The list of accepted papers can be found 
here. The program of the Rump Session can be found 
here.
Monday Feb. 8, 2010
17:30-19:00 : Registration/Cocktail 
Tuesday Feb. 9, 2010
9:00-9:30 : Registration
9:25-9:30 : Opening Remarks
9:30-10:40 : Parallel Repetition   (chair: Jens Groth)
10:40-11:10 : Break
11:10-11:55 :  Obfuscation   (chair: Stefan Wolf)
12:00-13:00 : Invited Talk   (chair: Victor Shoup)
"Privacy-Enhancing Cryptography: From
Theory Into Practice", 
Jan Camenisch
13:15-14:45 : Lunch
15:00-16:10 :  Multiparty Computation   (chair: Amos Beimel)
- 
  "On Complete Primitives for Fairness", 
  Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
- 
  "On the Necessary and Sufficient
  Assumptions for UC Computation", Ivan Damgård, Jesper Buus
  Nielsen, Claudio Orlandi
- 
  "From Passive to Covert Security at Low
  Cost", Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
16:10-16:40 : Break
16:40-17:25 :  CCA Security   (chair: Daniele Micciancio)
19:00-22:00 : Fondue Dinner
Wednesday Feb. 10, 2010
9:30-10:40 : Threshold Cryptography and Secret Sharing   (chair: Victor Shoup)
10:40-11:10 : Break
11:10-12:45 : Symmetric Cryptography   (chair: Stefan Wolf)
- 
  "A Hardcore Lemma for Computational
  Indistinguishability: Security Amplification for Arbitrarily Weak PRGs
  with Optimal Stretch", Ueli Maurer, Stefano Tessaro
- 
  "On Related-Secret Pseudorandomness", 
  David Goldenberg, Moses Liskov
- 
  "A Domain Extender for the Ideal
  Cipher", Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal,
  Yannick Seurin
- 
  "Delayed-Key Message Authentication for
  Streams", Marc Fischlin, Anja Lehmann
13:15-14:45 : Lunch
15:00-16:10 : Key Leakage and Tamper Resistance   (chair: Amos Beimel)
- 
  "Founding Cryptography on Tamper-Proof
  Hardware Tokens", Vipul Goyal, Yuval Ishai, Amit Sahai,
  Ramarathnam Venkatesan, Akshay Wadia
- 
  "Truly Efficient String Oblivious
  Transfer Using Resettable Tamper-Proof Tokens",
  Vladimir Kolesnikov
- 
  "Leakage-Resilient Signatures", 
   Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
16:10-16:40 : Break
16:40-17:25 : Key Leakage and Tamper Resistance (cont.)   (chair: Daniele Micciancio)
18:30-22:00 : Rump Session 
{Dinner: 18:30,  Talks: 20:00}
  (chair: Nelly Fazio)
Thursday Feb. 11, 2010
9:30-10:40 : Rationality and Privacy   (chair: Alon Rosen)
10:40-11:10 : Break
11:10-11:55 : Public Key Encryption   (chair: Nelly Fazio)
12:00-13:00 : Invited Talk   (chair: Alon Rosen)
"Secure Computation and Its Diverse
Applications", 
Yuval Ishai
13:15-14:45 : Lunch
15:00-16:10 : Zero Knowledge   (chair: Jens Groth)
16:10-16:40 : Break
16:40-17:45 : Zero Knowledge (cont.)   (chair: Alon Rosen)
17:45 : Farewell