ASIACRYPT 2016: Keynote on Cryptography in Vietnam’s Historical Context 🇻🇳
Join us on December 7 for ASIACRYPT 2016 featuring Neal Koblitz's insightful lecture on the role of cryptography during Vietnam's French and American Wars, along with other expert sessions.

ASIACRYPT 2016
766 views • Dec 7, 2016

About this video
9:00-9:50 Invited Lecture III Neal Koblitz, “Cryptography in Vietnam in the French and American Wars”
Chair: Ngo Bao Chau
9:55-10:20 Invited to JoC Cliptography: Clipping the Power of Kleptographic Attacks; Alexander Russell; Qiang Tang; Moti Yung; Hong-Sheng Zhou
Chair: Serge Vaudenay
10:20-10:50 Coffee Break
R – track I – track
Block Cipher I
Chair: Palash Sarkar Functional and Homomorphic Cryptography
Chair: Sarah Meiklejohn
10:50-11:15 ▪ Salvaging Weak Security Bounds for Blockcipher-Based Constructions; Thomas Shrimpton; R. Seth Terashima ▪ Multi-Key Homomorphic Authenticators; Dario Fiore; Aikaterini Mitrokotsa; Luca Nizzardo; Elena Pagnin
11:15-11:40 ▪ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers; Lei Wang; Jian Guo; Guoyan Zhang; Jingyuan Zhao; Dawu Gu ▪ Multi-Input Functional Encryption with Unbounded-Message Security; Vipul Goyal; Aayush Jain; Adam O’Neill
11:40-12:05 ▪ Design Strategies for ARX with Provable Bounds: SPARX and LAX; Daniel Dinu; Léo Perrin; Aleksei Udovenko; Vesselin Velichkov; Johann Großschädl; Alex Biryukov ▪ Verifiable Functional Encryption; Saikrishna Badrinarayanan; Vipul Goyal; Aayush Jain; Amit Sahai
12:05-14:05 Lunch
SCA and Leakage Resilience I
Chair: Kris Gaj ABE and IBE
Chair: Duncan Wong
14:05-14:30 ▪ Side-Channel Analysis Protection and Low-Latency in Action – case study of PRINCE and Midori; Amir Moradi; Tobias Schneider ▪ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings; Nuttapong Attrapadung
14:30-14:55 ▪ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations; Daniel P. Martin; Luke Mather; Elisabeth Osward; Martijin Stam ▪ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting; Junqing Gong; Xiaolei Dong; Jie Chen; Zhenfu Cao
14:55-15:20 ▪ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations; Nicolas Bruneau; Sylvain Guilley; Annelie Heuser; Olivier Rioul; François-Xavier Standaert; Yannic Teglia ▪ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions; Melissa Chase; Mary Maller; Sarah Meiklejohn
15:20-15:45 ▪ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF; Marcel Medwed; François-Xavier Standaert; Ventzislav Nikov; Martin Feldhofer ▪ Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps; Shuichi Katsumata; Shota Yamada
15:45-16:15 Coffee Break
Block Cipher II
Chair: Takanori Isobe Foundation
Chair: Eiichiro Fujisaki
16:15-16:40 ▪ A New Algorithm for the Unbalanced Meet-in-the-Middle Problem; Ivica Nikolić; Yu Sasaki ▪ How to Generate and use Universal Samplers; Dennis Hofheinz; Tibor Jager; Dakshita Khurana; Amit Sahai; Brent Waters; Mark Zhandry
16:40-17:05 ▪ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers; Zejun Xiang; Wentao Zhang; Zhenzhen Bao; Dongdai Lin ▪ Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction; Fuchun Guo; Willy Susilo; Yi Mu; Rongmao Chen; Jianchang Lai; Guomin Yang
17:05-17:30 ▪ Reverse Cycle Walking and Its Applications; Sarah Miracle; Scott Yilek ▪ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion; Mihir Bellare; Georg Fuchsbauer; Alessandra Scafuro
17:30-18:30 IACR Meeting
19:30 Conference Banquet
Chair: Ngo Bao Chau
9:55-10:20 Invited to JoC Cliptography: Clipping the Power of Kleptographic Attacks; Alexander Russell; Qiang Tang; Moti Yung; Hong-Sheng Zhou
Chair: Serge Vaudenay
10:20-10:50 Coffee Break
R – track I – track
Block Cipher I
Chair: Palash Sarkar Functional and Homomorphic Cryptography
Chair: Sarah Meiklejohn
10:50-11:15 ▪ Salvaging Weak Security Bounds for Blockcipher-Based Constructions; Thomas Shrimpton; R. Seth Terashima ▪ Multi-Key Homomorphic Authenticators; Dario Fiore; Aikaterini Mitrokotsa; Luca Nizzardo; Elena Pagnin
11:15-11:40 ▪ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers; Lei Wang; Jian Guo; Guoyan Zhang; Jingyuan Zhao; Dawu Gu ▪ Multi-Input Functional Encryption with Unbounded-Message Security; Vipul Goyal; Aayush Jain; Adam O’Neill
11:40-12:05 ▪ Design Strategies for ARX with Provable Bounds: SPARX and LAX; Daniel Dinu; Léo Perrin; Aleksei Udovenko; Vesselin Velichkov; Johann Großschädl; Alex Biryukov ▪ Verifiable Functional Encryption; Saikrishna Badrinarayanan; Vipul Goyal; Aayush Jain; Amit Sahai
12:05-14:05 Lunch
SCA and Leakage Resilience I
Chair: Kris Gaj ABE and IBE
Chair: Duncan Wong
14:05-14:30 ▪ Side-Channel Analysis Protection and Low-Latency in Action – case study of PRINCE and Midori; Amir Moradi; Tobias Schneider ▪ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings; Nuttapong Attrapadung
14:30-14:55 ▪ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations; Daniel P. Martin; Luke Mather; Elisabeth Osward; Martijin Stam ▪ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting; Junqing Gong; Xiaolei Dong; Jie Chen; Zhenfu Cao
14:55-15:20 ▪ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations; Nicolas Bruneau; Sylvain Guilley; Annelie Heuser; Olivier Rioul; François-Xavier Standaert; Yannic Teglia ▪ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions; Melissa Chase; Mary Maller; Sarah Meiklejohn
15:20-15:45 ▪ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF; Marcel Medwed; François-Xavier Standaert; Ventzislav Nikov; Martin Feldhofer ▪ Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps; Shuichi Katsumata; Shota Yamada
15:45-16:15 Coffee Break
Block Cipher II
Chair: Takanori Isobe Foundation
Chair: Eiichiro Fujisaki
16:15-16:40 ▪ A New Algorithm for the Unbalanced Meet-in-the-Middle Problem; Ivica Nikolić; Yu Sasaki ▪ How to Generate and use Universal Samplers; Dennis Hofheinz; Tibor Jager; Dakshita Khurana; Amit Sahai; Brent Waters; Mark Zhandry
16:40-17:05 ▪ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers; Zejun Xiang; Wentao Zhang; Zhenzhen Bao; Dongdai Lin ▪ Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction; Fuchun Guo; Willy Susilo; Yi Mu; Rongmao Chen; Jianchang Lai; Guomin Yang
17:05-17:30 ▪ Reverse Cycle Walking and Its Applications; Sarah Miracle; Scott Yilek ▪ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion; Mihir Bellare; Georg Fuchsbauer; Alessandra Scafuro
17:30-18:30 IACR Meeting
19:30 Conference Banquet
Video Information
Views
766
Likes
1
Duration
04:22:07
Published
Dec 7, 2016
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.