Tuesday, April 17, 2012
08.30 Registration Desk is opened
 
Session 6 Lossy Trapdoor Functions
Chair: Marc Fischlin
09.00 All-But-Many Lossy Trapdoor Functions
Dennis Hofheinz (Karlsruhe Institute of Technology)
09.25 Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare, Eike Kiltz, Chris Peikert, and Brent Waters (UC San Diego, Ruhr-University Bochum, Georgia Institute of Technology, and UT Austin)
09.50 Dual Projective Hashing and its Applications - Lossy Trapdoor Functions and More
Hoeteck Wee (George Washington University)
 
10.15 Coffee Break
 
Session 7 Tools
Chair: Ivan Visconti
10.45 Efficient Zero-Knowledge Argument for Correctness of a Shuffle
Stephanie Bayer and Jens Groth (University College London)
11.10 Malleable Proof Systems and Applications
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn (MSR Redmond, MSR Cambridge, Brown University, and UC San Diego)
11.35 Group to Group Commitments Do Not Shrink
Masayuki Abe, Kristiyan Haralambiev, and Miyako Ohkubo (NTT Japan, NYU, and NICT)
12.00 Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Allison Lewko (UT Austin)
 
12.30 Lunch (Robinson College)
 
Session 8 Symmetric Constructions II
Chair: Pierre-Alain Fouque
14.00 Minimalism in Cryptography: The Even-Mansour Scheme Revisited
Orr Dunkelman, Nathan Keller, and Adi Shamir (University of Haifa and Weizmann Institute of Science, Israel)
14.25 Message Authentication, Revisited
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, and Daniel Wichs (NYU, Ruhr-University Bochum, IST Austria, and IBM Research)
14.50 Property Preserving Symmetric Encryption
Omkant Pandey and Yannis Rouselakis (Microsoft Redmond and UT Austin)
 
15.15 Coffee Break
 
Session 9 Symmetric Cryptanalysis
Chair: Kaisa Nyberg
15.45 Narrow Bicliques: Cryptanalysis of Full IDEA
Dmitry Khovratovich, Gaetan Leurent, and Christian Rechberger (MSR Redmond, University of Luxembourg, and DTU Denmark)
16.10 Cryptanalyses on a Merkle-Damgard Based MAC --- Almost Universal Forgery and Distinguishing-H Attacks
Yu Sasaki (NTT)
16.35 Statistical Tools Flavor Side-Channel Collision Attacks
Amir Moradi (Ruhr-University Bochum)
 
 
19.00 Rump Session
Chair: Martijn Stam
Sponsored by Good Technologies