IACR logo

Seventh IACR Theory of Cryptography Conference

TCC 2010

February 9-11, 2010, ETH Zurich
Zurich, Switzerland

ETH logo

  Crypto logo

TCC 2010 Program

The list of accepted papers can be found here. The program of the Rump Session can be found here.

Monday Feb. 8, 2010

17:30-19:00 : Registration/Cocktail


Tuesday Feb. 9, 2010

9:00-9:30 : Registration

9:25-9:30 : Opening Remarks

9:30-10:40 : Parallel Repetition   (chair: Jens Groth)

10:40-11:10 : Break

11:10-11:55 : Obfuscation   (chair: Stefan Wolf)

12:00-13:00 : Invited Talk   (chair: Victor Shoup)

"Privacy-Enhancing Cryptography: From Theory Into Practice", Jan Camenisch

13:15-14:45 : Lunch

15:00-16:10 : Multiparty Computation   (chair: Amos Beimel)

16:10-16:40 : Break

16:40-17:25 : CCA Security   (chair: Daniele Micciancio)

19:00-22:00 : Fondue Dinner


Wednesday Feb. 10, 2010

9:30-10:40 : Threshold Cryptography and Secret Sharing   (chair: Victor Shoup)

10:40-11:10 : Break

11:10-12:45 : Symmetric Cryptography   (chair: Stefan Wolf)

13:15-14:45 : Lunch

15:00-16:10 : Key Leakage and Tamper Resistance   (chair: Amos Beimel)

16:10-16:40 : Break

16:40-17:25 : Key Leakage and Tamper Resistance (cont.)   (chair: Daniele Micciancio)

18:30-22:00 : Rump Session
{Dinner: 18:30, Talks: 20:00}
  (chair: Nelly Fazio)


Thursday Feb. 11, 2010

9:30-10:40 : Rationality and Privacy   (chair: Alon Rosen)

10:40-11:10 : Break

11:10-11:55 : Public Key Encryption   (chair: Nelly Fazio)

12:00-13:00 : Invited Talk   (chair: Alon Rosen)

"Secure Computation and Its Diverse Applications", Yuval Ishai

13:15-14:45 : Lunch

15:00-16:10 : Zero Knowledge   (chair: Jens Groth)

16:10-16:40 : Break

16:40-17:45 : Zero Knowledge (cont.)   (chair: Alon Rosen)

17:45 : Farewell