Program : Indocrypt 2012
Venue: Platinum Jubilee Auditorium,
Indian Statistical Institute, Kolkata
|Morning I||Morning II||Afternoon I||Afternoon II|
|Day I||Tutorial I||Tutorial II|
|Day II||Protocol||Tutorial III||Cryptanalysis of Hash and Stream Ciphers|
|Day III||Cryptanalysis of Block Cipher||Hardware||Banquet on River Ganges|
|Day IV||Elliptic Curve||Symmetric Key Design and provable Security||Vote of Thanks|
Day I: Sunday, December 09, 2012
09:30-13:00 : Tutorial Talk by Steven Galbraith
Title: Lattices and their applications to cryptography and cryptanalysis.(pdf)
Affiliations: University of Auckland, New Zealand.
14:30-18:00 : Tutorial Talk by Francisco Rodriguez-Henriquez.
Title: Hardware design of cryptographic algorithms. (pdf)
Day II: Monday, December 10, 2012
09:20-09:30 : A Brief Inagural Program
09:30-11:10 : Session 1 : Protocol (Session Chair: Ramachandran Balasubramanian)
Title: A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.(pdf)
Authors: Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Affiliations: University of California, Los Angeles; University of Illinois, Urbana-Champaign and University of Montana
Title: On the Non-Malleability of the Fiat-Shamir Transform.(pdf)
Authors: Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
Affiliations: Aarhus University; Microsoft Cambridge and Technische Universitaet Darmstadt
Title: Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84.(pdf)
Authors: Arpita Maitra and Goutam Paul
Affiliations: Indian Statistical Institute, Kolkata, India and Jadavpur University, Kolkata, India, .
Title: On-Line/Off-Line Leakage Resilient Secure Computation Protocols.
Authors: Chaya Ganesh, Vipul Goyal, Satya Lokam
Affiliations: Indian Institute of Technology, Madras, India and Microsoft Research, India
11:30-12:30 : Invited Talk by Vinod Vaikuntanathan
Title: How to Compute Encrypted Data.
Affiliations: University of Toronto, Canada.
Title: Leakage Squeezing of Order Two.(pdf)
Authors: Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
Affiliations: University of Paris XIII and University of Paris VIII; TELECOM-ParisTech and Secure-IC S.A.S., France.
Title: ROSETTA for Single Curve Analysis.(pdf)
Authors: Christophe Clavier and Benoit Feix and Georges Gagnerot and Christophe Giraud and Mylne Roussellet and Vincent Verneuil
Affiliations: XLIM-CNRS, Universite de Limoges, France; INSIDE Secure, Aix-en-Provence, France and Oberthur Technologies, Pessac, France.
14:50-16:20: Tutorial by Subhamoy Maitra
Title: Four Lines of Design to Forty Papers of Analysis: The RC4 Stream Cipher. (pdf)
Affiliations: Indian Statistical Institute.
16:30-18:10 : Session 3 : Cryptanalysis of Hash and Stream Ciphers
(Session Chair: Yu Sasaki)
Title: Collision Attack on the Hamsi-256 Compression Function.(pdf)
Authors: Mario Lamberger and Florian Mendel and Vincent Rijmen
NXP Semiconductors, Austria and Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium.
- Title:Generalized Iterated Hash Functions Revisited: New Complexity Bounds for Multicollision Attacks.(pdf)
Authors: Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen
Affiliations: Mathematics Division, Department of Electrical and Information Engineering, University of Oulu and Department of Information Processing Science, University of Oulu.
Title: A Differential Fault attack on the Grain family under Reasonable assumptions.(pdf)
Authors: Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
Affiliations: Applied Statistics Unit, Indian Statistical Institute, Kolkata, India.
Title: Cryptanalysis of Pseudo-Random Generators based on Vectorial FCSRs.(pdf)
Authors: Thierry P. Berger and Marine Minier
Affiliations: XLIM (UMR CNRS 7252), University of Limoges, France and CITI, INSA-Lyon, France.
Day III: Tuesday, December 11, 2012
09:20-11:00 : Session 4 : Cryptanalysis of Block Ciphers
(Session Chair: Nicolas Sendrier)
Title: Faster Chosen-Key Distinguishers on Reduced-Round AES.(pdf)
Authors: Patrick Derbez, Pierre-Alain Fouque, Jeremy Jean
Affiliations: Ecole Normale Superieure, Paris, France.
Title:The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher.(pdf)
Authors: Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic
Affiliations: Institute for Infocomm Research, Agency for Science, Technology and Research; Guilin University of Electronic Technology; Kyungnam University and University of Primorska FAMNIT
Title: Double-SP is Weaker than Single-SP : Rebound Attacks on Feistel Ciphers with Several Rounds. (pdf)
Authors: Yu Sasaki
Affiliations: NTT Corporation
Title: Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.(pdf)
Authors: Shengbao Wu and Mingsheng Wang
Affiliations: Institute of Software, Chinese Academy of Sciences,Beijing, China and Graduate School of Chinese Academy of Sciences, Beijing, China and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
11:15-12:15 : Invited Talk by Orr Dunkelman
Title: From Multiple Encryption to Knapsacks — Efficient Dissection of Composite Problems
Affiliations: University of Haifa, Israel.
Title: High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.(pdf)
Authors: Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, and Sung-Ryul Kim
Affiliations: Department of Computer Science and Engineering, Institute of Computer Technology, Seoul National University; Department of Mathematical Sciences and ISaC, Seoul National University; Division of Internet and Media, Konkuk University.
Title: Computing Small Discrete Logarithms Faster
Authors: Daniel J. Bernstein and Tanja Lange
Affiliations: University of Illinois at Chicago, USA and Technische Universiteit Eindhoven, the Netherlands.
14:30-15:20 : Session 6 : Hardware (Session Chair: Francisco Rodriguez-Henriquez)
Title: Embedded Syndrome-Based Hashing
Authors: Ingo von Maurich and Tim Goneysu
Affiliations: Horst Gortz Institute for IT-Security and Ruhr-University Bochum, Germany
Title: Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA
Authors: Thomas Plos, Christoph Dobraunig, Alexander Oprisnik, Markus Hofinger, Christoph Wiesmeier, Johannes Wiesmeier
Affiliations: Graz University of Technology.
Day IV: Wednesday, December 12, 2012
09:20-11:00 : Session 7 : Elliptic Curve (Session Chair: Tanja Lange)
Title: A New Model of Binary Elliptic Curves.(pdf)
Authors: Hongfeng Wu, Chunming Tang, Rongquan Feng
Affiliations: North China University of Technology, Beijing, China and LMAM, School of Mathematical Sciences, Peking University, Beijing, China.
Title: Efficient arithmetic on elliptic curves in characteristic 2.(pdf)
Authors: David Kohel
Affiliations: Institut de Mathematiques de Luminy
Title: Analysis of Optimum Pairings in Protocols at High Security Levels.(pdf)
Authors: Xusheng Zhang, Dongdai Lin
Affiliations: Institute of Software, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
Title: Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian.(pdf)
Authors: Robert Drylo
Affiliations: Institute of Mathematics, Polish Academy of Sciences, Poland.
11:15-12:15 : Invited Talk by Nigel Smart
Title: Using the Cloud to Determine Key Strengths.
Affiliations: University of Bristol, United Kingdom.
- Title: Faster Batch Forgery Identification.(pdf)
Authors: Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
Affiliations: University of Illinois at Chicago and Irdeto and Technische Universiteit Eindhoven
Title: Implementing CFS.(pdf)
Authors: Gregory Landais and Nicolas Sendrier
Affiliations: INRIA, Paris.
14:30-16:10: Session 9 : Symmetric Key Design and Provable Security
(Session Chair: Rana Barua)
Title: SipHash: A Fast Short-Input PRF.(pdf)
Authors: Jean-Philippe Aumasson and Daniel J. Bernstein
Affiliations: NAGRA, Switzerland and University of Illinois at Chicago, USA.
Title: A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA.(pdf)
Authors: Souradyuti Paul, Ekawat Homsirikomol and Kris Gaj
Affiliations: University of Waterloo, Canada; K.~U.~Leuven, Belgium and George Mason University, USA.
Title: Resistance Against Adaptive Plaintext-Ciphertext Iterated Distinguishers.(pdf)
Authors: Asli Bay, Atefeh Mashatan, Serge Vaudenay
Affiliations: Ecole Polytechnique Federal De Lausanne, Switzerland and Security Engineering, Canadian Imperial Bank of Commerce (CIBC), Canada.
Title: Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-based Authenticated-Encryption Scheme.(pdf)
Authors: Donghoon Chang
Affiliations: IIIT-Delhi, India