| Authors | Speaker | Title | Slides |
| Eurocrypt 2009 rump session, Tuesday 28 April 2009 |
| |
| Conference organization |
18:30 | Aurélie Bauer, Sorina Ionica, Joana Treger and Vanessa Vitse | Sorina Ionica | Antoine Joux, the program chair but not only ... | slides |
18:32 | Antoine Joux | Antoine Joux | Eurocrypt program chair's statistics | slides |
18:38 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval, Damien Vergnaud | Pierre-Alain Fouque | ACNS 2009 Conference | slides |
18:39 | Tanja Lange, Arjen Lenstra | Tanja Lange | SHARCS'09 | slides |
18:40 | Eiji Okamoto | Eiji Okamoto | Asiacrypt 2009 | slides |
18:41 | CANS 2009 Organizing Committee | Katsuyuki Takashima | CANS 2009 | slides |
18:42 | Mario Lamberger and Christian Rechberger | Christian Rechberger | WEWoRC 2009 | slides |
18:43 | Nigel Smart | Nigel Smart | Three Announcements | slides |
18:46 | Kaoru Kurosawa | Kaoru Kurosawa | ICITS 2009 | slides |
18:47 | aggelos kiayias | aggelos kiayias | MyReviewSucks.com Call for Reviews | slides |
| Ciphers |
18:51 | Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić | Dmitry Khovratovich | AES-256 is Not Ideal | slides |
18:56 | Lu Xiao, Greg Rose | Greg Rose | Attacks on MRG ciphers | slides |
19:03 | Ueli Maurer, Stefano Tessaro | Stefano Tessaro | Computational Indistinguishability Amplification: Provable Security Amplification by Cascade Encryption | slides |
19:08 | Gregory Bard with Nicolas Courtois and Shaun Ault | Gregory Bard | Distinguishing Attacks on Highly-Iterated Ciphers | slides |
19:11 | Yevgeniy Dodis, John Steinberger | Yevgeniy Dodis | Message Authentication Codes from Unpredictable Block Ciphers | slides |
19:15 | Michael Vielhaber | Michael Vielhaber | AIDA vs. TRIVIUM 793 : 1152 FINAL SCORE 980 : 1152 | slides |
19:19 | Adi Shamir | Adi Shamir | On the Evolution of Cryptanalytic Attacks | |
| Hash functions |
19:24 | Cameron McDonald, Josef Pieprzyk, Phil Hawkes | Greg Rose | Automatic Differential Path Searching for SHA-1 | slides |
19:29 | Jean-Philippe Aumasson and Dmitry Khovratovich | Dmitry Khovratovich | Beer-recovery analysis | slides |
19:36 | Harry Wiggins, Cameron McDonald, Phil Hawkes, Greg Rose | Greg Rose | More Differential Paths for TIB3 | slides |
19:43 | Michael Naehrig, Christiane Peters, Peter Schwabe | Christiane Peters | A brief look at the 56 SHA-3 submissions | slides |
19:50 | Break | | | |
| Cryptography and security |
20:20 | Henk van Tilborg | Jean-Jacques Quisquater | Encyclopedia of Cryptography and Security - second edition coming out 2010 | slides |
20:22 | Serge Vaudenay | Serge Vaudenay | The Biometric Passport: the Swiss Case | slides |
20:29 | Nicolas T. Courtois, University College London | Nicolas T. Courtois | Conditional Multiple Differential Attack on MiFare Classic Smart Cards | slides |
20:33 | Christian Cachin | Christian Cachin | Key Management - From Cryptoprocessors to OASIS | slides |
20:39 | Yuji SUGA | Yuji SUGA | A proposal of secure and green printing system | slides |
| Public-key cryptography |
20:42 | Krzysztof Pietrzak and Eike Kiltz | Krzysztof Pietrzak | Efficient Leakage-Resilient Public-Key Cryptograhpy | slides |
20:46 | Joel Alwen, Yevgeniy Dodis and Daniel Wichs | Yevgeniy Dodis | Public Key Cryptography in the Bounded Retrieval Model | slides |
20:50 | Daniel J. Bernstein, Hsueh-Chung Chen, Ming-Shing Chen, Chen-Mou Cheng, Chun-Hung Hsiao, Tanja Lange, Zong-Cing Lin, and Bo-Yin Yang | Chen-Mou Cheng | A Billion-mulmods-per-second PC | slides |
20:57 | Eike Kiltz and Adam O'Neill | Adam O'Neill | Securrity Proofs for OAEP in the Standard Model | slides |
21:02 | Jean-Sebastien Coron, David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann | David Naccache | Practical Forgery of ISO 9796-2:2002 RSA Signatures | |
21:09 | Craig Gentry | Craig Gentry | Fully Homomorphic Encryption Using Ideal Lattices | slides |
21:16 | Steven Meyer | Steven Meyer | Maybe non Number Theory Crytography is Worth Trying | slides |
21:20 | Claus P. Schnorr | Claus P. Schnorr | Factoring Integers in Polynomial Time | slides |
21:25 | Michael Naehrig, Christiane Peters, Peter Schwabe | tutti | A brief look at the 56 SHA-3 submissions (reprise) | |
21:30 | Fin! | | | |