IACR logo

Seventh IACR Theory of Cryptography Conference

TCC 2010

February 9-11, 2010, ETH Zurich
Zurich, Switzerland

ETH logo

  Crypto logo

Rump Session

Program


20:00-20:02 Welcome. Nelly Fazio
20:02-20:08 Official Business. Oded Goldreich
20:08-20:13 Best Student Paper Award. Daniele Micciancio
20:13-20:15 IWSEC `10. Yutaka Kawai
20:15-20:17 ICITS `11. Krzysztof Pietrzak
20:17-20:20 Foundations of Electronic Markets, a new research center. Ivan Damgård
20:20-20:25 Lattice Based Crypto and Multiparty Computation. Rikke Bendlin, Ivan Damgård
20:25-20:30 Impossibility Results for Optimistic Fair Exchange with Multiple Autonomous Arbiters. Alptekin Küpçü, Anna Lysyanskaya
20:30-20:36 Changing Base Without Losing Space. Yevgeniy Dodis, Mihai Patrascu, Mikkel Thorup
20:36-20:42 Oblivious RAM Revisited. Benny Pinkas, Tzachy Reinman
20:42-21:00 Break.
21:00-21:05 A Guideline for Cryptographic-Module Validation Programs. Kanta Matsuura
21:05-21:11 Signatures Resilient to Continuous Key Leakage. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
21:11-21:17 Efficient Leakage-Resilient Signatures, AKA, and CCA Encryption. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
21:17-21:24 On the Round Complexity of Covert Computation. Vipul Goyal, Abhishek Jain
21:24-21:29 Bitter Cryptography. Seung Geol Choi, Aggelos Kiayias, Tal Malkin
21:29-21:34 Multiparty Secure Computation over Multivariate Polynomials and Applications to Multiparty Set Intersection. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
21:34-21:41 On the Power of Cryptographic Oracles. Iftach Haitner, Mohammad Mahmoody, Dov Gordon, Arkady Yerukhimovich, Hoeteck Wee, David Xiao
21:41-21:48 Round-optimal Commitments Secure under Parallel/Concurrent Repetition. David Xiao
21:48-21:50 Good Night!