DIMACS Workshop on Cryptography: Theory Meets Practice
October 14 - 15, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
- Organizers:
- Dan Boneh, Stanford, dabo@cs.stanford.edu
Presented under the auspices of the Special Focus on Communication Security and Information Privacy, and the PORTIA project.
Workshop Program:
Thursday, October 14, 2004
8:15 - 8:50 Breakfast and Registration - CoRE Building, 4th Floor
8:50 - 9:00 Welcome and Opening Remarks
Brenda Latka, DIMACS Associate Director
Session 1:
9:00 - 9:45 A Cryptographic Model for Access Control
Shai Halevi, IBM Watson
9:45 - 10:30 Breakthrough-Resistant Cryptography
Adam Stubblefield, Johns Hopkins University
10:30 - 11:00 Break
Session 2:
11:00 - 11:45 The Risks of Electronic Voting
Dan Wallach, Rice University
11:45 - 12:30 Cryptography and the Internet: Where It Is, Where It Isn't,
Where it Should Be - and Why It Isn't There. . .
Steve Bellovin, AT&T Labs Research
12:30 - 2:00 Lunch
Session 3:
2:00 - 2:45 Efficient Privacy-preserving Information Sharing:
Set Intersection and Threshold Set Intersection
Dawn Song, Carnegie Mellon University
2:45 - 3:30 Recent Progress in Anonymous Communication
Mike Reiter, Carnegie Mellon University
3:30 - 4:00 Break
Session 4:
4:00 - 4:45 Randomness Extraction and Key Derivation Using
Common Pseudorandom Modes
Hugo Krawczyk, IBM Watson
4:45 - 5:30 What's the Worst That Could Happen?
Eric Rescorla, RTFM, Inc.
Friday, October 15, 2004
8:30 - 9:00 Breakfast and Registration - CoRE Building, 4th Floor
Session 5:
9:00 - 9:30 Fuzzy Commitment
Ari Juels, RSA Laboratories
9:30 - 10:15 Secure Fuzzy Extractors
Xavier Boyen, Voltage Inc.
10:15 - 10:45 Break
Session 6:
10:45 - 11:30 Using Biometrics for Secure Network-Based Authentication
Jonathan Katz, University of Maryland
11:30 - 12:15 Cryptographic Mechanisms to Secure Routing Protocols
Adrian Perrig, Carnegie Mellon University
12:15 - 1:30 Lunch
Session 7:
1:30 - 2:15 Cryptographic Hashing: Blockcipher-based Constructions Revisited
Tom Shrimpton, Portland State University
2:15 - 3:00 Privacy-Preserving Bayesian Network Structure
Computation on Distributed Heterogeneous Data
Rebecca Wright, Stevens Institute of Technology
3:00 - 3:30 Break
3:30 - 4:15 Error Correction in the Bounded Storage Model
Yan Zhong Ding, Georgia Institute of Technology
4:15 - 4:45 Smart Theory Meets Smartcard Practice
Jean-Jacques Quisquater, Universite Catholique de Louvain,
Belgium and CNRS, France
4:45 End of Workshop
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on October 18, 2004.