Crypto 2012 rump session

The Crypto 2012 rump session took place Tuesday 21 August 2012 from 19:30 PDT to 23:00 PDT. Daniel J. Bernstein and Tanja Lange served as chairs. The rump session was broadcast live via http://gauchocast.ucsb.edu/events/live/.

The call for submissions has been archived on a separate page. Slides are now available from all presenters who agreed to have their slides officially online.

AuthorsSpeakerTitleSlides
Crypto 2012 rump session, Tuesday 21 August 2012
Session 1
19:30Daniel J. Bernstein, Tanja LangeDaniel J. BernsteinWelcome to the rump sessionslides
19:32Bart PreneelBart PreneelIACR 2012 Fellows Induction Ceremonyslides
19:47Mitsuru MatsuiMitsuru MatsuiCelebrating the 25th year of FEAL - A new prize problemslides
19:52Jean-Jacques Quisquater and Yvo DesmedtYvo DesmedtThe relevance of the Chinese Lotto: 25 years outsourcing of cryptanalysisslides
19:56Patrick Derbez, Pierre-Alain Fouque, Jérémy JeanJérémy JeanImproved Key Recovery Attacks on Reduced-Round AESslides
20:00Serge VaudenaySerge VaudenayThe End of Encryption based on Card Shufflingslides
20:05Meltem Sonmez TuranMeltem Sonmez TuranPerfect Hellman Tables using Bloom Filtersslides
20:10Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex HaldermanNadia HeningerEntropyslides
20:17David ChaumDavid ChaumOnline movies that cannot be copiedslides
20:20Ran CanettiRan CanettiDouble blind reviewing in IACR conferences, revisitedslides
20:23Yvo DesmedtYvo DesmedtDoes the ePrint Archive hurt Cryptographers?slides
20:25Daniel J. Bernstein, Joppe Bos, Faith Chaza, Tanja Lange, Kristin Lauter, Michael Naehrig, Christof PaarMichael NaehrigThe end of cryptoslides
20:30Break
Session 2
21:00Jon Callas, Tamzen Cannoy, Nicko van SomerenJon CallasThe Security of Very Dense Cryptographyslides
21:05Josep Balash, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stephanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Thomas Pöppelman, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ingo von Maurich, Loïc van Oldeneel tot OldenzeelOlivier PereiraOpen Source Implementations of Hash Functions in an Atmel AtTiny45slides
21:08Bill BurrBill BurrSHA--3 Update & NIST Thank Youslides
21:13Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre SeifertJuliane KrämerPhotonic Side Channel Analysis for the rest of us
21:18Marc JoyeMarc JoyeEdwards Curves and Fault Attacksslides
21:23Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, and Yoshikazu Hanatani (Toshiba Corporation)Hirofumi MurataniCOTORI(TM): Cryptosystems On TORIslides
21:24Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, and Tsuyoshi TakagiTakuya HayashiBreaking Pairing-based Cryptosystems using $\eta_T$ Pairing over $GF(3^{97})$slides
21:28Gilles Bartes, Juan Manuel Crespo, Martin Gagné, Benjamen Grégoire, César Kunz, Yassine Lakhnech and Santiago Zanella-BéguelinMartin GagnéSynthesis of OWF-based Encryption Schemesslides
21:32Xavier BoyenXavier BoyenAttribute-Based Encryption from Latticesslides
21:36Tatsuaki Okamoto, Katsuyuki TakashimaKatsuyuki TakashimaEfficient (Hierarchical) Inner Product Encryption Tightly Reduced from the Decisional Linear Assumptionslides
21:41Tom Roeder and Christian PaquinTom RoederPadding Oracles Revisitedslides
21:45Break
Session 3
22:15Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex HaldermanNadia HeningerThe case of the RSA FUCK-A-DUCK certificateslides
22:22Periklis A. Papakonstantinou & Guang YangGuang YangCryptography in the Streaming Modelslides
22:27DongHoon Chang, Moti YungMoti YungMidgame Attacksslides
22:32Danilo GligoroskiDanilo GligoroskiCoalition between Bob and Eve in the Man In The Middle Attackslides
22:35Dario Fiore and Rosario GennaroRosario Gennaro Publicly Verifiable Delegation of Large Polynomials and Matrix Computationsslides
22:40Mohammad Mahmoody, Hemanta K. Maji, Manoj PrabhakaranHemanta K. MajiHow Useful are Random Oracles?slides
22:44Vipul GoyalVipul Goyal Positive results for concurrently secure computation in the plain modelslides
22:48Yvo Desmedt, Pyrros ChaidosYvo DesmedtPKC + MPC + Internet voting implies ``secret endorsements'', or, how politicians can keep their friendsslides
22:53David ChaumDavid ChaumCryptINKgraphyslides
22:57David ChaumDavid ChaumRandom-Sample Elections: Far lower cost, better quality and more democraticslides
23:00Fin!
Announcements, http://www.iacr.org/events/
Wednesday 22 August 2012, 15:30--16:45, outside Campbell: Randomness-generation BoF
applied-cryptographers-at-crypto+subscribe@googlegroups.com
5--7 September 2012: SCN'12, Amalfi, Italy, http://scn.dia.unisa.it
3--6 March 2013: The Tenth Theory of Cryptography Conference (TCC2013), Tokyo, Japan, http://www.iacr.org
1--5 April 2013: Financial Cryptography and Data Security 2013 (FC'13), Okinawa, Japan, http://fc13.ifca.ai
25--30 August 2013: Asian Quantum Information Science Workshop, Chennai, India, http://www.aqis13.info