All times in this Schedule are Pacific Time (PT)
Wednesday, January 9, 2002
|
12:00 - 1:00
|
Registration
|
1:00 - 1:50
|
|
1:50 - 2:00
|
Break
|
2:00 - 2:50
|
|
2:50 - 3:10
|
Break
|
3:10 - 4:00
|
Kazue Sako (NEC)
Electronic Voting
|
4:00 - 4:10
|
Break
|
4:10 - 5:00
|
Kazue Sako (NEC)
Electronic Voting
|
Thursday, January 10, 2002
|
Morning Session
|
8:00 - 9:00
|
Continental Breakfast
|
9:00 - 9:50
|
|
9:50 - 10:00
|
Break
|
10:00 - 10:50
|
Cynthia Dwork (Microsoft Research)
2-Round Zero Knowledge and Proof Auditors
|
10:50 - 11:00
|
Break
|
11:00 - 11:50
|
Ravi Kumar (IBM Almaden Research Center)
|
11:50 - 2:00
|
Lunch (on your own)
|
Afternoon Session
|
2:00 - 2:50
|
Daniele Micciancio (University of California at San Diego)
From Ajtai-Dwork to NTRU: the design of practical lattice based cryptosystems
|
2:50 - 3:10
|
Break
|
3:10 - 4:00
|
|
4:00 - 4:10
|
Break
|
4:10 - 5:00
|
|
5:00
|
Dinner (Hosted by IPAM)
|
Friday, January 11, 2002
|
Morning Session
|
8:00 - 9:00
|
Continental Breakfast
|
9:00 - 9:50
|
|
9:50 - 10:00
|
Break
|
10:00 - 10:50
|
|
10:50 - 11:00
|
Break
|
11:00 - 11:50
|
Edlyn Teske (University of Waterloo, Canada)
On the Weil descent attack on the elliptic curve discrete logarithm problem
|
11:50 - 2:00
|
Lunch (on your own)
|
Afternoon Session
|
2:00 - 2:50
|
Kumar Murty (University of Toronto)
Elliptic curves and sieve methods
|
2:50 - 3:10
|
Break
|
3:10 - 4:00
|
|
4:00 - 4:10
|
Break
|
4:10 - 5:00
|
Kristin Lauter (Microsoft Research)
Attacking the Discrete Log Problem on Elliptic Curves from above
|
Saturday, January 12, 2002
|
Morning Session
|
8:00 - 9:00
|
Continental Breakfast
|
9:00 - 9:50
|
|
9:50 - 10:00
|
Break
|
10:00 - 10:50
|
|
10:50 - 11:00
|
Break
|
11:00 - 11:50
|
|
11:50 - 2:00
|
Lunch (on your own)
|
Afternoon Session
|
2:00 - 2:50
|
|
2:50 - 3:10
|
Break
|
3:10 - 4:00
|
|
4:00 - 4:10
|
Break
|
4:10 - 5:00
|
|
Sunday, January 13, 2002
|
Morning Session
|
8:00 - 9:00
|
Continental Breakfast
|
9:00 - 9:50
|
|
9:50 - 10:00
|
Break
|
10:00 - 10:50
|
|
10:50 - 11:00
|
Break
|
11:00 - 11:50
|
Steven Rudich (Carnegie Mellon University)
Formal Program Obfuscation
|