The list of accepted papers can be found
here. The program of the Rump Session can be found
here.
Monday Feb. 8, 2010
17:30-19:00 : Registration/Cocktail
Tuesday Feb. 9, 2010
9:00-9:30 : Registration
9:25-9:30 : Opening Remarks
9:30-10:40 : Parallel Repetition   (chair: Jens Groth)
10:40-11:10 : Break
11:10-11:55 : Obfuscation   (chair: Stefan Wolf)
12:00-13:00 : Invited Talk   (chair: Victor Shoup)
"Privacy-Enhancing Cryptography: From
Theory Into Practice",
Jan Camenisch
13:15-14:45 : Lunch
15:00-16:10 : Multiparty Computation   (chair: Amos Beimel)
-
"On Complete Primitives for Fairness",
Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
-
"On the Necessary and Sufficient
Assumptions for UC Computation", Ivan Damgård, Jesper Buus
Nielsen, Claudio Orlandi
-
"From Passive to Covert Security at Low
Cost", Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
16:10-16:40 : Break
16:40-17:25 : CCA Security   (chair: Daniele Micciancio)
19:00-22:00 : Fondue Dinner
Wednesday Feb. 10, 2010
9:30-10:40 : Threshold Cryptography and Secret Sharing   (chair: Victor Shoup)
10:40-11:10 : Break
11:10-12:45 : Symmetric Cryptography   (chair: Stefan Wolf)
-
"A Hardcore Lemma for Computational
Indistinguishability: Security Amplification for Arbitrarily Weak PRGs
with Optimal Stretch", Ueli Maurer, Stefano Tessaro
-
"On Related-Secret Pseudorandomness",
David Goldenberg, Moses Liskov
-
"A Domain Extender for the Ideal
Cipher", Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal,
Yannick Seurin
-
"Delayed-Key Message Authentication for
Streams", Marc Fischlin, Anja Lehmann
13:15-14:45 : Lunch
15:00-16:10 : Key Leakage and Tamper Resistance   (chair: Amos Beimel)
-
"Founding Cryptography on Tamper-Proof
Hardware Tokens", Vipul Goyal, Yuval Ishai, Amit Sahai,
Ramarathnam Venkatesan, Akshay Wadia
-
"Truly Efficient String Oblivious
Transfer Using Resettable Tamper-Proof Tokens",
Vladimir Kolesnikov
-
"Leakage-Resilient Signatures",
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
16:10-16:40 : Break
16:40-17:25 : Key Leakage and Tamper Resistance (cont.)   (chair: Daniele Micciancio)
18:30-22:00 : Rump Session
{Dinner: 18:30, Talks: 20:00}
  (chair: Nelly Fazio)
Thursday Feb. 11, 2010
9:30-10:40 : Rationality and Privacy   (chair: Alon Rosen)
10:40-11:10 : Break
11:10-11:55 : Public Key Encryption   (chair: Nelly Fazio)
12:00-13:00 : Invited Talk   (chair: Alon Rosen)
"Secure Computation and Its Diverse
Applications",
Yuval Ishai
13:15-14:45 : Lunch
15:00-16:10 : Zero Knowledge   (chair: Jens Groth)
16:10-16:40 : Break
16:40-17:45 : Zero Knowledge (cont.)   (chair: Alon Rosen)
17:45 : Farewell