The call for submissions has been archived on a separate page. Slides are now available from all presenters who agreed to have their slides officially online.
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Crypto 2011 rump session, Tuesday 16 August 2011 | ||||
Session 1 | ||||
19:30 | Bart Preneel | Bart Preneel | The 2011 IACR Fellowship Induction Ceremony | |
19:55 | Andy Clark, Whit Diffie, David Naccache, Jean-Jacques Quisquater, Peter Ryan | Jean-Jacques Quisquater | An historical call for papers ... | slides |
19:57 | Christiane Peters | Christiane Peters | Playing "Spot the Difference" with Springer | slides |
20:00 | Eli Biham, Nathan Keller, Orr Dunkelman, Adi Shamir | Orr Dunkelman | Rethinking IDEA | slides |
20:04 | Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger | Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger | Biclique cryptanalysis of the full AES | slides |
20:10 | Niels Ferguson | Niels Ferguson | Observations on H-PRESENT-128 | slides |
20:14 | Faith Chaza and Ian Goldberg | Faith Chaza and Ian Goldberg | An Application Of Frequency Shift Keying To Communication Resynchronisation | slides |
20:16 | Itai Dinur, Orr Dunkelman, Adi Shamir | Adi Shamir | GOSTBUSTERS 2 | |
20:20 | Danilo Gligoroski | Danilo Gligoroski | Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files | slides |
20:23 | Dustin Moody and Souradyuti Paul | Souradyuti Paul | Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes | slides |
20:27 | Yuji Suga | Yuji Suga | Variants of Sponge-like Construction | slides |
20:30 | Break | |||
Session 2 | ||||
20:50 | Danilo Gligoroski | Danilo Gligoroski | A silent competition for ultra-fast public key cryptography | slides |
20:53 | Damien Robert, Adi Shamir | Adi Shamir | Extracting Discrete Logs in Edwards Curves From a Single Unknown Message | |
20:58 | Jon Callas, Tamzen Cannoy and Nicko van Someren | Brian LaMacchia | Secure Verification of Delegated Presentation Delivery | slides |
21:01 | Gene Kopp, John Wiltshire-Gordon | Gene Kopp, John Wiltshire-Gordon | Robust Coin Flipping | slides |
21:06 | Peter Schmidt-Nielsen | Peter Schmidt-Nielsen | FlipIt and the Cramér-Rao bound | slides |
21:09 | Moses Liskov and Orr Dunkelman | Moses Liskov | Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium) | slides |
21:14 | Eric Demaine, Martin Demaine, Jean-Jacques Quisquater, Michaël Quisquater | Jean-Jacques Quisquater | An update about HiDalgo: | slides |
21:17 | Ian Goldberg, Kevin McCurley, and Moti Yung | Daniel J. Bernstein (panel moderator) | Panel discussion on leakage | slides |
21:20 | Abhishek Banerjee, Chris Peikert, Alon Rosen | Chris Peikert | Pseudorandom Functions and Lattices | slides |
21:24 | Shweta Agrawal, David Freeman, Vinod Vaikuntanathan | Shweta Agrawal | Predicate Encryption for Inner Products from LWE | slides |
21:28 | Nadia Heninger and Henry Cohn | Nadia Heninger | A brief chat about approximate GCDs | slides |
21:32 | Daniele Micciancio and Chris Peikert | Chris Peikert | Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller | slides |
21:36 | Tom Roeder | Tom Roeder | Bounds on Cloud File Retrievability | slides |
21:40 | Break | |||
Session 3 | ||||
22:00 | Victor Miller | Victor Miller | Feel Safe at Last! | slides |
22:01 | Yvo Desmedt and Pyrros I. P. Chaidos | Yvo Desmedt | Blinding ballot copying in Helios: from Condorcet to IACR | slides |
22:06 | David Chaum, Jeremy Clark, Aleks Essex, Ronald Rivest, Alan Sherman, Poorvi Vora, Filip Zagorski | Filip Zagorski | Remotegrity | slides |
22:11 | Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer | Eran Tromer | The Hunting of the SNARK | slides |
22:16 | Tatsuaki Okamoto, Katsuyuki Takashima | Katsuyuki Takashima | Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption | slides |
22:20 | Stefan Dziembowski and Tomasz Kazana and Maciej Obremski | Stefan Dziembowski | Non-Malleable Codes in the Split-State Model | |
22:24 | NIST Computer Security Division | Rene Peralta | NIST Announcements | slides |
22:28 | Yan Huang, David Evans, Jonathan Katz, Lior Malka | Yan Huang | (More) Efficient Secure Computation from Garbled Circuits | slides |
22:33 | Harry Buhrman, Serge Fehr, Christian Schaffner, Florian Speelman | Christian Schaffner | The Garden-Hose Model | slides |
22:37 | Benoit Libert and Moti Yung | Moti Yung | "Extreme" Threshold Cryptosystems | slides |
22:42 | Megumi Ando and Moses Liskov | Moses Liskov | Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience | slides |
22:47 | Carl Bosley, Kristiyan Haralambiev, and Antonio Nicolosi | Carl Bosley | HB^N: An HB-like protocol secure against Man-in-the-Middle attacks | slides |
22:51 | Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis | Mariana Raykova | Secure Computation with Sublinear Amortized Work | slides |
22:55 | Tom Berson, Nigel Smart, Raphael C.-W. Phan, Orr Dunkelman, Dan Page | Orr Dunkelman | Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes | slides |
23:00 | Fin! | |||
Announcements, http://www.iacr.org/events/ | ||||
Joshua Davis is a journalist here: digital cash (New Yorker), crypto generally. Need coverage? | ||||
CHES2011, September 2011, http://www.iacr.org/workshops/ches/ches2011/ | ||||
CARDIS: a conference about smart cards: September 2011, Leuven, Belgium | ||||
Lightweight Cryptography, 28-29 November 2011, http://www.uclouvain.be/crypto/ecrypt_lc11/welcome | ||||
PQCrypto 2011, Taipei, 29 November-2 December, http://pq.crypto.tw/pqc11/ | ||||
ISC 2011, CANS2011, ASIACRYPT2012 | ||||
ICITS 2012, http://icits2012.iro.umontreal.ca | ||||
A Quick Reminder About the Existence of the IACR Forum, http://eprint.iacr.org/forum |