Call for Papers
Accepted Papers
Travel Info
Related events


PKC 2008, March 9-12, 2008, Barcelona, Spain

Last minute changes could be introduced in the conference program. Please, check the information on this page before and during the conference.

All events take place at the Aula Master (at Campus Nord, UPC), except for the Cocktail Party (on Monday evening) and the Gala Dinner (on Tuesday evening).

Sunday Monday Tuesday Wednesday
Session I Session IV Session VI
Session II Session V Session VII
Invited Talk I Invited Talk II Invited Talk III
Session III Visit Session VIII
Welcome Cocktail Cocktail Party Gala Dinner

Sunday, March 9, 2007
  18:00 - 20:00 Registration
  19:00 - 20:30 Welcome cocktail
Monday, March 10, 2007
  08:00 - 10:00 Registration
  08:45 - 09:00 Opening
    Chaired by the Rector of the Technical University of Catalonia (UPC)
Session I: Algebraic and Number Theoretical Cryptoanalysis (I) Chair: Steven Galbraith 
  09:00 - 09:30 Total Break of the $\ell$-IC Signature Scheme
    P.A. Fouque and G. Macariorat and L. Perret and J. Stern
  09:30 - 10:00 Recovering NTRU Secret Key From Inversion Oracles
    Petros Mol and Moti Yung
  10:00 - 10:30 Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
    Alexander May and Maike Ritzenhofen
  10:30 - 11:00 Coffee break
Session II: Theory of Public Key Encryption Chair: Eike Kiltz 
  11:00 - 11:30 Relations Among Notions of Plaintext Awareness
    James Birkett and Alexander W. Dent
  11:30 - 12:00 Completely Non-Malleable Encryption Revisited
    Carmine Ventre and Ivan Visconti
  12:00 - 12:15 Coffee break
Invited Talk I Chair: Ronald Cramer 
  12:15 - 13:15 The Role of Discrete Logarithms in Designing Secure CryptoSystems
    Victor Shoup (New York University)
  13:15 - 15:30 Lunch
Session III: Digital Signatures (I) Chair: Masayuki Abe 
  15:30 - 16:00 Off-Line/On-Line Signatures: Theoretical aspects and Experimental Results
    Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro
  16:00 - 16:30 Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
    Siamak F Shahandashti and Reihaneh Safavi-Naini
  16:30 - 17:00 Proxy Signatures Secure Against Proxy Key Exposure
    Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson
  18:30 Cocktail Party
    at FME (rooms Q and R)
Tuesday, March 11, 2007
Session IV: Identification, Broadcast and Key Agreement Chair: Moti Yung 
  09:00 - 09:30 Lattice-Based Identification Schemes Secure Under Active Attacks
    Vadim Lyubashevsky
  09:30 - 10:00 Efficient Simultaneous Broadcast
    Sebastian Faust and Emilia Kasper and Stefan Lucks
  10:00 - 10:30 SAS-Based Group Authentication and Key Agreement Protocols
    Sven Laur and Sylvain Pasini
  10:30 - 11:00 Coffee break
Session V: Implementation of Fast Arithmetic Chair: Jorge Villar 
  11:00 - 11:30 An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm
    Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
  11:30 - 12:00 New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields
    Patrick Longa and Ali Miri
  12:00 - 12:15 Coffee break
Invited Talk II Chair: Ronald Cramer 
  12:15 - 13:15 Cryptographic Test Correction
    David Naccache (ENS Paris)
  13:15 - 15:00 Lunch
  14:30 - 16:30 Visit to the Monastery of Pedralbes
  Free Afternoon
  20:00 Gala dinner
    at the Museum of the History of Catalonia
Wednesday, March 12, 2007
Session VI: Digital Signatures (II) Chair: Jens Groth 
  09:00 - 09:30 Online Untransferable Signatures
    Moses Liskov and Silvio Micali
  09:30 - 10:00 Security of Digital Signature Schemes in Weakened Random Oracle Models
    Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka
  10:00 - 10:30 A Digital Signature Scheme based on $CVP_\infty$
    Thomas Plantard and Willy Susilo and Khin Than Win
  10:30 - 11:00 Coffee break
Session VII: Algebraic and Number Theoretical Cryptoanalysis (II) Chair: Ronald Cramer 
  11:00 - 11:30 An analysis of the vector decomposition problem
    Steven D. Galbraith and Eric R. Verheul
  11:30 - 12:00 A Parameterized Splitting System and its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents
    Sungwook Kim and Jung Hee Cheon
  12:00 - 12:15 Coffee break
Invited Talk III Chair: Ronald Cramer 
  12:15 - 13:15 How to Secretly Extract Hidden Secret Keys: A State of the Attacks
    Jean-Jacques Quisquater (Université Catholique de Louvain)
  13:15 - 15:30 Lunch
Session VIII: Public Key Encryption Chair: Victor Shoup 
  15:30 - 16:00 Certificateless Encryption Schemes Strongly Secure in the Standard Model
    Alexander W Dent and Benoit Libert and Kenneth G. Paterson
  16:00 - 16:30 Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Benoit Libert and Damien Vergnaud
  16:30 - 17:00 Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
    Yi-Ru Liu and Wen-Guey Tzeng
  17:00 Conference adjourns
Last updated: Mar 13 12:24:56 2008 by jvillar (at) ma4.upc.edu
Valid HTML 4.01 Transitional   Valid CSS