The rump session was broadcast live via http://qtss.id.ucsb.edu/crypto2009/rump.sdp. Thanks to CryptoClarity for sponsoring this webcast! iCalendar: http://www.iacr.org/conferences/crypto2009/Crypto2009RumpSessionWe.ics

The call for submissions has been archived on a separate page. A preliminary printed schedule was distributed Tuesday afternoon. Final schedule:

Authors | Speaker | Title | Slides | |
---|---|---|---|---|

19:30 | Bart Preneel (IACR president) | Bart Preneel | New IACR Fellows Induction Ceremony | slides |

Hashing | ||||

19:40 | Elena Andreeva, Charles Bouillaguet, Orr Dunkelman and John Kelsey | Charles Bouillaguet (a priori) | A Live Trojan Message for MD5 | slides |

19:43 | Cameron McDonald, Philip Hawkes, Josef Pieprzyk | Cameron McDonald | SHA-1 Differentials for Boomerang Attack | slides |

19:46 | Christophe Petit, Jean-Jacques Quisquater | Jean-Jacques Quisquater | Hash Functions and Cayley Graphs: the end of the story? | slides |

19:51 | Ivica Nikolic | Ivica Nikolic | Near Collisions for the Compression Function of Hamsi-256 | slides |

19:53 | Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer | Yu Sasaki | What happened to LANE? | slides |

19:58 | Yuji SUGA | Yuji SUGA | Considerations of SHA-3 | slides |

Cryptography in the real world | ||||

20:03 | Ben Adida, Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater | Olivier Pereira | Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios | slides |

20:07 | Yvo Desmedt & Saghar Estehghari | Yvo Desmedt | Hacking Helios and Its Impact | slides |

20:15 | Erik and Martin Demaine, Jean-Jacques and Michael Quisquater | Jean-Jacques Quisquater | How to explain algorithms and cryptography to your (old) children II | slides |

20:20 | MD5 Collisions, Inc | Marc Stevens | MD5 Collisions Live! | slides |

20:21 | Break | |||

Secret-key ciphers | ||||

20:40 | Andy Clark | Andy Clark | A Colossal Update | slides |

20:43 | Jovan Dj. Golic | Jovan Dj. Golic | Format-and-syntax-preserving ECB encryption: Dream or reality? | slides |

20:50 | Piotr Mroczkowski and Janusz Szmidt | Janusz Szmidt | The Cube Attack on CTC Block Cipher | slides |

20:53 | Michael Vielhaber | Michael Vielhaber | AIDA Breaks BIVIUM(A&B) in 1 DualCoreMinute | slides |

20:57 | Alex Biryukov and Ivica Nikolic | Ivica Nikolic | A New Security Analysis of AES-128 | slides |

20:59 | Alex Biryukov and Dmitry Khovratovich | Dmitry Khovratovich | In how many ways can you break Rijndael? | slides |

21:03 | Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir | Orr Dunkelman | Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds | slides |

21:08 | Viet Tung Hoang, Phillip Rogaway | Viet Tung Hoang | Improved analysis of unbalanced Feistel networks by coupling | slides |

21:13 | Mridul Nandi | Mridul Nandi | Improved Security Analysis for Blockcipher Based PRF | slides |

The cloud | ||||

21:18 | Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage | Eran Tromer | Cross-VM Vulnerabilities in Cloud Computing | slides |

21:25 | Jon Callas, Tamzen Cannoy, and Nicko van Someren | Nicko van Someren | Alice and Bob Go to Heaven | slides |

21:30 | Break | |||

Public-key encryption, security models, etc. | ||||

21:50 | Claude Gravel | Claude Gravel | A Chink in the Armour of AES ? | slides |

21:51 | Ueli Maurer | Ueli Maurer | Schnorr = GQ = Okamoto: Unifying Zero-knowledge Proofs of Knowledge | slides |

21:54 | Tom Berson, Nigel Smart, Raphael C.-W. Phan, Dan Page, Orr Dunkelman | Orr Dunkelman | Non-commutative Algebra and its Applications in NIKE-Zero Knowledge Proofs | slides |

21:59 | Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky | Chongwon Cho | Equivalence of uniform key agreement and composition insecurity | slides |

22:04 | Hemanta Maji and Manoj Prabhakaran and Mike Rosulek | Manoj Prabhakaran | An Abstraction of General Assumptions: Cryptographic Complexity of Functionalities | slides |

22:09 | Sebastian Faust, Leonid Reyzin, Eran Tromer | Eran Tromer | Protecting Circuits from Computationally-Bounded Leakage | slides |

22:14 | The Crypto Bunch | Thomas Ristenpart | Hedged Public-Key Encryption: How to Protect against Bad Randomness | |

22:19 | Steven Myers and abhi Shelat | Steven Myers | One Bit Encryption is Complete for CCA2 | slides |

22:24 | Allison Lewko, Amit Sahai, and Brent Waters | Brent Waters | Adaptive Security in Attribute-Based Encryption | slides |

22:30 | Rikke Bendlin, Ivan Damgård | Rikke Bendlin | Lattice-based Threshold Cryptography | slides |

22:35 | Carlos Aguilar Melchor, Javier Herranz and Philippe Gaborit | Carlos Aguilar Melchor | An alternative to Gentry's fully homomorphic encryption scheme (We Do Exist!) | slides |

22:40 | Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs | Daniel Wichs | Public-Key Encryption in the Bounded Retrieval Model | slides |

22:45 | David Cash, Dennis Hofheinz, Eike Kiltz | Eike Kiltz | How to Delegate a Lattice Basis | slides |

22:52 | Dan Boneh, Xavier Boyen | Xavier Boyen | Efficient Lattice (H)IBE in the Standard Model from the BB-1 Framework | slides |

22:58 | Daniel J. Bernstein, Carl Ellison, Tanja Lange, Kristin Lauter, Victor Miller, Michael Naehrig, Eran Tromer | TBA | Secure Cloud Computing for Medical Data | slides |

23:00 | Fin! | |||

Printed announcements | ||||

September 2009: SHARCS'09: Special-purpose Hardware for Attacking Cryptographic Systems, http://sharcs.org | ||||

October 2009: SPEED-CC, http://www.hyperelliptic.org/SPEED/ | ||||

December 2009: Asiacrypt 2009, http://asiacrypt2009.cipher.risk.tsukuba.ac.jp/ | ||||

December 2009: CANS 2009, http://www.rcis.aist.go.jp/cans2009/ | ||||

April 2010: IDtrust 2010, http://middleware.internet2.edu/idtrust/ | ||||

May 2010: PKC 2010, http://pkc2010.di.ens.fr/ |