Warning:
The current classification is rather superficial,
allowing essentially everything in the first Crypto track that doesn't mention FHE.
Sunday 14 August 2016 |
17:00 |
Dorms (Anacapa etc.) | Crypto | Registration in Anacapa Formal Lounge. Actually open until 20:00.
|
17:00 |
|
17:30 |
Dorms (Anacapa etc.) | Crypto | Reception dinner in Anacapa/Santa Cruz Ocean Lawn, just outside Anacapa Formal Lounge.
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The Anacapa reception has more than enough food, and everyone will be there instead.
|
17:30 |
19:15 |
|
19:15 |
21:30 |
|
21:30 |
|
21:30 |
Monday 15 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:00 to 09:00, according to UCSB web pages.
|
07:30 |
|
|
08:45 |
Opening remarks
|
08:45 |
|
|
08:55 |
|
08:55 |
|
|
|
09:00 |
Hoang/Tessaro: "Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security"
|
09:00 |
Hirt/Maurer/Tschudi/Zikas: "Network-Hiding Communication and Applications to Multi-Party Protocols"
|
09:00 |
09:25 |
Peyrin/Seurin: "Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers"
|
09:25 |
Kumaresan/Raghuraman/Sealfon: "Network Oblivious Transfer"
|
09:25 |
|
09:25 |
09:50 |
|
09:50 |
|
09:50 |
|
09:55 |
Mennink: "XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees"
|
09:55 |
Hazay/Venkitasubramaniam: "On the Power of Secure Two-Party Computation"
|
09:55 |
|
10:20 |
|
10:20 |
Dai/Steinberger: "Indifferentiability of 8-Round Feistel Networks"
|
10:20 |
Ishai/Kushilevitz/Prabhakaran/Sahai/Yu: "Secure Protocol Transformations"
|
10:20 |
10:45 |
Cogliati/Seurin: "EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC"
|
10:45 |
Damgård/Nielsen/Polychroniadou/Raskin: "On the Communication required for Unconditionally Secure Multiplication"
|
10:45 |
|
10:45 |
11:10 |
Coffee break. In the sun outside the lecture building. Coffee, reasonable tea, typically some fruits.
|
11:10 |
|
11:10 |
|
11:40 |
Invited talk: Sniffen
|
11:40 |
|
|
12:40 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 14:00.
|
12:40 |
|
|
14:00 |
|
14:00 |
Albrecht/Bai/Ducas: "A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes"
|
14:00 |
Ananth/Jain/Naor/Sahai/Yogev: "Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security"
|
14:00 |
|
14:25 |
Brakerski/Perlman: "Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts"
|
14:25 |
Fischlin/Herzberg/Noon/Shulman: "Obfuscation Combiners"
|
14:25 |
|
14:50 |
|
14:50 |
|
14:50 |
14:55 |
Ben-Zvi/Blackburn/Tsaban: "A Practical Cryptanalysis of the Algebraic Eraser"
|
14:55 |
Brakerski/Brzuska/Fleischhacker: "On Statistically Secure Obfuscation with Approximate Correctness"
|
14:55 |
|
15:20 |
Yu/Zhang: "Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN"
|
15:20 |
Garg/Pandey/Srinivasan: "Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium"
|
15:20 |
|
15:45 |
Coffee break
|
15:45 |
|
15:45 |
|
16:15 |
Bellare/Tackmann: "The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3"
|
16:15 |
Coron/Lee/Lepoint/Tibouchi: "Cryptanalysis of GGH15 Multilinear Maps"
|
16:15 |
|
16:40 |
Shrimpton/Stam/Warinschi: "A Modular Treatment of Cryptographic APIs: the Symmetric-Key Case"
|
16:40 |
Miles/Sahai/Zhandry: "Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13"
|
16:40 |
|
17:05 |
Couteau/Peters/Pointcheval: "Encryption Switching Protocols"
|
17:05 |
Alamati/Koppula/Peikert/Waters: "Separate Separations of CPA and Circular Security (for Any Cycle Length)"
|
17:05 |
|
17:30 |
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The Anacapa dinner has more than enough food, and everyone will be there instead.
|
17:30 |
|
19:00 |
Dorms (Anacapa etc.) | Crypto | Dinner in Anacapa/Santa Cruz Ocean Lawn
|
19:00 |
|
19:15 |
|
19:15 |
|
21:00 |
|
21:00 |
|
21:00 |
|
21:00 |
Tuesday 16 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:00 to 09:00.
|
07:30 |
|
|
09:00 |
Tutorial: Lomné: "Common Criteria Certification of a Smartcard: A Technical Overview"
|
09:00 |
|
|
09:10 |
Dodis/Mironov/Stephens-Davidowitz: "Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines"
|
09:10 |
Dulek/Schaffner/Speelman: "Quantum Homomorphic Encryption for Polynomial-sized Circuits"
|
09:10 |
09:35 |
Bellare/Kane/Rogaway: "Big-Key Symmetric Encryption: Resisting Key Exfiltration"
|
09:35 |
Dupuis/Fehr/Lamontagne/Salvail: "Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications"
|
09:35 |
10:00 |
Degabriele/Paterson/Schuldt/Woodage: "Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results"
|
10:00 |
Gagliardoni/Hülsing/Schaffner: "Semantic Security and Indistinguishability in the Quantum World"
|
10:00 |
10:25 |
Coffee break
|
10:25 |
|
10:25 |
10:30 |
Coffee break. Probably better than the Crypto coffee break.
|
10:30 |
|
10:50 |
Tutorial: Lomné: "Common Criteria Certification of a Smartcard: A Technical Overview"
|
10:50 |
|
10:55 |
Bar-On/Keller: "A 2^{70} Attack on the Full MISTY1"
|
10:55 |
Dodis/Halevi/Rothblum/Wichs: "Spooky Encryption and its Applications"
|
10:55 |
11:20 |
Duval/Lallemand/Rotella: "Cryptanalysis of the FLIP Family of Stream Ciphers"
|
11:20 |
Dwork/Naor/Rothblum: "Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems"
|
11:20 |
11:45 |
|
11:45 |
|
11:45 |
11:50 |
Zhandry: "The magic of ELFs"
|
11:50 |
|
12:15 |
Boyle/Gilboa/Ishai: "Breaking the Circuit Size Barrier for Secure Computation Under DDH"
|
12:15 |
|
12:20 |
|
12:20 |
|
12:40 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 14:00.
|
12:40 |
|
12:40 |
|
14:00 |
Tutorial: Yarom: "Micro-Architectural Side-Channel Attacks"
|
14:00 |
|
|
15:30 |
Coffee break
|
15:30 |
|
|
15:50 |
Tutorial: Yarom: "Micro-Architectural Side-Channel Attacks"
|
15:50 |
|
|
17:20 |
|
17:20 |
|
|
17:30 |
Registration
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The rump session will have enough food, and everyone will be there instead.
|
17:30 |
|
18:00 |
Reception (until 21:00) + awards (19:00-19:30) + rump session
|
18:00 |
19:30 |
|
19:30 |
20:00 |
|
20:00 |
|
23:00 |
|
23:00 |
|
23:00 |
|
23:00 |
Wednesday 17 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:00 to 09:00.
|
07:30 |
|
|
08:30 |
Breakfast
|
08:30 |
|
08:50 |
Kim/Barbulescu: "Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case"
|
08:50 |
08:50 |
Hemenway/Jafargholi/Ostrovsky/Scafuro/Wichs: "Adaptively Secure Garbled Circuits from One-Way Functions"
|
08:50 |
09:00 |
Opening remarks
|
09:00 |
09:15 |
Costello/Longa/Naehrig: "Efficient Algorithms for Supersingular Isogeny Diffie-Hellman"
|
09:15 |
09:15 |
Cascudo/Damgård/David/Döttling/Nielsen: "Rate-1, Linear Time and Additively Homomorphic UC Commitments"
|
09:15 |
09:20 |
Dugardin/Danger/Guilley/Najm/Rioul: "Correlated Extra-Reductions Defeat Blinded Regular Exponentiation"
|
09:20 |
09:40 |
|
09:40 |
09:40 |
|
09:40 |
09:45 |
Battistello/Coron/Prouff/Zeitoun: "Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme"
|
09:45 |
Sun/Liu/Guo/Qu/Rijmen: "New Insights on AES-Like SPN Ciphers"
|
09:45 |
Camenisch/Dubovitskaya/Rial: "UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens"
|
09:45 |
10:10 |
Durvaux/Standaert/Del Pozo: "Towards Easy Leakage Certification"
|
10:10 |
Beierle/Kranz/Leander: "Lightweight Multiplication in GF(2n) with Applications to MDS Matrices"
|
10:10 |
Cohen/Coretti/Garay/Zikas: "Probabilistic Termination and Composability of Cryptographic Protocols"
|
10:10 |
10:35 |
Poussier/Standaert/Grosso: "Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach"
|
10:35 |
Boura/Canteaut: "Another View of the Division Property"
|
10:35 |
Ciampi/Ostrovsky/Siniscalchi/Visconti: "Concurrent Non-Malleable Commitments (and More) in 3 Rounds"
|
10:35 |
11:00 |
Campbell Auditorium | CHES+Crypto | Coffee break
|
11:00 |
|
11:00 |
|
11:00 |
11:30 |
Campbell Auditorium | CHES+Crypto | Invited talk: Kocher: "Obvious in Hindsight: From Side Channel Attacks to the Security Challenges Ahead"
|
11:30 |
|
|
12:30 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 14:00.
|
12:30 |
|
|
14:00 |
|
14:00 |
Bourse/Del Pino/Minelli/Wee: "FHE Circuit Privacy Almost For Free"
|
14:00 |
Zhang/Chen/Zhang: "Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes"
|
14:00 |
14:15 |
Jain/Guajardo: "Physical Layer Group Key Agreement for Automotive Controller Area Networks"
|
14:15 |
14:25 |
Kiltz/Masny/Pan: "Optimal Security Proofs for Signatures from Identification Schemes"
|
14:25 |
Agrawal/Libert/Stehlé: "Fully Secure Functional Encryption for Inner Products, from Standard Assumptions"
|
14:25 |
14:40 |
Nürnberger/Rossow: "vatiCAN: Vetted, Authenticated CAN Bus"
|
14:40 |
14:50 |
Yamakawa/Yamada/Hanaoka/Kunihiro: "Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli"
|
14:50 |
Brakerski/Vaikuntanathan: "Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security"
|
14:50 |
15:05 |
Coffee break
|
15:05 |
15:15 |
Coffee break
|
15:15 |
|
15:15 |
15:35 |
Xie/Srivastava: "Mitigating SAT Attack on Logic Locking"
|
15:35 |
|
15:45 |
Perrin/Udovenko/Biryukov: "Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem"
|
15:45 |
Abe/Hoshino/Ohkubo: "Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming"
|
15:45 |
16:00 |
Lohrke/Tajik/Boit/Seifert: "No Place to Hide: Contactless Probing of Secret Data on FPGAs"
|
16:00 |
16:10 |
Beierle/Jean/Kölbl/Leander/Moradi/Peyrin/Sasaki/Sasdrich/Sim: "The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS"
|
16:10 |
Carmer/Rosulek: "Linicrypt: A Model for Practical Cryptography"
|
16:10 |
16:25 |
|
16:25 |
|
16:35 |
|
16:35 |
|
16:35 |
16:45 |
IACR membership meeting
|
16:45 |
|
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package. The beach barbecue (Crypto) and Anacapa dinner (CHES) have more than enough food, and everyone will be there instead.
|
17:30 |
|
17:45 |
|
17:45 |
|
18:00 |
Beach barbecue; matching world-record speed!
|
18:00 |
|
18:30 |
Dinner in Anacapa/Santa Cruz Ocean Lawn
|
18:30 |
19:15 |
|
19:15 |
19:30 |
Dorms (Anacapa etc.) | CHES+Crypto | Crypto Cafe
|
19:30 |
|
|
20:00 |
|
20:00 |
22:30 |
|
22:30 |
|
22:30 |
|
22:30 |
Thursday 18 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:00 to 09:00.
|
07:30 |
|
|
08:30 |
Breakfast
|
08:30 |
|
08:50 |
Derbez/Fouque: "Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks"
|
08:50 |
08:50 |
Applebaum/Raykov: "On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings"
|
08:50 |
09:00 |
Grosso/Güneysu/Leander/Moradi/Schneider: "Strong 8-bit Sboxes with Efficient Masking in Hardware"
|
09:00 |
09:15 |
Dinur/Dunkelman/Keller/Shamir: "Memory-Efficient Algorithms for Finding Needles in Haystacks"
|
09:15 |
09:15 |
Baum/Damgård/Larsen/Nielsen: "How to prove knowledge of small secrets"
|
09:15 |
09:25 |
De Cnudde/Reparaz/Bilgin/Nikova/Nikov/Rijmen: "Masking AES with d+1 Shares in Hardware"
|
09:25 |
09:40 |
Kaplan/Leurent/Leverrier/Naya-Plasencia: "Breaking Symmetric Cryptosystems using Quantum Period Finding"
|
09:40 |
09:40 |
Chase/Ganesh/Mohassel: "Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials"
|
09:40 |
09:50 |
Bos/Hubain/Michiels/Teuwen: "Differential Computation Analysis: Hiding your White-Box Designs is Not Enough"
|
09:50 |
10:05 |
Coffee break
|
10:05 |
10:05 |
|
10:05 |
10:15 |
Zonenberg/Yener: "Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture"
|
10:15 |
|
10:30 |
Alwen/Blocki: "Efficiently Computing Data-Independent Memory-Hard Functions"
|
10:30 |
10:30 |
Degwekar/Vaikuntanathan/Vasudevan: "Fine-grained Cryptography"
|
10:30 |
10:40 |
Coffee break
|
10:40 |
10:55 |
Dziembowski/Faust/Herold/Journault/Masny/Standaert: "Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems"
|
10:55 |
10:55 |
Garg/Mohassel/Papamanthou: "TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption"
|
10:55 |
11:15 |
Oliveira/López/Rodríguez-Henríquez: "Software implementation of Koblitz curves over quadratic fields"
|
11:15 |
11:20 |
Schneider/Moradi/Güneysu: "ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks"
|
11:20 |
11:20 |
Bogdanov/Ishai/Viola/Williamson: "Bounded Indistinguishability and the Complexity of Recovering Secrets"
|
11:20 |
11:40 |
Chou: "QcBits: constant-time small-key code-based cryptography"
|
11:40 |
11:45 |
|
11:45 |
11:45 |
Doettling/Fleischhacker/Krupp/Schröder: "Two Message Oblivious Evaluation of Cryptographic Functionalities"
|
11:45 |
12:05 |
Batina/Renes/Schwabe/Smith: "uKummer: efficient hyperelliptic signatures and key exchange on microcontrollers"
|
12:05 |
|
12:05 |
|
12:10 |
|
12:10 |
12:30 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 14:00.
|
12:30 |
|
|
13:45 |
|
13:45 |
|
|
14:15 |
Groot Bruinderink/Hülsing/Lange/Yarom: "Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme"
|
14:15 |
|
|
14:40 |
Yarom/Genkin/Heninger: "CacheBleed: A Timing Attack on OpenSSL Constant Time RSA"
|
14:40 |
|
|
15:05 |
Inci/Gulmezoglu/Irazoqui/Eisenbarth/Sunar: "Cache Attacks Enable Bulk Key Recovery on the Cloud"
|
15:05 |
|
|
15:30 |
Coffee break
|
15:30 |
|
|
16:00 |
Ganji/Tajik/Faessler/Seifert: "Strong Machine Learning Attack against PUFs with No Mathematical Model"
|
16:00 |
|
|
16:25 |
Delvaux/Gu/Verbauwhede/Hiller/Yu: "Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications"
|
16:25 |
|
|
16:50 |
Xiong/Schaller/Anagnostopoulos/Saleem/Gabmeyer/Katzenbeisser/Szefer: "Run-time Accessible DRAM PUFs in Commodity Devices"
|
16:50 |
|
|
17:15 |
|
17:15 |
|
|
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner, if you signed up for it as part of a housing package.
|
17:30 |
|
18:00 |
La Pacifica Ballroom, The Four Seasons Biltmore | CHES | Rump session and banquet (buses leave 18:00 in front of Anacapa)
|
18:00 |
|
19:30 |
|
19:30 |
|
22:15 |
|
22:15 |
|
22:15 |
|
22:15 |
Friday 19 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:00 to 09:00.
|
07:30 |
|
08:30 |
Breakfast
|
08:30 |
08:45 |
|
08:45 |
|
09:00 |
|
09:00 |
09:30 |
Goudarzi/Rivain: "On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking"
|
09:30 |
|
09:55 |
Pulkus/Vivek: "Reducing the Number of Non-linear Multiplications in Masking Schemes"
|
09:55 |
|
10:20 |
Coron/Greuet/Prouff/Zeitoun: "Faster Evaluation of SBoxes via Common Shares"
|
10:20 |
|
10:45 |
Coffee break
|
10:45 |
|
11:15 |
Järvinen/Miele/Azarderakhsh/Longa: "FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields"
|
11:15 |
|
11:40 |
Ueno/Morioka/Homma/Aoki: "A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths — Toward Efficient CBC-Mode Implementation"
|
11:40 |
|
12:05 |
Kammerstetter/Muellner/Kudera/Burian/Kastner: "Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering"
|
12:05 |
|
12:30 |
Lunch break at Campus Green (wherever that is)
|
12:30 |
|
12:35 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:35 |
13:50 |
|
13:50 |
14:15 |
Panel discussion
|
14:15 |
|
15:15 |
Coffee break
|
15:15 |
|
15:45 |
Saha/Chowdhury: "EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ"
|
15:45 |
|
16:10 |
Bhattacharya/Mukhopadhyay: "Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis"
|
16:10 |
|
16:35 |
Ghandali/Becker/Holcomb/Paar: "A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks"
|
16:35 |
|
17:00 |
Concluding remarks
|
17:00 |
|
17:10 |
|
17:10 |
|
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:30 |
|
19:15 |
|
19:15 |
|
19:15 |
Saturday 20 August 2016 |
07:30 |
De La Guerra Dining Commons | Dorm residents | Breakfast. Actually open 07:30 to 08:45.
|
07:30 |
08:45 |
|
08:45 |
12:00 |
De La Guerra Dining Commons | Dorm residents | Lunch. Actually open 11:30 to 13:30.
|
12:00 |
13:30 |
|
13:30 |
17:30 |
De La Guerra Dining Commons | Dorm residents | Dinner
|
17:30 |
19:15 |
|
19:15 |