The call for submissions was issued two weeks earlier. It was originally on this page but has now been archived on a separate page.
The original rump-session schedule (PDF) was printed and copied around 11:00 Santa Barbara time on Tuesday 21 August 2007. One additional talk was submitted and accepted in the afternoon, after the schedule was printed. One additional talk was submitted and accepted halfway through the rump session, after the electronic schedule was prepared. The final schedule (PDF) is available only online.
http://www.it.id.ucsb.edu/crypto.mov was webcast from the rump-session room starting around 17:00.
Almost all of the presentations are online:
Authors | Speaker | Title | Slides | |
---|---|---|---|---|
Crypto 2007 rump session, Tuesday 21 August 2007 | ||||
Introduction | ||||
19:45 | Daniel J. Bernstein (chair) | Daniel J. Bernstein | Welcome | 01-bernstein |
19:49 | Markus Jakobsson (chair of something else) | Markus Jakobsson | Best-paper award (rump papers not included, sorry) | 02-jakobsson |
19:50 | Jean-Jacques Quisquater (sponsor) | Jean-Jacques Quisquater | Less known facts about an indentification protocol | 03-quisquater |
Politics | ||||
19:56 | Susan Landau | Susan Landau | The Security Risks Created by the Protect America Act | 04-landau |
20:00 | Whitfield Diffie and Susan Landau | Whitfield Diffie | Privacy on the Line: The Politics of Wiretapping and Encryption (updated and expanded edition) | 05-diffie |
20:01 | Ross Anderson | Ross Anderson | Does Bob Go to Prison? | 06-anderson |
20:08 | Alexander May, Roberto Avanzi, Christof Paar, Ahmad Sadeghi, Jörg Schwenk, Christopher Wolf | Christopher Wolf | Eurocrypt 2009 in Cologne | 07-wolf |
Demos | ||||
20:10 | Manoj Prabhakaran & Mike Rosulek | Mike Rosulek | CRYPTUTOR | 08-rosulek |
Hash functions | ||||
20:14 | Florian Mendel and Christian Rechberger and Vincent Rijmen | Christian Rechberger | Update on SHA-1 | 09-rechberger |
20:19 | Gregory Hirshman | Gregory Hirshman | Further Musings on the Wang et al. MD5 Collision | 10-hirshman |
20:23 | Daniel J. Bernstein | Daniel J. Bernstein | $1000 for best attack this year: http://cr.yp.to/rumba20.html | |
20:23 | Adi Shamir | Adi Shamir | How to SQUASH Your Data | 11-shamir |
20:30 | Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Guo Jian, Huaxiong Wang | Ron Steinfeld | Analysis of LASH (Work in Progress) | 12-steinfeld |
20:33 | Carl Ellison, Victor Miller, Eran Tromer, Rebecca Wright | Cryptoc Hoir | On the design and cryptanalysis of a one-way hash | 13-hoir |
20:40 | Break | |||
Cryptanalysis | ||||
21:00 | Eli Biham, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel | Bart Preneel | How to Steal Cars - A Practical Attack on KeeLoq | 14-preneel |
21:05 | Dan Shumow, Niels Ferguson | Dan Shumow | On the Possibility of a back door in the NIST SP800-90 Dual Ec Prng | 15-shumow |
21:09 | Bob Silverman | Bob Silverman | Optimal Sieving Regions for the Lattice Sieve | 16-silverman |
21:12 | Igor Semaev | Igor Semaev | Average versus Worst in Solving Sparse Algebraic Equations | 17-semaev |
21:17 | Andy Clark, Tony Sale | Andy Clark | A Colossal Challenge | 18-clark |
21:22 | Tanja Lange, Christof Paar | Christof Paar | SHARCS 07 Announcement | 19-paar |
Encryption | ||||
21:24 | Christof Paar et al. | Christof Paar | The only Rump Session Talk with Pamela Anderson | 20-paar |
21:30 | Christof Paar | Christof Paar | Announcement CHES 2007 | 21-paar |
21:32 | Philip Zimmermann | Philip Zimmermann | ZRTP: Media Path Key Agreement for Secure VoIP | 22-zimmermann |
21:37 | Thomas Baignères, Serge Vaudenay | Serge Vaudenay | FSE 2008 announcement | 23-vaudenay |
21:38 | Ronald Cramer, Carles Padro | Ronald Cramer | Public Key Cryptography, PKC 2008 | 24-cramer |
21:40 | Chris Peikert and Brent Waters | Brent Waters | Lossy Trapdoor Functions | 25-waters |
21:47 | Nicko van Someren | Nicko van Someren | nCipher is hiring Cryptographic Security Architects - nicko@ncipher.com | |
21:47 | Jon Callas, Tamzen Cannoy, Nicko Van Someren | Jon Callas | Economics and Cryptography: Integrity checks as a solution to factoring sub-primes | 26-callas |
21:54 | Break | |||
Conclusion | ||||
22:15 | Alexandra Boldyreva | Alexandra Boldyreva | Face Paradox and Cryptanalysis of Several Face Recognition Protocols | 27-boldyreva |
22:18 | Yevgeniy Dodis | Yevgeniy Dodis | TCC 2008 announcement | 28-dodis |
22:19 | David Freeman | David Freeman | Constructing Pairing-Friendly Ordinary Genus 2 Curves | 29-freeman |
22:25 | Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum | Adam O'Neill | Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures | 30-oneill |
22:29 | Dan Boneh, Craig Gentry, Mike Hamburg | Craig Gentry | Space-Efficient IBE without Pairings | 31-gentry |
22:34 | Masayuki Abe | Masayuki Abe | ASIACCS 2008 CFP | 32-abe |
22:35 | Tal Malkin | Tal Malkin | CT-RSA 2008 announcement | 33-malkin |
22:36 | Ivan Damgård | Jesper Buus Nielsen | ICALP 2008, Cryptographer's Track | 34-nielsen |
22:38 | Ivan Damgård, Jesper Buus Nielsen | Jesper Buus Nielsen | Multiparty Computation Goes Live | 35-nielsen |
22:44 | Juan Garay and Jonathan Katz and Chiu-Yuen Koo and Rafail Ostrosvky | Juan Garay | Round Complexity of Authenticated Broadcast with a Dishonest Majority | 36-garay |
22:50 | Juan Garay, Aggelos Kiayias and Hong-Sheng Zhou | Aggelos Kiayias | Sound and Fine-grained Specification of Ideal Functionalities | 37-kiayias |
22:56 | Manoj Prabhakaran & Mike Rosulek | Mike Rosulek | Trusted Parties & Their Twins | 38-rosulek |
23:02 | Good night! |