INDOCRYPT 2009
( December 13 - 16, 2009, New Delhi, India )
Tenth International Conference on Cryptology in India
( Under aegis of Cryptology Research Society of India )
December 13, 2009
TUTORIAL
1000 - 1115 Hrs | : | Nicolas Sendrier | INRIA, France | The Design of Code-based Cryptosystems | |
1115 - 1145 Hrs | : | Tea |
|
| |
1145 - 1300 Hrs | : | Nicolas Sendrier | INRIA, France | The Design of Code-based Cryptosystems | |
1300 - 1400 Hrs | : | Lunch |
|
| |
1400 - 1515 Hrs | : | Willi Meier | FHNW, Switzerland | Analysis of Certain Stream Ciphers & Hash Functions | |
1515 - 1545 Hrs | : | Tea |
|
| |
1545 - 1700 Hrs | : | Willi Meier | FHNW, Switzerland | Analysis of Certain Stream Ciphers & Hash Functions |
December 14, 2009
0930 - 1030 Hrs | : | Inaugural Celebrations |
|
|
1030 - 1100 Hrs | : | High Tea |
|
|
1100 - 1200 Hrs | : | Thomas Johansson | Lund University, Sweden | Coding Theory as a Tool in Cryptography |
|
| Key Agreement Protocols |
|
1200 - 1230 Hrs | : | Sanjit Chatterjee, Alfred Menezes & Berkant Ustaoglu | Reusing Static Keys in Key Agreement Protocols |
1230 - 1300 Hrs | : | David Jao and Colleen Swanson | A study of Two-Party Certificate-less Authenticated Key-Agreement Protocols |
1300 - 1400 Hrs | : | Lunch |
|
|
| Side Channel Attacks |
|
1400 - 1430 Hrs | : | Thierry Berger, Marine Minier & Benjamin Pousse | Software Oriented Stream ciphers based upon FCSRs in diversified mode |
1430 - 1500 Hrs | : | Sumanta Sarkar | On the Symmetric Negabent Boolean Functions |
1500 - 1530 Hrs | : | Ihsan Taskin, Mustafa Coban, Adnan Baysal and Huseyin Demirci | Improved Meet-in-the-Middle Attacks on AES |
1530 - 1600 Hrs | : | Tea |
|
|
| Symmetric Cryptology |
|
1600 - 1630 Hrs | : | Takahiro Matsuda, Kanta Matsuura and Jacob CN Schuldt | Efficient Constructions of Signcryption Schemes and Singcryption Composability |
1630 - 1700 Hrs | : | Laila El Aimani | On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited) |
1700 - 1730 Hrs | : | Markus Ruckert | Verifiably Encrypted Signatures from RSA without NIZKs |
1700 - 1800 Hrs | : | Sharmila Deva Selvi S, Sree Vivek S, Shriram J, Kalaivani S & Pandu Rangan C | Identity Based Aggregate Signcryption Schemes |
1815 - 1915 Hrs | : | CRSI General Body Meeting |
|
December 15, 2009
0930 - 1030 Hrs | : | Marc Girault, Orange Labs, France
| Cryptography and Elliptic Curves : a 25 year love (?) Story |
|
| Post-Quantum Cryptology |
|
1030 - 1100 Hrs | : | Johannes Buchmann and Richard Lindner | Secure Parameters for SWIFFT |
1100 - 1130 Hrs | : | Daniel J Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters and Peter Schwabe | FSBday: Implementing WagnerÂ’s generalized birthday attack against the round-1 SHA-3 candidate FSB |
1130 - 1200 Hrs | : | Tea |
|
|
| Number Theoretic Cryptology |
|
1200 - 1230 Hrs | : | Mahabir Prasad Jhanwar and Rana Barua | Sampling from Signed Quadratic Residues: RSA Group is Pseudofree |
1230 - 1300 Hrs | : | Conrado Porto Lopes Gouvea and Julio Lopez | Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller |
1300 - 1330 Hrs | : | Dong Su and Lv Kewei | A New Hard-Core Predicate of Paillier's Trapdoor Function |
1330 - 1430 Hrs | : | Lunch |
|
|
| Lightweight Cryptology |
|
1430 - 1500 Hrs | : | Gerard Cohen and Bruno Kindarji | Private Interrogation of Devices via Identification Codes |
1500 - 1530 Hrs | : | Gildas Avoine, Christian Floerkemeier and Benjamin Martin | RFID Distance Bounding Multistate Enhancement |
1530 - 1600 Hrs | : | Olivier Billet and Kaoutar El-Khiyaoui | Two Attacks against the Ff RFID Protocol |
1600 - 1630 Hrs | : | Tea |
|
|
| Signature Protocols |
|
1630 - 1700 Hrs | : | Alexandre Berzati, Cecile Canovas & Louis Goubin | Differential Fault Analysis of Rabbit: Toward a Secret Key Leakage |
1700 - 1730 Hrs | : | Julien Bringer, Herve Chabanne & Thomas Icart | On Physical Obfuscation of Cryptographic Algorithms |
1730 - 1800 Hrs | : | Chester Rebeiro & Debdeep Mukhopadhyay | Cache Timing Attacks on CLEFIA |
1930 Hrs | : | Conference Dinner |
|
December 16, 2009
0930 - 1030 Hrs |
| Dan Bernstein University of Illinois at Chicago, USA
| Breaking ECC2K-130 |
|
| Hash Functions - I |
|
1030 - 1100 Hrs | : | Orr Dunkelman, Ewan Fleischmann, Michael Gorski and Stefan Lucks | Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode |
1100 - 1130 Hrs | : | Kota Ideguchi and Dai Watanabe | Second Preimage Attack on SHAMATA-512 |
1130 - 1200 Hrs | : | Tea |
|
|
| Hash Functions -II |
|
1200 - 1230 Hrs | : | Zheng Gong, Pieter Hartel, Svetla Nikova and Bo Zhu | Towards Secure and Practical MACs for Body Sensor Networks |
1230 - 1300 Hrs | : | Rishiraj Bhattacharyya, Avradip Mandal and Mridul Nandi | Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions |
1300 - 1330 Hrs | : | Tomislav Nad and Florian Mendel | A distinguisher for the compression function of SIMD-512 |
1330 - 1430 Hrs | : | Lunch |
|
|
| Multiparty Computation |
|
1430 - 1500 Hrs | : | Gerald Gavin and Marine Minier | Oblivious Multi-Variate Polynomial Evaluation |
1500 - 1530 Hrs | : | Arpita Patra, Ashish Choudhary and C Pandu Rangan | Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience |
1530 - 1600 Hrs | : | Huafei Zhu | Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems |
1600 Hrs | : | Valedictory & Tea |
|