DIMACS Workshop on Cryptography: Theory Meets Practice

October 14 - 15, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ

Organizers:
Dan Boneh, Stanford, dabo@cs.stanford.edu
Presented under the auspices of the Special Focus on Communication Security and Information Privacy, and the PORTIA project.

Workshop Program:

Thursday, October 14, 2004

 8:15 -  8:50  Breakfast and Registration - CoRE Building, 4th Floor

 8:50 -  9:00  Welcome and Opening Remarks
               Brenda Latka, DIMACS Associate Director

Session 1:

 9:00 -  9:45  A Cryptographic Model for Access Control 
               Shai Halevi, IBM Watson

 9:45 - 10:30  Breakthrough-Resistant Cryptography
               Adam Stubblefield, Johns Hopkins University

10:30 - 11:00  Break

Session 2:

11:00 - 11:45  The Risks of Electronic Voting
               Dan Wallach, Rice University

11:45 - 12:30  Cryptography and the Internet: Where It Is, Where It Isn't, 
               Where it Should Be - and Why It Isn't There. . .
               Steve Bellovin, AT&T Labs Research

12:30 -  2:00  Lunch

Session 3:

 2:00 -  2:45  Efficient Privacy-preserving Information Sharing: 
               Set Intersection and Threshold Set Intersection
               Dawn Song, Carnegie Mellon University

 2:45 -  3:30  Recent Progress in Anonymous Communication
               Mike Reiter, Carnegie Mellon University  
   
 3:30 -  4:00  Break

Session 4:

 4:00 -  4:45  Randomness Extraction and Key Derivation Using 
               Common Pseudorandom Modes
               Hugo Krawczyk, IBM Watson

 4:45 -  5:30  What's the Worst That Could Happen?
               Eric Rescorla, RTFM, Inc. 

Friday, October 15, 2004

 8:30 -  9:00  Breakfast and Registration - CoRE Building, 4th Floor

Session 5:

 9:00 -  9:30  Fuzzy Commitment
               Ari Juels, RSA Laboratories

 9:30 - 10:15  Secure Fuzzy Extractors
               Xavier Boyen, Voltage Inc.

10:15 - 10:45  Break

Session 6:

10:45 - 11:30  Using Biometrics for Secure Network-Based Authentication
               Jonathan Katz, University of Maryland 

11:30 - 12:15  Cryptographic Mechanisms to Secure Routing Protocols
               Adrian Perrig, Carnegie Mellon University

12:15 -  1:30  Lunch

Session 7:

 1:30 -  2:15  Cryptographic Hashing: Blockcipher-based Constructions Revisited
               Tom Shrimpton, Portland State University 

 2:15 -  3:00  Privacy-Preserving Bayesian Network Structure
               Computation on Distributed Heterogeneous Data
               Rebecca Wright, Stevens Institute of Technology
 
 3:00 -  3:30  Break

 3:30 -  4:15  Error Correction in the Bounded Storage Model
               Yan Zhong Ding, Georgia Institute of Technology

 4:15 -  4:45  Smart Theory Meets Smartcard Practice
               Jean-Jacques Quisquater, Universite Catholique de Louvain, 
               Belgium and CNRS, France

 4:45          End of Workshop



Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on October 18, 2004.