INDOCRYPT 2009

( December 13 - 16, 2009, New Delhi, India )

Tenth International Conference on Cryptology in India

( Under aegis of Cryptology Research Society of India )

December 13, 2009

TUTORIAL

1000 - 1115 Hrs

:

Nicolas Sendrier

INRIA, France

The Design of Code-based Cryptosystems

1115 - 1145 Hrs

:

Tea

1145 - 1300 Hrs

:

Nicolas Sendrier

INRIA, France

The Design of Code-based Cryptosystems

1300 - 1400 Hrs

:

Lunch

1400 - 1515 Hrs

:

Willi Meier

FHNW, Switzerland

Analysis of Certain Stream Ciphers & Hash Functions

1515 - 1545 Hrs

:

Tea

1545 - 1700 Hrs

:

Willi Meier

FHNW, Switzerland

Analysis of Certain Stream Ciphers & Hash Functions

December 14, 2009

0930 - 1030 Hrs

:

Inaugural Celebrations

1030 - 1100 Hrs

:

High Tea

1100 - 1200 Hrs

:

Thomas Johansson

Lund University, Sweden

Coding Theory as a Tool in Cryptography

Key Agreement Protocols

1200 - 1230 Hrs

:

Sanjit Chatterjee, Alfred Menezes & Berkant Ustaoglu

Reusing Static Keys in Key Agreement Protocols

1230 - 1300 Hrs

:

David Jao and Colleen Swanson

A study of Two-Party Certificate-less Authenticated Key-Agreement Protocols

1300 - 1400 Hrs

:

Lunch

Side Channel Attacks

1400 - 1430 Hrs

:

Thierry Berger, Marine Minier & Benjamin Pousse

Software Oriented Stream ciphers based upon FCSRs in diversified mode

1430 - 1500 Hrs

:

Sumanta Sarkar

On the Symmetric Negabent Boolean Functions

1500 - 1530 Hrs

:

Ihsan Taskin, Mustafa Coban, Adnan Baysal and Huseyin Demirci

Improved Meet-in-the-Middle Attacks on AES

1530 - 1600 Hrs

:

Tea

Symmetric Cryptology

1600 - 1630 Hrs

:

Takahiro Matsuda, Kanta Matsuura and Jacob CN Schuldt

Efficient Constructions of Signcryption Schemes and Singcryption Composability

1630 - 1700 Hrs

:

Laila El Aimani

On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)

1700 - 1730 Hrs

:

Markus Ruckert

Verifiably Encrypted Signatures from RSA without NIZKs

1700 - 1800 Hrs

:

Sharmila Deva Selvi S, Sree Vivek S, Shriram J, Kalaivani S & Pandu Rangan C

Identity Based Aggregate Signcryption Schemes

1815 - 1915 Hrs

:

CRSI General Body Meeting

December 15, 2009

0930 - 1030 Hrs

:

Marc Girault, Orange Labs,

France

Cryptography and Elliptic Curves : a 25 year love (?) Story

Post-Quantum Cryptology

1030 - 1100 Hrs

:

Johannes Buchmann and Richard Lindner

Secure Parameters for SWIFFT

1100 - 1130 Hrs

:

Daniel J Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters and Peter Schwabe

FSBday: Implementing WagnerÂ’s generalized birthday attack against the round-1 SHA-3 candidate FSB

1130 - 1200 Hrs

:

Tea

Number Theoretic Cryptology

1200 - 1230 Hrs

:

Mahabir Prasad Jhanwar and Rana Barua

Sampling from Signed Quadratic Residues: RSA Group is Pseudofree

1230 - 1300 Hrs

:

Conrado Porto Lopes Gouvea and Julio Lopez

Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller

1300 - 1330 Hrs

:

Dong Su and Lv Kewei

A New Hard-Core Predicate of Paillier's Trapdoor Function

1330 - 1430 Hrs

:

Lunch

Lightweight Cryptology

1430 - 1500 Hrs

:

Gerard Cohen and Bruno Kindarji

Private Interrogation of Devices via Identification Codes

1500 - 1530 Hrs

:

Gildas Avoine, Christian Floerkemeier and Benjamin Martin

RFID Distance Bounding Multistate Enhancement

1530 - 1600 Hrs

:

Olivier Billet and Kaoutar El-Khiyaoui

Two Attacks against the Ff RFID Protocol

1600 - 1630 Hrs

:

Tea

Signature Protocols

1630 - 1700 Hrs

:

Alexandre Berzati, Cecile Canovas & Louis Goubin

Differential Fault Analysis of Rabbit: Toward a Secret Key Leakage

1700 - 1730 Hrs

:

Julien Bringer, Herve Chabanne & Thomas Icart

On Physical Obfuscation of Cryptographic Algorithms

1730 - 1800 Hrs

:

Chester Rebeiro & Debdeep Mukhopadhyay

Cache Timing Attacks on CLEFIA

1930 Hrs

:

Conference Dinner

December 16, 2009

0930 - 1030 Hrs

Dan Bernstein University of Illinois at Chicago, USA

Breaking ECC2K-130

Hash Functions - I

1030 - 1100 Hrs

:

Orr Dunkelman, Ewan Fleischmann, Michael Gorski and Stefan Lucks

Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode

1100 - 1130 Hrs

:

Kota Ideguchi and Dai Watanabe

Second Preimage Attack on SHAMATA-512

1130 - 1200 Hrs

:

Tea

Hash Functions -II

1200 - 1230 Hrs

:

Zheng Gong, Pieter Hartel, Svetla Nikova and Bo Zhu

Towards Secure and Practical MACs for Body Sensor Networks

1230 - 1300 Hrs

:

Rishiraj Bhattacharyya, Avradip Mandal and Mridul Nandi

Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions

1300 - 1330 Hrs

:

Tomislav Nad and Florian Mendel

A distinguisher for the compression function of SIMD-512

1330 - 1430 Hrs

:

Lunch

Multiparty Computation

1430 - 1500 Hrs

:

Gerald Gavin and Marine Minier

Oblivious Multi-Variate Polynomial Evaluation

1500 - 1530 Hrs

:

Arpita Patra, Ashish Choudhary and C Pandu Rangan

Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience

1530 - 1600 Hrs

:

Huafei Zhu

Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems

1600 Hrs

:

Valedictory & Tea