | Lunch - DeLaGuerra Commons | |
| Session 12 | Multi-party Computation | |||
| Chair | Rebecca Wright | |||
| 14:00 | - | 14:25 | Secure Computation without Authentication | |
| Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, and Tal Rabin | ||||
| 14:25 | - | 14:50 | Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator | |
| Ivan Damgård and Yuval Ishai | Presentation | |||
| 14:50 | - | 15:15 | Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems | |
| Omer Barkol and Yuval Ishai | Presentation | |||
| 15:15 | - | 15:45 | Afternoon Break | |
| Session 13 | Random Oracles | |||
| Chair | Craig Gentry | |||
| 15:45 | - | 16:10 | Analysis of Random Oracle Instantiation Scenarios for OAEP and other Practical Schemes | |
| Alexandra Boldyreva and Marc Fischlin | ||||
| 16:10 | - | 16:35 | Merkle-Damgård Revisited : How to Construct a Hash Function | |
| Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, and Prashant Puniya | Presentation | |||
| 16:35 | - | 17:00 | On the Generic Insecurity of the Full-Domain Hash | |
| Yevgeniy Dodis, Roberto Oliveira, and Krzysztof Pietrzak | ||||
| IACR Business Meeting | ||||
| Chair | Andrew Clark, IACR President | |||
| 17:05 | - | 17:50 | IACR Membership meeting - Campbell Hall | |
| Nightlife | ||||
| 18:00 | - | 20:15 | Beach Barbecue - Goleta Beach | |
| 20:00 | - | 22:30 | Crypto Café - Santa Cruz Formal Lounge | |
| Thursday, August 18, 2005 | ||||
| Session 14 | Information Theoretic Security | |||
| Chair | Ilya Mironov | |||
| 09:00 | - | 09:25 | New Monotones and Lower Bounds in Unconditional Two-Party Computation | |
| Stefan Wolf and Juerg Wullschleger | ||||
| 09:25 | - | 09:50 | One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption | |
| Thomas Holenstein and Renato Renner | Presentation | |||
| 09:50 | - | 10:15 | A Quantum Cipher with Near Optimal Key-Recycling | |
| Ivan Damgård, Thomas B. Pedersen, and Louis Salvail | Presentation | |||
| 10:15 | - | 10:45 | Morning Break | |
| Session 15 | Primitives and Protocols | |||
| Chair | Moni Naor | |||
| 10:45 | - | 11:10 | An Efficient CDH-based Signature Scheme with a Tight Security Reduction | |
| Benoît Chevallier-Mames | Presentation | |||
| 11:10 | - | 11:35 | Improved Security Analyses for CBC MACs | |
| Mihir Bellare, Krzysztof Pietrzak, and Phillip Rogaway | Presentation | |||
| 11:35 | - | 12:00 | HMQV: A High-Performance Secure Diffie-Hellman Protocol | |
| Hugo Krawczyk | Presentation | |||
| 12:00 | Conference Adjourns | |||
| 12:15 | - | 13:30 | Lunch - DeLaGuerra Commons | |