Eurocrypt 2015
26 - 30 April 2015
Sofia, Bulgaria


Upon request of IACR to implement parallel sessions for IACR conferences this year, Eurocrypt 2015 predominantly runs two tracks in parallel, the R-track (for Real) and the I-track (for Ideal). Dedicated presentations such as invited talks and for best papers will be hosted in a joint, single session. The full program can be downloaded here.

Sunday, April 26th
17:00 Registration
19:30 Welcome Reception
Monday, April 27th
8:30 Registration
9:00 Welcome
9:15 Invited talk: A Privacy Research Roadmap for a National Privacy Research Strategy
Tal Rabin, IBM T.J.Watson Research Center, USA
Session chair: Elisabeth Oswald
10:15 Coffee Break
R-track I-track
10:40 Random Number Generators [slides]
Session chair: Yannick Seurin
Signatures [slides]
Session chair: Michel Abdalla
11:30 Swap
11:35 Number Field Sieve [slides]
Session chair: Tanja Lange
Zero-Knowledge Proofs [slides]
Session chair: Jens Groth
12:35 Lunch
14:00 Algorithmic Cryptanalysis [slides]
Session chair: Vadim Lyubashevski
Leakage-Resilient Cryptography [slides]
Session chair: Krzyzstof Pietrzak
14:50 Swap
14:55 Symmetric Cryptanalysis I [slides]
Session chair: Anne Canteaut
Garbled Circuits [slides]
Session chair: Ivan Damgard
15:45 Coffee Break
16:15 Symmetric Cryptanalysis II [slides]
Session chair: Francois-Xavier Standaert
Crypto Currencies [slides]
Session chair: Shai Halevi
Tuesday, April 28th
9:00 Best paper and honourable mentions [slides]
Cryptanalysis of the Multilinear Maps over the Integers, Jung Hee Cheo; Kyoohyung Han; Changmin Lee; Hansol Ryu; Damien Stehlé
Robust Authenticated-Encryption: AEZ and the Problem that it Solves,
Viet Tung Hoang; Ted Krovetz; Phillip Rogaway
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, Anne Canteaut; Joëlle Roué
Session chair: Christian Cachin
10:15 Coffee Break
R-track I-track
10:40 Hash Functions [slides]
Session chair: Christian Rechberger
Secret Sharing [slides]
Session chair: Jan Camenisch
11:30 Swap
11:35 Evaluating Implementations [slides]
Session chair: Thomas Roche
Outsourcing Computations [slides]
Session chair: Jan Camenisch
12:35 Lunch
14:00 Masking [slides]
Session chair: Matthieu Rivain
Obfuscation and E-Voting [slides]
Session chair: Markulf Kohlweiss
18:30 Walking Dinner and Rump Session
Wednesday, April 29th
9:15 Invited talk [slides]: Practical Applications of Homomorphic Encryption,
Kristin Lauter, Mircosoft Research, USA
Session chair: Svetla Nikova
10:15 Coffee Break
R-track I-track
10:40 Fully Homomorphic Encryption I [slides]
Session chair: Kenny Paterson
Multi-Party Computations [slides]
Session chair: Aggelos Kiayas
11:30 Swap
11:35 Related-Key Attacks [slides]
Session chair: Pooya Farshim
Encryption [slides]
Session chair: Eike Kiltz
12:35 Lunch
14:00 Fully Homomorphic Encryption II [slides]
Session chair: Nigel Smart
Resistant Protocols [slides]
Session chair: Ivan Visconti
14:50 Swap
14:55 Efficient Two-Party Protocols [slides]
Session chair: Nigel Smart
Key Exchange [slides]
Session chair: Christina Brzuska
15:45 Coffee Break
16:00 IACR Membership Meeting
20:00 Banquet
Thursday, April 30th
9:15 Invited talk [slides]: Threshold Implementations, Vincent Rijmen, KU Leuven, Belgium
Session chair: Marc Fischlin
10:15 Coffee Break
R-track I-track
10:40 Symmetric Cryptanalysis III [slides]
Session chair: Elena Andreeva
Quantum Cryptography [slides]
Session chair: Serge Fehr
11:30 Swap
11:35 Lattices [slides]
Session chair: Marc Fischlin
Discrete Logarithms [slides]
Session chair: Masayuki Abe
12:00 Lunch

© 2014 COSIC, KU Leuven
Sofia photo by Simona Nikova