Organization   In cooperation with IACR Springer LNCS


Time\Day Tue 19 Wed 20 Thu 21 Fri 22
09:00 - 09:30 Welcome day: transportation from airports and bus stations. Technical Session 1: Cryptanalysis I Technical Session 4: Network Security and Applications Technical Session 6: Cryptanalysis II
09:30 - 10:00
10:00 - 10:30 Technical Session 7: Verifiable Computation
10:30 - 11:00 Coffee-break Coffee-break
11:00 - 11:30 Brief Opening + Keynote 1 (G. Cox) Keynote 2 (G. Tsudik) Coffee-break
11:30 - 12:00 Keynote 4 (R. Gennaro)
12:00 - 12:30 Lunch Lunch
12:30 - 13:00 Lunch
13:00 - 14:00
14:00 - 14:30

Technical Session 2: Zero-knowledge Protocols

Technical Session 5: Advanced Cryptographic Primitives Farewell Excursion
14:30 - 15:00
15:00 - 15:30
15:30 - 16:00 Coffee-break Coffee-break
16:00 - 16:30 Technical Session 3: Distributed Protocols Keynote 3 (J. Stern)
16:30 - 17:00
19:00 - Banquet Dinner

Wednesday, November 20

09-10:30h - Technical Session 1: Cryptanalysis I

  • Differential Attacks on Generalized Feistel Schemes
    Valérie Nachef, Emmanuel Volte, and Jacques Patarin
    [abstract] [slides]
  • Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
    Bo Zhu, Yin Tan, and Guang Gong
    [abstract] [slides]
  • Padding Oracle Attack on PKCS#1 v1.5: Can non-standard implementation act as a shelter?
    Gao Si, Chen Hua, and Fan Limin
    [abstract] [slides]

11-12:00h - Keynote 1

  • Solving The Platform Entropy Problem – Phase 2
    George Cox, Intel Corporation
    [more info] [slides]

14-15:30h - Technical Session 2: Zero-Knowledge Protocols

  • Zero Knowledge Proofs from Ring-LWE
    Xiang Xie, Rui Xue, Minqian Wang
    [abstract] [slides]
  • Zero Knowledge with Rubik’s Cubes and Non-Abelian Groups
    Emmanuel Volte, Jacques Patarin, and Valérie Nachef
    [abstract] [slides]
  • Efficient Modular NIZK Arguments from Shift and Product
    Prastudy Fauzi, Helger Lipmaa, and Bingsheng Zhang
    [abstract] [slides]

16-17:00h - Technical Session 3: Distributed Protocols

  • Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
    Yong Li and Zheng Yang
    [abstract] [slides]
  • Achieving Correctness in Fair Rational Secret Sharing
    Sourya Joyee De and Asim K. Pal
    [abstract] [slides]

Thursday, November 21

09-10:30h - Technical Session 4: Network Security and Applications

  • BotSuer: Suing Stealthy P2P Bots in Network Traffic Through Netflow Analysis
    Nizar Kheir and Chirine Wolley
    [abstract] [slides]
  • Resource Access Control in the Facebook Model
    Konstantinos Chronopoulos, Maria Gouseti, and Aggelos Kiayias
    [abstract] [slides]
  • Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
    Babins Shrestha, Nitesh Saxena, and Justin Harrison
    [abstract] [slides]

11-12:00h - Keynote 2

  • Security and Privacy in Named-Data Networking
    Gene Tsudik, University of California, Irvine (UCI)
    [more info] [slides]

14-15:30h - Technical Session 5: Advanced Cryptographic Primitives

  • Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
    Mihir Bellare and Adam O’Neill
    [abstract] [slides]
  • Efficient Lossy Trapdoor Functions based on Subgroup Membership Assumptions
    Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, and Yamin Liu
    [abstract] [slides]
  • Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions
    Veronika Kuchta and Mark Manulis
    [abstract] [slides]

16-17:00h - Keynote 3

  • What is public key cryptanalysis?
    Jacques Stern, École Normale Supérieure
    [more info]

19:00h - Banquet Dinner

Praça do Chafariz, S/N

Friday, November 22

09-10:00h - Technical Session 6: Cryptanalysis II

  • A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
    Tomer Ashur and Orr Dunkelman
    [abstract] [slides]
  • Truncated Differential Analysis of Reduced-Round LBlock
    Sareh Emami, Cameron McDonald, Josef Pieprzyk, and Ron Steinfeld
    [abstract] [slides]

10-11:00h - Technical Session 7: Verifiable Computation

  • How to Update Documents Verifiably in Searchable Symmetric Encryption
    Kaoru Kurosawa and Yasuhiro Ohtaki
    [abstract] [slides]
  • Private Outsourcing of Polynomial Evaluation and Matrix Multiplication using Multilinear Maps
    Liang Feng Zhang and Rehanehi Safavi-Naini
    [abstract] [slides]

11:30-12:30h - Keynote 4

  • A Survey of Verifiable Delegation of Computations
    Rosario Gennaro, The City College of New York

    [more info] [slides]

14:00 - Farewell Excursion

Details coming soon.