Skip to the navigation. Skip to the content.
EUROCRYPT 2013 in Athens
  • Home
  • Call for Papers
  • Accepted Papers
  • Sponsors
  • Registration
  • Program
  • Rump Session
  • Contact
  • Travelling
  • Upon Arrival
  • Accommodation
  • Restaurants
  • Wednesday Event
  • Stipends
  • Excursion


Eurocrypt 2013 Program


The social program will include a welcome reception on Sunday at the roof top of the conference hotel, dinner on your own on monday evening that will be coordinated by the conference local committee and a rump session on Tuesday evening at the hotel.

The conference gala dinner on Wednesday evening will be replaced by a standing event at the Acropolis museum. that will include food, drink and a private tour of the museum.

The conference will be preceded by an optional day excursion in the beautiful town of Nafplio outside of Athens.

Registration: The registration and conference helpers desk is located in front of the Olympia hall at Caravel. It will remain open from 4pm to 8pm on Sunday 26 of May, 8am-6pm Monday to Wednesday and 8am-2pm on Thursday the 30th.



Sunday, May 26
8:30 Departure for Nafplio - Caravel hotel lobby
16:00 Registration opens - Caravel Olympia Hall
19:30–22:00 Welcome Reception
Monday, May 27
08:50–9:00 Welcome
9:00–10:20Lattices (Chair: Phong Nguyen)
Candidate Multilinear Maps from Ideal Lattices (BEST PAPER)  
Sanjam Garg (UCLA, USA), Craig Gentry (IBM, USA) and Shai Halevi (IBM, USA)
Lossy Codes and a New Variant of the Learning-With-Errors Problem  
Nico Döttling and Jörn Müller-Quade (Karlsruhe Institute of Technology, Germany)
A Toolkit for Ring-LWE Cryptography  
Vadim Lyubashevsky (INRIA and ENS, France), Chris Peikert (Georgia Institute of Technology, USA) and Oded Regev (Courant Institute NYU, USA)
10:20–10:45 Break
10:45–12:25Public-key Encryption (Chair: Phil Rogaway)
Regularity of Lossy RSA on Subdomains and its Applications  
Mark Lewko (UCLA, USA), Adam O'Neill (Boston University, USA) and Adam Smith (Pennsylvania State University, USA)
Efficient Cryptosystems from 2^k-th Power Residue Symbols  
Marc Joye and Benoit Libert (Technicolor, France)
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions  
Ananth Raghunathan (Stanford University, USA), Gil Segev (Microsoft Research Silicon Valley, USA) and Salil Vadhan (Harvard University, USA)
How to Watermark Cryptographic Functions  
Ryo Nishimaki (NTT, Japan)
12:25–14:00 Lunch
14:00–15:15Side-channel Attacks (Chair: Frederik Armknecht)
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?  
Nicolas Veyrat-Charvillon (Universitè catholique de Louvain, Belgium), Benoót Gèrard (DGA-MI, France and Universitè catholique de Louvain, Belgium) and Franáois-Xavier Standaert (Universitè catholique de Louvain, Belgium)
Masking against Side Channel Attacks: a Formal Security Proof  
Emmanuel Prouff (ANSSI, France) and Matthieu Rivain (CryptoExperts, France)
Leakage-Resilient Cryptography from Minimal Assumptions  
Carmit Hazay (Bar Ilan University, Israel), Adriana Lopez-Alt (New York University, USA), Hoeteck Wee (George Washington University, USA) and Daniel Wichs (Northeastern University, USA)
15:15–15:40 Break
15:40–16:55Number Theory (Chair: Nigel Smart)
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields  
Antoine Joux (CryptoExperts and UVSQ, France)
Fast cryptography in genus 2  
Joppe W. Bos (Microsoft Research, USA), Craig Costello (Microsoft Research, USA), Huseyin Hisil (Yasar University, Turkey), and Kristin Lauter (Microsoft Research, USA)
Graph-Theoretic Algorithms for the Isomorphism of Polynomials Problem  
Charles Bouillaguet (University of Lille-1, France), Pierre-Alain Fouque (University of Rennes-1, France) and Amandine Vèber (École Polytechnique, France)
Tuesday, May 28
9:00–10:15Cryptanalysis of Hash Functions (Chair: Bart Preneel)
Cryptanalysis of Full RIPEMD-128  
Franck Landelle (DGA-MI, France) and Thomas Peyrin (Nanyang Technological University, Singapore)
New collision attacks on SHA-1 based on optimal joint local-collision analysis  
Marc Stevens (CWI Amsterdam, Netherlands)
Improving Local Collisions: New Attacks on Reduced SHA-256  
Florian Mendel, Tomislav Nad and Martin Schläffer (Graz University of Technology, Austria)
10:15–10:40 Break
10:40–11:30Storage (Chair: Thomas Johansson)
Dynamic Proofs of Retrievability via Oblivious RAM  
David Cash (Rutgers University, USA), Alptekin Kupcu (Koc University, Turkey) and Daniel Wichs (Northeastern University, USA)
Message-Locked Encryption and Secure Deduplication  
Mihir Bellare (UC San Diego, USA), Sriram Keelveedhi (UC San Diego, USA) and Thomas Ristenpart (University of Wisconsin, USA)
11:30–12:30 Invited talk: Keccak
Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche
12:30–14:00 Lunch
14:00–15:15Homomorphic Cryptography (Chair: Vadim Lyubashevsky)
Batch Fully Homomorphic Encryption over the Integers  
Jung Hee Cheon (Seoul National University, Korea), Jean-Sèbastien Coron (Tranef, France), Jinsu Kim (Seoul National University, Korea), Moon Sung Lee (Seoul National University, Korea), Tancrëde Lepoint (CryptoExperts and ENS, France), Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan), and Aaram Yun (Ulsan National Institute of Science and Technology, Korea).
Practical Homomorphic MACs for Arithmetic Circuits  
Dario Catalano (UniversitË di Catania, Italy) and Dario Fiore (MPI-SWS, Germany)
Streaming Authenticated Data Structures  
Charalampos Papamanthou (UC Berkeley, USA), Elaine Shi (University of Maryland, USA), Roberto Tamassia (Brown University, USA) and Ke Yi (HKUST, China)
15:15–15:40 Break
15:40–17:20Block Ciphers (Chair: Gregor Leander)
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting  
Patrick Derbez (ENS, France), Pierre-Alain Fouque (University of Rennes-1, France) and Jeremy Jean (ENS, France)
New Links Between Differential and Linear Cryptanalysis  
Cèline Blondeau and Kaisa Nyberg (Aalto University School of Science, Finland)
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption  
Jooyoung Lee (Sejong University, Korea)
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions  
Paul Baecher, Pooya Farshim, Marc Fischlin (TU Darmstadt, Germany) and Martijn Stam (University of Bristol, UK)
19:00– Rump Session Program can be found here
Wednesday, May 29
9:00–10:15Digital Signatures (Chair: Miyako Ohkubo)
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures  
Marc Fischlin (TU Darmstadt, Germany) and Nils Fleischhacker (Saarland University, Germany)
Practical Signatures From Standard Assumptions  
Florian Böhl and Dennis Hofheinz (Karlsruhe Institute of Technology, Germany), Tibor Jager (Ruhr-Universität Bochum, Germany), Jessica Koch (Karlsruhe Institute of Technology, Germany), Jae Hong Seo (NICT, Japan), and Christoph Striecks (Karlsruhe Institute of Technology, Germany)
Locally Computable UOWHF with Linear Shrinkage  
Benny Applebaum and Yoni Moses (Tel Aviv University, Israel)
10:15–10:40 Break
10:40–11:30Public Key Encryption (Chair: Eike Kiltz
Amplification of Chosen-Ciphertext Security  
Huijia Lin (MIT and Boston University, USA) and Stefano Tessaro (MIT, USA)
Circular chosen-ciphertext security with compact ciphertexts  
Dennis Hofheinz (Karlsruhe Institute of Technology, Germany)
11:30–12:30 The 2013 IACR Distinguished Lecture talk: (Chair: Bart Preneel)
How to Make a Difference: 25 Years of Differential Cryptanalysis

Eli Biham
12:30–14:00 Lunch
14:00–15:15Secure Computation (Chair: abhi shelat)
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions  
Tore Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt and Claudio Orlandi (Aarhus University, Denmark)
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation  
Payman Mohassel and Saeed Sadeghian (University of Calgary, Canada)
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction  
Dov Gordon (Applied Communication Sciences, USA), Tal Malkin (Columbia University, USA), Mike Rosulek (University of Montana, USA) and Hoeteck Wee (George Washington University, USA)
15:15–15:40 Break
15:40–16:35Quantum Cryptography (Chair: Eike Kiltz)
Quantum-Secure Message Authentication Codes  
Dan Boneh and Mark Zhandry (Stanford University, USA)
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games  
Marco Tomamichel (CQT, Singapore), Serge Fehr (CWI, Amsterdam), Jedrzej Kaniewski (CQT, Singapore) and Stephanie Wehner (CQT, Singapore)
16:35–17:35 IACR Membership Meeting
19:00 Departure for the Acropolis Museum event
Thursday, May 30
9:00–10:15Tools (Chair: Giuseppe Persiano)
Quadratic Span Programs and Succinct NIZKs without PCPs  
Rosario Gennaro (City College of New York, USA), Craig Gentry (IBM, USA), Bryan Parno (Microsoft Research, USA) and Mariana Raykova (IBM, USA)
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists  
Stephanie Bayer and Jens Groth (University College London, USA)
Resource-Restricted Indifferentiability  
Gregory Demay, Peter Gazi and Martin Hirt and Ueli Maurer (ETH Zurich, Switzerland)
10:15–10:40 Break
10:40–11:55Secure Computation (Chair: Jens Groth)
On Concurrently Secure Computation in the Multiple Ideal Query Model  
Vipul Goyal (Microsoft Research, India) and Abhishek Jain (MIT and BU, USA)
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions  
Rafail Ostrovsky, Alessandra Scafuro (UCLA, USA), Ivan Visconti (University of Salerno, Italy) and Akshay Wadia (UCLA, USA)
How to Garble RAM Programs  
Steve Lu (Stealth, USA) and Rafail Ostrovsky (UCLA, USA)
12:00 Farewell snack