The detailed program for the rump session appears below.
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Eurocrypt 2010 rump session, Tuesday 1 June 2010 | ||||
19:00 | N.P. Smart | N.P. Smart | Cryptographic Ash Functions | slides |
19:04 | Jean-Sebastien Coron, David Naccache and Mehdi Tibouchi | David Naccache | Recent Progress on Affine RSA Forgery | slides |
19:08 | Divesh Aggarwal, Ueli Maurer, Igor Shparlinski | Divesh Aggarwal | The Equivalence of Strong RSA and Factoring in the Generic Ring Model of Computation | slides |
19:12 | METROFRANCE | Orr Dunkelman | New Results on RSA | slides |
19:14 | Dan Bogdanov and the Sharemind team | Dan Bogdanov | SecreC & Sharemind - a secure algorithm development platform | slides |
19:17 | Craig Gentry, Shai Halevi | Shai Halevi | A Working Implementation of Fully Homomorphic Encryption | slides |
19:20 | Michael Naehrig, Ruben Niederhagen, Peter Schwabe | Peter Schwabe | On the performance-security relation of cryptographic pairings | slides |
19:23 | Adam O'Neill, Chris Peikert | Chris Peikert | Bi-Deniable Encryption | slides |
19:27 | Martin Hirt, Vassilis Zikas | Vassilis Zikas | Player-Centric Byzantine Agreement | slides |
19:30 | Ueli Maurer and Bjoern Tackmann | Bjoern Tackmann | Formalizing the Malleability of Encryption | slides |
19:34 | Zvika Brakerski and Yael Kalai and Jonathan Katz and Vinod Vaikuntanathan | Vinod Vaikuntanathan | Cryptography with Continual Memory Leakage | slides |
19:37 | Stefano Tessaro | Stefano Tessaro | Block-Cipher Cascading Strikes Back: Tight Bounds for Security Amplification | slides |
19:41 | Alexander W. Dent | Alexander W. Dent | Extremal Pruning: Applying Game-Hopping Techniques in Real Life | slides |
19:46 | Break | |||
20:15 | Bart Preneel | Bart Preneel | What is the name of my dog: on not so secret answers to security questions | slides |
20:20 | Yuichi Komano, Koichiro Akiyama, Yoshikazu Hanatani, Hideyuki Miyake, Yasuhiro Goto | Koichiro Akiyama | A Very Light Post-Quantum Digital Signature using Algebraic Surfaces | |
20:23 | J.-C. Faugère, A. Otmani, L. Perret and J.-P. Tillich | L. Perret | A Distinguisher for High Rate McEliece Cryptosystems | slides |
20:27 | Carlos Aguilar Melchor and Philippe Gaborit and Javier Herranz | Carlos Aguilar | What real doctors will use for your prescriptions: Between Realism and Paranoia | slides |
20:32 | Tien-Ren Chen, Chun-Hung Hsiao, Ruben Niederhagen, Ming-Shing Chen, Chen-Mou Cheng, and Bo-Yin Yang | Bo-Yin Yang | What Price a Provably Secure Cipher? | slides |
20:36 | Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria | David Naccache | Very Close to Perfect Solutions Against Power Attacks | slides |
20:42 | Cihangir Tezcan | Cihangir Tezcan | An Invitation to Improbable Differential Cryptanalysis | slides |
20:46 | Jovan Golic, Guglielmo Morgari | Jovan Golic | The best known state recovery attacks on RC4 | slides |
20:50 | Orr Dunkelman and Nathan Keller and Adi Shamir | Orr Dunkelman | Improved Single-Key Attacks on 8-round AES | slides |
20:56 | Alex Biryukov and Dmitry Khovratovich | Dmitry Khovratovich | Revenge of the Boomerang | slides |
21:00 | Go home! | |||
Conference announcements, http://www.iacr.org/events/ | ||||
eCrypt Algorithms and Keysizes, document available, http://www.ecrypt.eu.org/documents.html | ||||
The New Codebreakers 2010, special issue, deadline June 2010, http://www.codebreakers2010.uni.lu/ | ||||
AppliedCrypto 2010, Santa Barbara, August 2010, http://2010.applied.cr.yp.to | ||||
Summer School on Applied Cryptographic Protocols, Mykonos, Greece, September 2010, http://summerschool2010.cased.de/home.html | ||||
Workshop on Elliptic Curve Computations, Redmond, Washington, October 2010, http://2010.eccworkshop.org/ | ||||
Asiacrypt 2010, Singapore, December 2010, http://www.spms.ntu.edu.sg/Asiacrypt2010/index.html | ||||
Pairing 2010, Yamanaka Hot Spring, Japan, December 2010, http://www.pairing-conference.org | ||||
FSE 2011, Lyngby, Denmark, February 2011, http://fse2011.mat.dtu.dk/ | ||||
PKC 2011, Taormina, Italy, March 2011, http://www.iacr.org/workshops/pkc2011/ | ||||
LightSec 2011, Istanbul, Turkey, March 2011 | ||||
Eurocrypt 2011, Tallinn, Estonia, May 2011, http://www.iacr.org/conferences/eurocrypt2011/ | ||||
Africacrypt 2011, Dakar, Senegal, July 2011, http://www.africacrypt2011.com/ | ||||
PQCrypto 2011, Taipei, Taiwan, November 2011, http://pq.crypto.tw/pqc11/ |