|
Program
Wednesday, November 20
09-10:30h - Technical Session 1:
Cryptanalysis I
- Differential Attacks on Generalized Feistel Schemes
Valérie Nachef, Emmanuel Volte, and Jacques Patarin
[abstract] [slides]
- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Bo Zhu, Yin Tan, and Guang Gong
[abstract] [slides]
- Padding Oracle Attack on PKCS#1 v1.5: Can non-standard implementation act as a shelter?
Gao Si, Chen Hua, and Fan Limin
[abstract] [slides]
11-12:00h - Keynote 1
- Solving The Platform Entropy Problem – Phase 2
George Cox, Intel Corporation
[more info] [slides]
14-15:30h - Technical Session 2:
Zero-Knowledge Protocols
- Zero Knowledge Proofs from Ring-LWE
Xiang Xie, Rui Xue, Minqian Wang
[abstract] [slides]
- Zero Knowledge with Rubik’s Cubes and Non-Abelian Groups
Emmanuel Volte, Jacques Patarin, and Valérie Nachef
[abstract] [slides]
- Efficient Modular NIZK Arguments from Shift and Product
Prastudy Fauzi, Helger Lipmaa, and Bingsheng Zhang
[abstract] [slides]
16-17:00h - Technical Session 3: Distributed Protocols
- Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
Yong Li and Zheng Yang
[abstract] [slides]
- Achieving Correctness in Fair Rational Secret Sharing
Sourya Joyee De and Asim K. Pal
[abstract] [slides]
Thursday, November 21
09-10:30h - Technical Session 4: Network Security and Applications
- BotSuer: Suing Stealthy P2P Bots in Network Traffic Through Netflow Analysis
Nizar Kheir and Chirine Wolley
[abstract] [slides]
- Resource Access Control in the Facebook Model
Konstantinos Chronopoulos, Maria Gouseti, and Aggelos Kiayias
[abstract] [slides]
- Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
Babins Shrestha, Nitesh Saxena, and Justin Harrison
[abstract] [slides]
11-12:00h - Keynote 2
- Security and Privacy in Named-Data Networking
Gene Tsudik, University of California, Irvine (UCI)
[more info] [slides]
14-15:30h - Technical Session 5: Advanced Cryptographic Primitives
- Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare and Adam O’Neill
[abstract] [slides]
- Efficient Lossy Trapdoor Functions based on Subgroup Membership Assumptions
Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, and Yamin Liu
[abstract] [slides]
- Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions
Veronika Kuchta and Mark Manulis
[abstract] [slides]
16-17:00h - Keynote 3
- What is public key cryptanalysis?
Jacques Stern, École Normale Supérieure
[more info]
19:00h - Banquet Dinner
http://www.margaridacafe.com.br/
Praça do Chafariz, S/N
Friday, November 22
09-10:00h - Technical Session 6: Cryptanalysis II
- A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Tomer Ashur and Orr Dunkelman
[abstract] [slides]
- Truncated Differential Analysis of Reduced-Round LBlock
Sareh Emami, Cameron McDonald, Josef Pieprzyk, and Ron Steinfeld
[abstract] [slides]
10-11:00h - Technical Session 7: Verifiable Computation
- How to Update Documents Verifiably in Searchable Symmetric Encryption
Kaoru Kurosawa and Yasuhiro Ohtaki
[abstract] [slides]
- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication using Multilinear Maps
Liang Feng Zhang and Rehanehi Safavi-Naini
[abstract] [slides]
11:30-12:30h - Keynote 4
- A Survey of Verifiable Delegation of Computations
Rosario Gennaro, The City College of New York
[more info] [slides]
14:00 -
Farewell Excursion
Details coming soon.
|