The Tenth Theory of Cryptography Conference (TCC2013) , March 3-6, 2013, Tokyo, Japan

TCC2013 Rump session program - 2013/03/05

TCC2013 Rump session program - 2013/03/05

  • 19:00-19:04 Summary of Registration and FAQs (Masayuki Abe)
  • 19:04-19:09 Notes (Oded Goldreich)
  • 19:09-19:17 How to Garble RAM Programs (Rafail Ostrovsky)
  • 19:17-19:19 IWSEC 2013 CFP (Koji Nuida)
  • 19:19-19:24 Introducing SCAPI - The Secure Computation API (Yehuda Lindell)
  • 19:24-19:27 mpclounge.org (Claudio Orlandi)
  • 19:27-19:34 MPC in practice, beyond Sugar Beets (Ivan Damgård)
  • 19:34-19:36 The Qcrypt 2013 conference (Ivan Damgård)
  • 19:36-20:00 --- Intermission ---
  • 20:00-20:05 OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols (Yunlei Zhao)
  • 20:05-20:10 Fully Simulatable Functional Encryption: General Definitions and Positive Results (Abishek Kumarasubramanian)
  • 20:10-20:15 Malicious security based on garbled circuits: achieving 2^{-s} security with just s circuits (Yehuda Lindell)
  • 20:15-20:17 EUROCRYPT 2013 in Athens, Greece (Vassilis Zikas)
  • 20:17-20:22 On Indifferentiable Hash Functions in a Multi-Stage Security Game (Kazuki Yoneyama)
  • 20:22-20:25 --- Announcements of available postdocs ---
  • 20:25-20:30 Tamper Resilient Cryptography without Self-Destruct (BLT Security) (Daniele Venturi)
  • 20:30-20:35 Interactive Coding Revisited (Rafael Pass)
  • 20:35-20:40 On the Indifferentiability of Key-Alternating Ciphers (Yevgeniy Dodis)
  • 20:40-20:42 TCC 2013 – Tokyo, Japan - Updated CFP! (Bernardo David)
  • 20:42 Good Night!