| Main Page | Call for Papers | Contact Info | Program | Meals | Local Info | Registration | Rump Session | BoFs |
CRYPTO 2006Rump Schedule |
| Tuesday evening, August 22nd | |
7:45 |
Introduction |
| Stuart Haber | |
| Cryptanalysis | |
7:50 |
How not to protect PC's from power analysis |
| Yossi Oren, Adi Shamir | |
7:55 |
EMA attacks by scanning and invisible countermeasures |
| Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater | |
7:59 |
Forging some RSA signatures with pencil and paper |
| Daniel Bleichenbacher | |
8:04 |
A preview on branch misprediction attacks: |
| Using Pentium performance counters to reduce the complexity of timing atttacks | |
| Alexander A. Veith, Andrei V. Belenko Alexei Zhukov | |
8:08 |
FFT-based acoustic side-channel cryptanalysis of piano keystrokes |
| Daniel J. Bernstein | |
8:08 |
Analyzing Feistel networks with public intermediate values and applications |
| Yevgeniy Dodis, Prashant Puniya | |
| Hashing | |
8:12 |
SHA-1 collisions: Partial meaningful at no extra cost? |
| Christophe De Cannière, Christian Rechberger | |
8:17 |
Linear checksums don't help Damgard-Merkle |
| John Kelsey, Praveen Gauravaram | |
8:22 |
Constructing differential paths for SHA-1 collision attack |
| Jun Yajima, Yu Sasaki, Teruyoshi Iwasaki, Yusuke Naito, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta | |
8:25 |
On the complexity of collision attack against SHA-1 and new disturbance vectors |
| Terutoshi Iwasaki, Jun Yajima, Yu Sasaki, Yusuke Naito, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta | |
| Encryption | |
8:28 |
Lettuce-based cryptography |
| J. Callas, Tamzen Cannoy, N. van Someren | |
8:31 |
Does privacy require true randomness? |
| Carl Bosley, Yevgeniy Dodis | |
8:34 |
The disk encryption algorithm in Windows Vista |
| Niels Ferguson | |
8:39 |
Connect now to MitM |
| Kaisa Nyberg | |
8:43 |
BREAK |
| Voting | |
8:55 |
PunchScan and VoComp |
| Rick Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, Jeremy Robin | |
9:00 |
Tamper-evident, history-hiding data structures through cryptographic storage -or-Another way to store ballots on a voting machine |
| John Bethencourt, Dan Boneh, Brent Waters | |
| Announcements | |
9:05 |
Pairing 2007 |
| Takeshi Okamoto | |
9:06 |
ECC & Thematic Program in Cryptography at Fields Institute, Toronto |
| Tanja Lange | |
9:07 |
ACNS 2007 |
| Jonathan Katz | |
9:08 |
ECRYPT - European Network of Excellence in Cryptology and Watermarking |
| Mats Naslund | |
9:09 |
Workshop on Cryptographic Hardware and Embedded Systems |
| Tsutomu Mastsumoto, Louis Goubin, Mitsuru Matsui | |
9:10 |
IPAM tutorials in September |
| Rafi Ostrovsky | |
9:11 |
Workshop on Information-Theoretic Security |
| Yvo Desmedt | |
| Miscellaneous | |
9:12 |
On the compressibility of NP instances and cryptographic applications |
| Danny Harnik, Moni Naor | |
9:15 |
Explicit exclusive set systems with applications to broadcast encryption |
| Craig Gentry, Zulfikar Ramzan, David Woodruff | |
9:18 |
(In-)composability of quantum key distribution |
| Robert Koenig, Renato Renner, Andor Bariska, Ueli Maurer | |
9:23 |
Cryptanalysis of quantum randomness |
| Paul Kocher | |
9:27 |
New approaches to digital evidence |
| Ueli Maurer | |
9:32 |
From weak to strong watermarking |
| Nicholas Hopper, David Molnar, David Wagner | |
9:36 |
Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation |
| Mihir Bellare, Tadayoshi Kohno, Victor Shoup | |
9:41 |
BREAK |
| Protocols | |
9:55 |
Security against covert adversaries: Efficient protocols for realistic adversaries |
| Yonatan Aumann, Yehuda Lindell | |
10:00 |
Byzantine agreement with a rational adversary |
| S. Dov Gordon, Jonathan Katz | |
10:02 |
Towards optimal and efficient perfectly secure message transmission |
| Matthias Fitzi, Matt Franklin, Juan Garay, S. Harsha Vardhan | |
10:06 |
Deniability in key exchange protoocols |
| Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk | |
| Announcements | |
10:10 |
Reviving the dead 101 |
| Tom Berson, Nigel Smart, Raphael Phan, Orr Dunkelman, Dan Page | |
10:13 |
iChair |
| Thomas Baignères, Matthieu Finiasz | |
10:15 |
eBATS: ECRYPT benchmarking of asymmetric systems |
| Daniel J. Bernstein, Tanja Lange | |
10:18 |
Chasing the Rabbit |
| Erik Zenner Daniel J. Bernstein | |
10:19 |
The birthday paradox refuted |
| Kira Ferguson | |
| Symmetric encryption | |
10:21 |
Call for mode: Large-block tweakable encryption |
| J. Hughes | |
10:23 |
Inversion attacks on TEA |
| Tamoghna Ghosh, Ramarathnam Venkatesan, Stuart Haber | |
10:26 |
QUAD: Provably secure? |
| Dan Bernstein, Chia-Hsin Owen Chen, Jiun-Ming Chen, Bo-Yin Yang | |
10:30 |
On the security of Snow 2.0 |
| Gregory V. Bard, Nicolas T. Courtois, Blandine Debraize, Louis Goubin | |
10:33 |
Searchable symmetric encryption: Improved definitions and efficient constructions |
| Reza Curtmola, Juan Garay, Seny Kamara, Rafi Ostrovsky | |
| Miscellaneous | |
10:35 |
Is your most secret password on the public web? |
| Jean-Jacques Quisquater | |
10:38 |
Information-theoretically secure protocols and security under composition |
| Eyal Kushilevitz, Yehuda Lindell, Tal Rabin | |
10:40 |
How to win the clone wars |
| Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich | |
10:45 |
A knapsack identification and signature protocol |
| John Kelsey | |
10:48 |
Computationally asymmetric permutations, reversible-gates circuits: |
| Alex E. Zhukov | |
10:52 |
Universally composable security with global setup |
| Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish | |
10:56 |
Attribute-based encryption |
| Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters | |
11:00 |
Good night! |