Call for Participation: ASIACRYPT 2007

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Dear all

Please see below the call for participation for ASIACRYPT 2007,
the 13th Annual International Conference on the Theory and Application
of Cryptology & Information Security.
Program with paper details is also included.

Raphael Phan
ASIACRYPT 2007 General Chair

Dates: December 2 - 6, 2007
Venue: Kuching, Sarawak, Malaysia /

Conference Information:
ASIACRYPT, the International Conference on the Theory and Application
of Cryptology and Information Security, is one of the three major
cryptology conferences sponsored annually by the International
Association for Cryptologic Research (IACR), featuring latest
breakthrough research in cryptology and information security.
ASIACRYPT 2007 will be held in Kuching, Sarawak, Malaysia, organized
by the IACR in cooperation with the Swinburne University of Technology
Sarawak campus and the Sarawak Development Institute, supported by the
Sarawak state Government and Malaysian Ministry of Tourism.  Formal
proceedings published by Springer will be provided to registered
attendees at the conference. Technical sessions run from Monday
morning to Thursday noon, with a welcome reception on Sunday evening,
a guided excursion on Tuesday morning, and official banquet on
Wednesday evening.  The customary Rump Session will run as usual on
Tuesday evening.

Venue Information:
Kuching is the capital of Sarawak, situated on Borneo Island.  The
conference will be held at Crowne Plaza Hotel, Riverside Kuching
located at the Kuching Waterfront overlooking the historical Fort
Margherita across the Sarawak River, right in the heart of the city's
entertainment, dining, shopping and business district; and 20 minutes
drive from the Kuching International Airport.  Flight connections to
Kuching are available several times a day from Kuala Lumpur and

General Chair:
Raphael C.-W. Phan
CH-1015 Lausanne
Tel: +41 21 693 8127

Program Chair:
Kaoru Kurosawa
Department of Computer & Information Sciences
Ibaraki University
4-12-1 Nakanarusawa, Hitachi, Ibaraki
316-8511, JAPAN
Tel/Fax: + 81 294 38 5135


Program of Asiacrypt 2007:
December 3rd (Monday)
[1. Number Theory and Elliptic curve]
Session Chair:    Serge Vaudenay

A kilobit special number field sieve factorization,
    Kazumaro Aoki (NTT)
    Jens Franke (University of Bonn, Department of Mathematics)
    Thorsten Kleinjung (University of Bonn, Department of Mathematics)
    Arjen K. Lenstra (EPFL and Bell Laboratories)
    Dag Arne Osvik (EPFL)

When e-th Roots Become Easier Than Factoring,
    Antoine Joux (DGA and Universit=E9 de Versailles)
    David Naccache (Ecole normale sup=E9rieure)
    Emmanuel Thom\'e (INRIA Lorraine, LORIA)

Faster addition and doubling on elliptic curves,
   Daniel J. Bernstein (University of Illinois at Chicago, USA)
   Tanja Lange (Technische Universiteit Eindhoven, Netherlands)

[2. Protocol]
Session Chair:    Xuejia Lai

A Non-Interactive Shuffle with Pairing Based Verifiability,
   Jens Groth (University College London)
   Steve Lu (UCLA, Math Department)

On Privacy Models for RFID,
   Serge Vaudenay (EPFL)

[Invited Talk I]
Session Chair:    Masayuki Abe

Obtaining Universally Composable Security: Towards the Bare Bones of
    Ran Canetti (IBM T.J. Watson Research Center)

[3. Hash Function Design]
Session Chair: Arjen Lenstra

A Simple Variant of the Merkle-Damg=E5rd Scheme with a Permutation,
   Shoichi Hirose (University of Fukui, Japan),
   Je Hong Park (ETRI Network & Communication Security Division,
   Aaram Yun (ETRI Network & Communication Security Division, Korea)

Seven-Property-Preserving Iterated Hashing: ROX,
   Elena Andreeva (Katholieke Universiteit Leuven)
   Gregory Neven (Katholieke Universiteit Leuven)
   Thomas Shrimpton (Portland State University and University of
   Bart Preneel (Katholieke Universiteit Leuven)

How to build a hash function from any collision-resistant function,
   Thomas Ristenpart (University of California, San Diego)
   Thomas Shrimpton (Portland State University and University of

[4. Group/Broadcast Cryptography]
Session Chair: Josef Pieprzyk

Fully Anonymous Group Signatures without Random Oracles,
    Jens Groth (University College London)

Group Encryption,
   Aggelos Kiayias (University of Connecticut, USA)
   Yiannis Tsiounis (BestQuotes, USA)
   Moti Yung (Columbia University, USA)

Identity-Based Broadcast Encryption with Constant Size Ciphertexts and
Private Keys,
   C=E9cile Delerabl=E9e (Orange Labs)

December 4th (Tuesday)
[Guided Excursion to Semenggok Orang Utan Wildlife Centre and
08:00 - 14:00

[5. MAC and Implementation]
Session Chair: Thomas Johansson

Boosting Merkle-Damg=E5rd Hashing for Message Authentication,
   Kan Yasuda (NTT, Japan)

On Efficient Message Authentication Via Block Cipher Design
   G. Jakimoski and K. P. Subbalakshmi (Stevens Institute of

Symmetric Key Cryptography on Modern Graphics Hardware,
   James Goodman and Jason Yang (Advanced Micro Devices, Inc.)

[6. Multiparty Computation I]
Session Chair: Jung Hee Cheon

Blind Identity-Based Encryption and Simulatable Oblivious Transfer,
    Matthew Green and Susan Hohenberger (The Johns Hopkins University)

Multi-Party Indirect Indexing and Applications,
    Matthew Franklin, Mark Gondree and Payman Mohassel
    (Dept. of Computer Science, University of California, Davis)

Two-Party Computing with Encrypted Data,
   Seung Geol Choi (Computer Science Department, Columbia University)
   Ariel Elbaz (Computer Science Department, Columbia University)
   Ari Juels (RSA Laboratories)
   Tal Malkin (Computer Science Department, Columbia University)
   Moti Yung (Computer Science Department, Columbia University)

[Rump Session]
Session Chair: Aggelos Kiayias

December 5th (Wednesday)
[7. Block Cipher]
Session Chair: Tetsu Iwata

Known-Key Distinguishers for Some Block Ciphers,
   Lars R. Knudsen (Technical University of Denmark)
   Vincent Rijmen (Graz University of Technology, Austria)

Generic Attacks on Unbalanced Feistel Schemes with Expanding
  Jacques Patarin (University of Versailles)
  Valerie Nachef (University of Cergy-Pontoise)
  Come Berbain (France Telecom Research and Developpement)

On Tweaking Luby-Rackoff Ciphers,
   Elizabeth Crump Schwartz (College of William and Mary)
   David Goldenberg (College of William and Mary)
   Susan Hohenberger (Johns Hopkins University)
   Moses Liskov (College of William and Mary)
   Hakan Seyalioglu (College of William and Mary)

[8. Multiparty Computation II]
Session Chair: Pandu Rangan

Secure Protocols with Asymmetric Trust,
   Ivan Damg=E5rd (Aarhus University)
   Yvo Desmedt (University College London)
   Matthias Fitzi (ETH Z=FCrich)
   Jesper Buus Nielsen (Aarhus University)

Simple and Efficient Perfectly-Secure Asynchronous MPC,
   Zuzana Beerliov=E1-Trub=EDniov=E1 (ETH Zurich)
   Martin Hirt (ETH Zurich)

Efficient Byzantine Agreement with Faulty Minority,
   Zuzana Beerliov=E1-Trub=EDniov=E1 (ETH Zurich)
   Martin Hirt (ETH Zurich)
   Micha Riser (ETH Zurich)

Information-theoretic security without an honest majority,
    Anne Broadbent and Alain Tapp (Universit=E9 de Montr=E9al)

[9. Foundation]
Session Chair: Jesper Buus Nielsen

Black-Box Extension Fields and the Inexistence of Field-Homomorphic
One-Way Permutations,
   Ueli Maurer and Dominik Raub (ETH Zurich)

Concurrent Statistical Zero-Knowledge Arguments for NP from One Way
    Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky and Amit Sahai (UCLA)

Anonymous Quantum Communication,
    Gilles Brassard (Universit=E9 de Montr=E9al)
    Anne Broadbent (Universit=E9 de Montr=E9al)
    S=E9bastien Gambs (Universit=E9 de Montr=E9al)
    Joseph Fitzsimons (University of Oxford)
    Alain Tapp (Universit=E9 de Montr=E9al)

[Invited Talk II]
Session Chair: Tsuyoshi Takagi

Authenticated Key Exchange and Key Encapsulation in the Standard
    Tatsuaki Okamoto (NTT, Japan)

[Official Banquet]

December 6th (Thursday)
[10. Public Key Encryption]
Session Chair:    Kaoru Kurosawa

Miniature CCA2 PK Encryption : Tight Security Without Redundancy,
   Xavier Boyen (Voltage Inc.)

Bounded CCA2-Secure Encryption,
   Ronald Cramer (CWI & Leiden University)
   Goichiro Hanaoka (AIST, Japan)
   Dennis Hofheinz (CWI)
   Hideki Imai (AIST, Japan)
   Eike Kiltz (CWI)
   Rafael Pass (Cornell University)
   abhi shelat (U. Virginia)
   Vinod Vaikuntanathan (MIT)

Relations Among Notions of Non-Malleability for Encryption,
   Rafael Pass (Cornell University)
   abhi shelat (U. Virginia)
   Vinod Vaikuntanathan (MIT)

[11. Cryptanalysis]
Session Chair: Bart Preneel

Cryptanalysis of the Tiger Hash Function,
   Florian Mendel (Institute for Applied Information Processing and
Communications (IAIK))
   Vincent Rijmen (Graz University of Technology, Austria)

Cryptanalysis of Grindahl, best paper award
    Thomas Peyrin (France T=E9l=E9com R&D, AIST, University of Versailles)

A Key Recovery Attack on Edon80,
   Martin Hell and Thomas Johansson (Lund University, Sweden)


Site Timeline