Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Crypto 2008 rump session, Tuesday 19 August 2008 | ||||
Awards | ||||
19:30 | Bart Preneel (IACR Big Kahuna) | Bart Preneel | New IACR Fellows Induction Ceremony | |
19:45 | Daniel J. Bernstein (chair) | Daniel J. Bernstein | Welcome to the rump session | |
19:46 | David Wagner (chair of something else) | David Wagner | CRYPTO 2008 Best Paper Award | slides |
19:49 | Tony Stieber | Tony Stieber | A Modest Drawing of Chance | slides |
19:52 | Susan Langford | Susan Langford | Crypto 2008 t-shirt prize | slides |
Voting | ||||
19:55 | Jim Hughes | Jim Hughes | 2008 BoD Election announcement | |
19:56 | John Kelsey, David Chaum, Tal Moran, Andrew Regenscheid | John Kelsey | Scratch off attacks on end-to-end voting systems | slides |
20:02 | David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y.A. Ryan, Emily Shen, Alan T. Sherman | David Chaum | Scantegrity II | |
20:07 | Ben Adida | Ben Adida | Helios: web-based cryptographic voting | slides |
20:11 | Jon Callas and Yvo Desmedt | Jon Callas and Yvo Desmedt | A privacy preserving electronic submission process | slides |
Encryption hardware | ||||
20:16 | Timo Kasper, Christof Paar | Timo Kasper, Christof Paar | KeeLoq attack demo that usually work (or: Murphy's Law also holds at CRYPTO). | slides |
20:21 | Krzysztof Pietrzak | Krzysztof Pietrzak | A Leakage-Resilient Mode of Operation for Block-Ciphers | slides |
20:25 | Axel Poschmann | Axel Poschmann | www.lightweightcrypto.org | slides |
20:26 | Danilo Gligoroski, Smile Markovski, Svein Johan Knapskog | Danilo Gligoroski | MQQ - A Public Key Block Cipher | slides |
20:31 | Jean-Jacques Quisquater | Jean-Jacques Quisquater | Why the Bellcore attack is not working against an ENIGMA machine. Parts 1 and 2 | slides |
20:36 | Break | |||
Foundations | ||||
20:55 | Michael Backes, Markus Duermuth, and Dominique Unruh | Markus Duermuth | Polynomially-secure crypto | slides |
20:59 | Ueli Maurer and Stefano Tessaro | Ueli Maurer | Efficient PRFs from Very Weak Assumptions | slides |
21:02 | Jon Callas and Yvo Desmedt | Jon Callas and Yvo Desmedt | Assumptions, assumptions(?), assumptions (??), .... | slides |
Stellar examples of public-key cryptography | ||||
21:07 | Brandon Enright, Eric Rescorla, Stefan Savage, Hovav Shacham, Scott Yilek | Hovav Shacham | insecure.iacr.org | slides |
21:14 | Hal Finney | Hal Finney | Looking Over Virtual Shoulders | slides |
21:18 | Yanbin Pan, Yingpu Deng | Yanbin Pan | Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem | slides |
21:23 | Phil Hirschhorn, Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte | Nick Howgrave-Graham | NTRUEncrypt Parameters secure against CRYPTO '07 hybrid attacks | slides |
21:24 | Eric Rescorla, Stefan Savage, Hovav Shacham, Terence Spies | Hovav Shacham | Paper Cryptography | slides |
Stellar examples of secret-key cryptography | ||||
21:31 | Eran Tromer | Eran Tromer | Cryptanalysis of the Gpcode.ak ransomware virus | slides |
21:36 | Yu Sasaki, Kazumaro Aoki | Yu Sasaki | Preimage Attacks on MD, HAVAL, SHA, and Others | slides |
21:41 | Elena Andreeva, Charles Bouillaguet, Orr Dunkelmann, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey Adi Shamir, and Sebastien Zimmer | John Kelsey | Trojan Message Attacks | slides |
21:48 | Timo Kasper, Axel Poschmann, Christof Paar, Guest | Timo Kasper, Axel Poschmann, Christof Paar, Guest | Breaking Ciphers with Special Purpose Hardware | slides |
21:51 | Break | |||
Public-key proofs | ||||
22:10 | Divesh Aggarwal and Ueli Maurer | Ueli Maurer | Breaking RSA Generically is Equivalent to Factoring | slides |
22:15 | Chris Peikert | Chris Peikert | Public-Key Encryption from the Worst-Case Shortest Vector Problem | slides |
22:20 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung | Moti Yung | Randomness-Extractor Key-Derivation Approach to CCA2-Secure Hybrid Encryption | slides |
22:24 | Peeter Laud | Peeter Laud | Computational soundness of formal encryption in the presence of key cycles, in the plain model | slides |
22:28 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar | Virendra Kumar | Identity-based Encryption with Efficient Revocation | slides |
22:31 | Ali Bagherzandi, Jung-Hee Cheon, Stanislaw Jarecki | Ali Bagherzandi | Multisignatures based on DL assumption | |
22:35 | Michael Backes, Matthias Berg, Dominique Unruh | Dominique Unruh | Formal Modelling of Cryptographic Games | slides |
Higher-level protocols | ||||
22:39 | Tal Moran, Moni Naor and Gil Segev | Moni Naor | An Optimally Fair Coin Toss | slides |
22:44 | Manoj Prabhakaran & Mike Rosulek | Mike Rosulek | Robust Protocols from Homomorphic-CCA Encryption | slides |
22:47 | Juan Garay and Daniel Wichs and Hong-Sheng Zhou | Daniel Wichs | Somewhat Non-committing Encryption and Adaptively Secure OT | slides |
22:51 | Mira Belenkiy, Melissa Chase, Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya | Alptekin Küpçü | Incentivizing Outsourced Computation | slides |
22:55 | Huijia Lin, Rafael Pass, Muthu Venkitasubramaniam | Huijia Lin | Unified Framework for Secure Multiparty Computation | slides |
23:00 | Fin! |
Bonus: COPACOBANA lyrics are now available.