This is the top of the page.
Displaying present location in the site.
Main content starts here.

The 1st Workshop on Real-Life Cryptographic Protocols and Standardization

The 1st Workshop on Real-Life Cryptographic Protocols and Standardization

As a fruit of modern cryptographic research, we have seen many cryptographic primitives such as public-key encryption and digital signature algorithms deployed in real life systems, and standardized in many international organizations such as ISO, ITUT, IEEE, IETF, and many others. We have also seen some cryptographic protocols as well, such as key distribution and entity authentication, and some dedicated protocols for limited purpose systems. This workshop aims to bring researchers and engineers together to share their experiences regarding the design of cryptographic primitives and protocols deployed in real life systems. These schemes may not be published in current conferences due to the perceived lack of novelty of their core design components. However, the process of designing the best suitable protocol in the presence of hardware and software limitations in a real life system is worth sharing. This workshop also aims to stimulate discussions on standardizing cryptographic protocols.

IMPORTANT DATES

  • Paper Submission: October 2, 2009, midnight PST
  • Paper Notification: October 30, 2009
  • Final Papers: November 29, 2009

SUBMISSION (CLOSED)

Authors may only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference with proceedings or a journal. Papers must be formatted in standard PDF format, less than 15 pages long in LNCS style. Submissions are not required to be anonymized. All papers must be sent to

Accepted papers will appear as a separate chapter in the FC proceedings (They have appeared in

PROGRAM for Thursday January 28, 2010

Opening (Workshop starts from 11:00)

11:00 - 13:00 Workshops Session 2

  • SPAKE: a Single-party Public-key Authenticated Key Exchange Protocol for Contact-less Applications
    Jean-Sebastien Coron (University of Luxembourg),
    Aline Gouget, Pascal Paillier (CryptoExperts and Gemalto) and
    Karine Villegas (Gemalto)
  • A Secure and Privacy-Preserving Targeted Ad-System
    Elli Androulaki and Steven M. Bellovin (Columbia University)
  • Cryptographic Cloud Storage
    Seny Kamara and Kristin Lauter (Microsoft Research)

16:30 - 17:00 Coffee Break

17:00 - 19:00 Workshops Session 4

Work in progress session. Each presentation 5 min.
presentation and at most 10 minutes Q&A

19:00 Concluding Remarks

PROGRAM COMMITTEE

  • N.Asokan, Nokia
  • Hongxia Jin, IBM Almaden
  • Aggelos Kiayias, U.of Conn(co-chair)
  • Helger Lipmaa, Cybernetica AS
  • Sandra Marcello,Thales
  • David Naccache, ENS
  • Kaisa Nyberg, TKK and Nokia
  • Satoshi Obana, NEC
  • Pascal Paillier, Gemalto and CryptoExperts
  • Ahmad-Reza Sadeghi, Ruhr-University Bochum
  • Kazue Sako, NEC (co-chair)
  • Moti Yung, Google and Columbia U.

The Workshop will be organized in conjunction with FC'10
by International Financial Cryptography Association (IFCA).

Top of this page