| Main Page | Call for Papers | Contact Info | Program | Meals | Local Info | Registration | Rump Session | BoFs | 
| CRYPTO 2006Rump Schedule | 
| Tuesday evening, August 22nd | |
| 7:45 | Introduction | 
| Stuart Haber | |
| Cryptanalysis | |
| 7:50 | How not to protect PC's from power analysis | 
| Yossi Oren, Adi Shamir | |
| 7:55 | EMA attacks by scanning and invisible countermeasures | 
| Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater | |
| 7:59 | Forging some RSA signatures with pencil and paper | 
| Daniel Bleichenbacher | |
| 8:04 | A preview on branch misprediction attacks: | 
| Using Pentium performance counters to reduce the complexity of timing atttacks | |
| Alexander A. Veith, Andrei V. Belenko Alexei Zhukov | |
| 8:08 | FFT-based acoustic side-channel cryptanalysis of piano keystrokes | 
| Daniel J. Bernstein | |
| 8:08 | Analyzing Feistel networks with public intermediate values and applications | 
| Yevgeniy Dodis, Prashant Puniya | |
| Hashing | |
| 8:12 | SHA-1 collisions: Partial meaningful at no extra cost? | 
| Christophe De Cannière, Christian Rechberger | |
| 8:17 | Linear checksums don't help Damgard-Merkle | 
| John Kelsey, Praveen Gauravaram | |
| 8:22 | Constructing differential paths for SHA-1 collision attack | 
| Jun Yajima, Yu Sasaki, Teruyoshi Iwasaki, Yusuke Naito, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta | |
| 8:25 | On the complexity of collision attack against SHA-1 and new disturbance vectors | 
| Terutoshi Iwasaki, Jun Yajima, Yu Sasaki, Yusuke Naito, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta | |
| Encryption | |
| 8:28 | Lettuce-based cryptography | 
| J. Callas, Tamzen Cannoy, N. van Someren | |
| 8:31 | Does privacy require true randomness? | 
| Carl Bosley, Yevgeniy Dodis | |
| 8:34 | The disk encryption algorithm in Windows Vista | 
| Niels Ferguson | |
| 8:39 | Connect now to MitM | 
| Kaisa Nyberg | |
| 8:43 | BREAK | 
| Voting | |
| 8:55 | PunchScan and VoComp | 
| Rick Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, Jeremy Robin | |
| 9:00 | Tamper-evident, history-hiding data structures through cryptographic storage -or-Another way to store ballots on a voting machine | 
| John Bethencourt, Dan Boneh, Brent Waters | |
| Announcements | |
| 9:05 | Pairing 2007 | 
| Takeshi Okamoto | |
| 9:06 | ECC & Thematic Program in Cryptography at Fields Institute, Toronto | 
| Tanja Lange | |
| 9:07 | ACNS 2007 | 
| Jonathan Katz | |
| 9:08 | ECRYPT - European Network of Excellence in Cryptology and Watermarking | 
| Mats Naslund | |
| 9:09 | Workshop on Cryptographic Hardware and Embedded Systems | 
| Tsutomu Mastsumoto, Louis Goubin, Mitsuru Matsui | |
| 9:10 | IPAM tutorials in September | 
| Rafi Ostrovsky | |
| 9:11 | Workshop on Information-Theoretic Security | 
| Yvo Desmedt | |
| Miscellaneous | |
| 9:12 | On the compressibility of NP instances and cryptographic applications | 
| Danny Harnik, Moni Naor | |
| 9:15 | Explicit exclusive set systems with applications to broadcast encryption | 
| Craig Gentry, Zulfikar Ramzan, David Woodruff | |
| 9:18 | (In-)composability of quantum key distribution | 
| Robert Koenig, Renato Renner, Andor Bariska, Ueli Maurer | |
| 9:23 | Cryptanalysis of quantum randomness | 
| Paul Kocher | |
| 9:27 | New approaches to digital evidence | 
| Ueli Maurer | |
| 9:32 | From weak to strong watermarking | 
| Nicholas Hopper, David Molnar, David Wagner | |
| 9:36 | Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation | 
| Mihir Bellare, Tadayoshi Kohno, Victor Shoup | |
| 9:41 | BREAK | 
| Protocols | |
| 9:55 | Security against covert adversaries: Efficient protocols for realistic adversaries | 
| Yonatan Aumann, Yehuda Lindell | |
| 10:00 | Byzantine agreement with a rational adversary | 
| S. Dov Gordon, Jonathan Katz | |
| 10:02 | Towards optimal and efficient perfectly secure message transmission | 
| Matthias Fitzi, Matt Franklin, Juan Garay, S. Harsha Vardhan | |
| 10:06 | Deniability in key exchange protoocols | 
| Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk | |
| Announcements | |
| 10:10 | Reviving the dead 101 | 
| Tom Berson, Nigel Smart, Raphael Phan, Orr Dunkelman, Dan Page | |
| 10:13 | iChair | 
| Thomas Baignères, Matthieu Finiasz | |
| 10:15 | eBATS: ECRYPT benchmarking of asymmetric systems | 
| Daniel J. Bernstein, Tanja Lange | |
| 10:18 | Chasing the Rabbit | 
| Erik Zenner Daniel J. Bernstein | |
| 10:19 | The birthday paradox refuted | 
| Kira Ferguson | |
| Symmetric encryption | |
| 10:21 | Call for mode: Large-block tweakable encryption | 
| J. Hughes | |
| 10:23 | Inversion attacks on TEA | 
| Tamoghna Ghosh, Ramarathnam Venkatesan, Stuart Haber | |
| 10:26 | QUAD: Provably secure? | 
| Dan Bernstein, Chia-Hsin Owen Chen, Jiun-Ming Chen, Bo-Yin Yang | |
| 10:30 | On the security of Snow 2.0 | 
| Gregory V. Bard, Nicolas T. Courtois, Blandine Debraize, Louis Goubin | |
| 10:33 | Searchable symmetric encryption: Improved definitions and efficient constructions | 
| Reza Curtmola, Juan Garay, Seny Kamara, Rafi Ostrovsky | |
| Miscellaneous | |
| 10:35 | Is your most secret password on the public web? | 
| Jean-Jacques Quisquater | |
| 10:38 | Information-theoretically secure protocols and security under composition | 
| Eyal Kushilevitz, Yehuda Lindell, Tal Rabin | |
| 10:40 | How to win the clone wars | 
| Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich | |
| 10:45 | A knapsack identification and signature protocol | 
| John Kelsey | |
| 10:48 | Computationally asymmetric permutations, reversible-gates circuits: | 
| Alex E. Zhukov | |
| 10:52 | Universally composable security with global setup | 
| Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish | |
| 10:56 | Attribute-based encryption | 
| Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters | |
|  11:00  | Good night! |