PROGRAM FOR EUROCRYPT 2007 - Barcelona May 20-24 Day 0 (Sunday May 20) Afternoon and Evening: Registration and Reception 17:00 - 20:30 Registration is open 18:30 - 20:30 Welcome reception Day 1 (Monday, May 21) ====================== 9:00- 9:10 Opening Remarks ------------------------------------------------------------------------------------------------------ 9:10-10:40 SESSION 1: Session Chair - Yuval Ishai 9:10-9:40 Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens, Arjen Lenstra and Benne de Weger 9:40-10:10 Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist Krzysztof Pietrzak 10:10-10:40 The collision intractability of MDC-2 in the ideal-cipher model John P. Steinberger ------------------------------------------------------------------------------------------------------ 10:40-11:10 Coffee Break ------------------------------------------------------------------------------------------------------ 11:10-12:40 SESSION 2: Session Chair - Serge Fehr 11:10-11:40 An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda Lindell and Benny Pinkas 11:40-12:10 Revisiting the Efficiency of Malicious Two-Party Computation David P. Woodruff 12:10-12:40 Efficient Two-Party Secure Computation on Committed Inputs Stanislaw Jarecki and Vitaly Shmatikov ------------------------------------------------------------------------------------------------------ 12:40-14:30 Lunch break ------------------------------------------------------------------------------------------------------ 14:30-16:00 SESSION 3: Session Chair - Giuseppe Persiano 14:30-15:00 Universally Composable Secure Computation Using Tamper-Proof Hardware Jonathan Katz 15:00-15:30 Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model Moti Yung and Yunlei Zhao 15:30-16:00 Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability Yi Deng and Dongdai Lin ------------------------------------------------------------------------------------------------------ 16:00-16:30 Coffee Break ------------------------------------------------------------------------------------------------------ 16:30-17:50 SESSION 4 Session Chair - Moni Naor 16:30-17:00 Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility Chun-Yuan Hsiao, Chi-Jen Lu and Leonid Reyzin 17:00-17:50 Zero Knowledge and Soundness are Symmetric Shien Jin Ong and Salil Vadhan ------------------------------------------------------------------------------------------------------ 20:00 Welcome cocktail Day 2 (Tuesday, May 22) ======================= ------------------------------------------------------------------------------------------------------ 9:00-10:30 SESSION 5 Session Chair - Dario Catalano 9:00-9:30 Mesh Signatures Xavier Boyen 9:30-10:00 The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks Thomas Ristenpart and Scott Yilek 10:00-10:30 Batch Verification of Short Signatures Jan Camenisch, Susan Hohenberger and Michael Ostergaard Pedersen ------------------------------------------------------------------------------------------------------ 10:30-11:00 Coffee Break ------------------------------------------------------------------------------------------------------ 11:00-12:00 SESSION 6: Session Chair - Xiaoyun Wang 11:00-11:30 Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois, Pierre-Alain Fouque and Jacques Stern 11:30-12:00 Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel ------------------------------------------------------------------------------------------------------ 12:00-12:10 Short break ------------------------------------------------------------------------------------------------------ 12:10-13:10 SESSION 7 Session Chair - Andy Clark Invited talk: Jacques Stern (IACR Distinguished Lecture) Cryptography from A to Z ------------------------------------------------------------------------------------------------------ Lunch Afternoon Excursion ------------------------------------------------------------------------------------------------------ 20:00: Rump Session Day 3 (Wednesday, May 23) ========================= ------------------------------------------------------------------------------------------------------ 9:00-10:30 SESSION 8 Session Chair - Brent Waters 9:00-9:30 Secure Computation from Random Error Correcting Codes Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan and Vinod Vaikuntanathan 9:30-10:00 Round-Efficient Secure Computation in Point-to-Point Networks Jonathan Katz and Chiu-Yuen Koo 10:00-10:30 Atomic Secure Multi-Party Multiplication with Low Communication Ronald Cramer, Ivan Damgaard and Robbert de Haan ------------------------------------------------------------------------------------------------------ Coffee break ------------------------------------------------------------------------------------------------------ 10:30-11:00 Coffee Break ------------------------------------------------------------------------------------------------------ 11:00-12:30 SESSION 9 Session Chair - Victor Miller 11:00-11:00 Cryptanalysis of the Sidelnikov cryptosystem Lorenz Minder 11:30-12:00 Toward a rigorous variation of Coppersmith's algorithm on three variables Aurelie Bauer and Antoine Joux 12:00-12:30 An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves Andreas Enge and Pierrick Gaudry ------------------------------------------------------------------------------------------------------ 12:30-14:30 Lunch break ------------------------------------------------------------------------------------------------------ 14:30-16:00 SESSION 10 Session Chair - Michel Abdalla 14:30-15:00 General Ad Hoc Encryption from Exponent Inversion IBE Xavier Boyen 15:00-15:30 Non-Interactive Proofs for Integer Multiplication Ivan Damgard and Rune Thorbek 15:30-16:00 Ate Pairing on Hyperelliptic Curves Robert Granger, Florian Hess, Roger Oyono, Nicolas Theriault and Frederik Vercauteren ------------------------------------------------------------------------------------------------------ 16:00-16:30 Coffee Break ------------------------------------------------------------------------------------------------------ 16:30-18:00 SESSION 11 Session Chair - Eran Tromer 16:30-17:00 Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann and Rainer Steinwandt 17:00-17:30 Ideal Multipartite Secret Sharing Schemes Oriol Farras, Jaume Marti-Farre and Carles Padro 17:30-18:00 Divisible e-cash systems can be truly anonymous Sebastien Canard and Aline Gouget ------------------------------------------------------------------------------------------------------ 18:00-19:00 Membership meeting ------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------ 21:00 Gala dinner Day 4 (Thursday, May 24th) ========================== ------------------------------------------------------------------------------------------------------ 9:00-10:30 SESSION 12 Session Chair - Nigel Smart 9:00-9:30 A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security Ueli Maurer and Johan Sjodin 9:30-10:00 Range Extension for Weak PRFs; The Good, the Bad, and the Ugly Krzysztof Pietrzak and Johan Sjodin 10:00-10:30 Feistel Networks made Public, and Applications Yevgeniy Dodis and Prashant Puniya ------------------------------------------------------------------------------------------------------ 10:30-11:00 Coffee Break ------------------------------------------------------------------------------------------------------ 11:00-12:00 SESSION 13 Session Chair - Stefan Dziembowski 11:00-11:30 Oblivious-Transfer Amplification Juerg Wullschleger 11:30-12:00 Simulatable Adaptive Oblivious Transfer Jan Camenisch, Gregory Neven and abhi shelat ------------------------------------------------------------------------------------------------------ 12:00-12:10 Short break ------------------------------------------------------------------------------------------------------ 12:10-13:10 SESSION 14 Session Chair - Bart Preneel Invited talk: Victor Miller Elliptic Curves and Cryptography: Invention and Impact ------------------------------------------------------------------------------------------------------ 13:10-13:15 CLOSING REMARKS ------------------------------------------------------------------------------------------------------ Sandwiches