| Authors | Speaker | Title | Slides | |
|---|---|---|---|---|
| Crypto 2008 rump session, Tuesday 19 August 2008 | ||||
| Awards | ||||
| 19:30 | Bart Preneel (IACR Big Kahuna) | Bart Preneel | New IACR Fellows Induction Ceremony | |
| 19:45 | Daniel J. Bernstein (chair) | Daniel J. Bernstein | Welcome to the rump session | |
| 19:46 | David Wagner (chair of something else) | David Wagner | CRYPTO 2008 Best Paper Award | slides |
| 19:49 | Tony Stieber | Tony Stieber | A Modest Drawing of Chance | slides |
| 19:52 | Susan Langford | Susan Langford | Crypto 2008 t-shirt prize | slides |
| Voting | ||||
| 19:55 | Jim Hughes | Jim Hughes | 2008 BoD Election announcement | |
| 19:56 | John Kelsey, David Chaum, Tal Moran, Andrew Regenscheid | John Kelsey | Scratch off attacks on end-to-end voting systems | slides |
| 20:02 | David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y.A. Ryan, Emily Shen, Alan T. Sherman | David Chaum | Scantegrity II | |
| 20:07 | Ben Adida | Ben Adida | Helios: web-based cryptographic voting | slides |
| 20:11 | Jon Callas and Yvo Desmedt | Jon Callas and Yvo Desmedt | A privacy preserving electronic submission process | slides |
| Encryption hardware | ||||
| 20:16 | Timo Kasper, Christof Paar | Timo Kasper, Christof Paar | KeeLoq attack demo that usually work (or: Murphy's Law also holds at CRYPTO). | slides |
| 20:21 | Krzysztof Pietrzak | Krzysztof Pietrzak | A Leakage-Resilient Mode of Operation for Block-Ciphers | slides |
| 20:25 | Axel Poschmann | Axel Poschmann | www.lightweightcrypto.org | slides |
| 20:26 | Danilo Gligoroski, Smile Markovski, Svein Johan Knapskog | Danilo Gligoroski | MQQ - A Public Key Block Cipher | slides |
| 20:31 | Jean-Jacques Quisquater | Jean-Jacques Quisquater | Why the Bellcore attack is not working against an ENIGMA machine. Parts 1 and 2 | slides |
| 20:36 | Break | |||
| Foundations | ||||
| 20:55 | Michael Backes, Markus Duermuth, and Dominique Unruh | Markus Duermuth | Polynomially-secure crypto | slides |
| 20:59 | Ueli Maurer and Stefano Tessaro | Ueli Maurer | Efficient PRFs from Very Weak Assumptions | slides |
| 21:02 | Jon Callas and Yvo Desmedt | Jon Callas and Yvo Desmedt | Assumptions, assumptions(?), assumptions (??), .... | slides |
| Stellar examples of public-key cryptography | ||||
| 21:07 | Brandon Enright, Eric Rescorla, Stefan Savage, Hovav Shacham, Scott Yilek | Hovav Shacham | insecure.iacr.org | slides |
| 21:14 | Hal Finney | Hal Finney | Looking Over Virtual Shoulders | slides |
| 21:18 | Yanbin Pan, Yingpu Deng | Yanbin Pan | Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem | slides |
| 21:23 | Phil Hirschhorn, Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte | Nick Howgrave-Graham | NTRUEncrypt Parameters secure against CRYPTO '07 hybrid attacks | slides |
| 21:24 | Eric Rescorla, Stefan Savage, Hovav Shacham, Terence Spies | Hovav Shacham | Paper Cryptography | slides |
| Stellar examples of secret-key cryptography | ||||
| 21:31 | Eran Tromer | Eran Tromer | Cryptanalysis of the Gpcode.ak ransomware virus | slides |
| 21:36 | Yu Sasaki, Kazumaro Aoki | Yu Sasaki | Preimage Attacks on MD, HAVAL, SHA, and Others | slides |
| 21:41 | Elena Andreeva, Charles Bouillaguet, Orr Dunkelmann, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey Adi Shamir, and Sebastien Zimmer | John Kelsey | Trojan Message Attacks | slides |
| 21:48 | Timo Kasper, Axel Poschmann, Christof Paar, Guest | Timo Kasper, Axel Poschmann, Christof Paar, Guest | Breaking Ciphers with Special Purpose Hardware | slides |
| 21:51 | Break | |||
| Public-key proofs | ||||
| 22:10 | Divesh Aggarwal and Ueli Maurer | Ueli Maurer | Breaking RSA Generically is Equivalent to Factoring | slides |
| 22:15 | Chris Peikert | Chris Peikert | Public-Key Encryption from the Worst-Case Shortest Vector Problem | slides |
| 22:20 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung | Moti Yung | Randomness-Extractor Key-Derivation Approach to CCA2-Secure Hybrid Encryption | slides |
| 22:24 | Peeter Laud | Peeter Laud | Computational soundness of formal encryption in the presence of key cycles, in the plain model | slides |
| 22:28 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar | Virendra Kumar | Identity-based Encryption with Efficient Revocation | slides |
| 22:31 | Ali Bagherzandi, Jung-Hee Cheon, Stanislaw Jarecki | Ali Bagherzandi | Multisignatures based on DL assumption | |
| 22:35 | Michael Backes, Matthias Berg, Dominique Unruh | Dominique Unruh | Formal Modelling of Cryptographic Games | slides |
| Higher-level protocols | ||||
| 22:39 | Tal Moran, Moni Naor and Gil Segev | Moni Naor | An Optimally Fair Coin Toss | slides |
| 22:44 | Manoj Prabhakaran & Mike Rosulek | Mike Rosulek | Robust Protocols from Homomorphic-CCA Encryption | slides |
| 22:47 | Juan Garay and Daniel Wichs and Hong-Sheng Zhou | Daniel Wichs | Somewhat Non-committing Encryption and Adaptively Secure OT | slides |
| 22:51 | Mira Belenkiy, Melissa Chase, Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya | Alptekin Küpçü | Incentivizing Outsourced Computation | slides |
| 22:55 | Huijia Lin, Rafael Pass, Muthu Venkitasubramaniam | Huijia Lin | Unified Framework for Secure Multiparty Computation | slides |
| 23:00 | Fin! | |||
Bonus: COPACOBANA lyrics are now available.