lpb@csadfa.cs.adfa.oz.au (Lawrie Brown) (09/29/89)
AUSCRYPT '90 9-12 January, 1990 Sydney, Australia A Workshop on Cryptology, Secure Communication and Computer Security sponsored by Department of Computer Science, University College, UNSW, Unisearch and the International Association for Cryptologic Research General Chair Local Organization Professor Jennifer R. Seberry Christine Bourke Head, Department of Computer Science Unisearch Ltd University College University of NSW University of NSW, PO Box 1, Sydney Canberra, A.C.T. 2600 Australia NSW 2033, Australia tel: +61 (62) 68 8182 tel: +61 (2) 662 2711 telex: ADFADM AA62030 telex: USERCH.AA74215 fax: +61 (62) 68 8581 fax: +61(2) 663 2949 Email: et@cs.adfa.oz.au The conference deals with all aspects of the theory and the application of cryptography including symmetric and asymmetric ciphers, authentication, protocols, secure transactions, signatures, sequences and linear complexity, hardware and software topics, security of telecommunication systems and computer networks. The meeting will be held in sunny Sydney on the main campus of the University of NSW. A few kilometres from several beaches of golden sand on the edge of the Pacific Ocean. The campus is only a few kilometres from downtown Sydney with its January Festival, glistening blue harbour and cosmopolitan atmosphere. AUSCRYPT '90 PROGRAM THE UNIVERSITY OF NEW SOUTH WALES THE INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH ALL SESSIONS ARE IN THE SQUARE HOUSE SKILLS WORKSHOP =============== ________________________________MONDAY, 8th January, 1990_________________ 8:00 - 9:00 Square House Skills workshop Registration 9:00 - 5:00 Square House Workshop +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ AUSCRYPT '90 CONFERENCE ======================= ________________________________MONDAY, 8th January, 1990_________________ 16:00 - 20:00 Registration 19:00 - 22:00 Ice Breaker Cocktail Party _______________________________TUESDAY, 9th January, 1990_________________ Session 1: Opening Session Chair: Jennifer Seberry 8:45 - 9:00 Welcome to AUSCRYPT '90 9:00 - 9:45 Elliptic curve cryptosystems, Scott Vanstone (University of Waterloo). 9:45 - 10:05 Direct demonstration of the power to break public-key cryptosystems, K. Koyama (NTT, Tokyo, Japan). 10:05 - 10:45 Coffee Break Session 2: Pseudo-randomness and sequences Chair: Rei Safavi-Naini 10:45 - 11:05 Continued fractions and Berlekamp-Massey algorithm, Z. Dai (Academia Sinica, Beijing, PRC), K.C. Zeng. 11:05 - 11:25 Nonlinear generators of binary sequences with controllable complexity and double key, G. Guang (Electronic and Technology University, Sichuan, PRC). 11:25 - 11:45 K-M sequence is forwardly predictable, Y. Xian (Beijing University of P&T, Beijing, PRC). 11:45 - 12:05 Lower bounds on the weight complexities of cascaded binary sequences, C. Ding (NW Telecommunication Inst., Xian, PRC). 12:05 - 2:00 Lunch Session 3: Network Security Chair: Svein Knapskog 2:00 - 2:20 Secure user access control for public networks, P. Lee (Bell Communications Res., USA). 2:20 - 2:40 Formal specification and verification of secure communication protocols, S. Knapskog (University of Trondheim, Norway). 2:40 - 3:00 Network security policy models, V. Varadjarajan, (Hewlett Packard, UK). 3:00 - 3:20 KEYMEX: an expert system for the design of key management schemes, J.C.A. Van der Lubbe (Delft University, Netherlands) and D.E. Boekee (Delft University, Netherlands). 3:20 - 4:00 Coffee Break Session 4: Authentication Chair: Scott Vanstone 4:00 - 4:20 On the formal analysis of PKCs authentication protocols, K. Gaarder and E. Snekkenes (Alcatel, Okern, Norway). 4:20 - 4:40 On authentication arrays, Martin G. H. Anthony (RHBNC, London, UK), K. M. Martin (RHBNC, London, UK), Jennifer Seberry (University of NSW, Australia), Peter Wild (RHBNC, London, UK) 4:40 - 5:00 Meet-in-the-middle attack on digital signature schemes, K. Ohta (NTT, Yokosuka-shi, Japan), K. Koyama (NTT, Tokyo, Japan). 19:00 - 22:00 Cocktail Party _______________________________WEDNESDAY, 10th January, 1990_______ Session 5: Pseudo-randomness and sequences Chair: Rainer Rueppel 8:45 - 9:05 A binary sequence generator based on Ziv-Lempel source coding, C. Jansen (Phillips, Eindhoven, Netherlands) and D. Boekee (Technical University of Delft, Netherlands). 9:05 - 9:25 On iteractive algorithms for a shift-register initial state reconstruction using the noisy output sequence, M. Mihaljevic (Belgrade, Yugoslavia) and J. Golic (Belgrade, Yugoslavia). 9:25 - 9:45 Parallel generation of pseudo random sequences, Reihaneh Safavi-Naini (University of NSW, Australia). 9:45 - 10:05 Large primes in stream cipher cryptography, Zeng, Yang, and Rao. 10:05 - 10:45 Coffee Break Session 6: Block Ciphers Chair: Josef Pieprzyk 10:45 - 11:05 Comparison of block ciphers, H. Gustafson (QUT, Australia), E. Dawson (QUT, Australia), and B. Caelli (QUT, Australia). 11:05 - 11:25 Loki: symmetric algorithms, L.P. Brown, (University of NSW, Australia). 11:25 - 11:45 Permutation generators of alternating groups, Josef Pieprzyk (University of NSW, Australia) and Xian-mo Zhang (University of NSW, Australia). 11:45 - 12:05 Key scheduling in DES type cryptosystems, Lawrence Brown (University of NSW, Australia) and Jennifer Seberry (University of NSW, Australia). 12:05 - 2:00 Lunch Free Afternoon 19:00 - Rump Session and Happy Hour _______________________________THURSDAY, 11th January, 1990_________ Session 7: Zero-Knowledge Protocols Chair: David Chaum 8:45 - 9:05 Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms, D. Chaum (Centre for Mathematics and Computer Science, Amsterdam, Netherlands). 9:05 - 9:25 A (non-practical) three-pass identification protocol using coding, M. Girault (PTT, Caen, France). 9:25 - 9:45 Demonstrating possession without revealing factors and its application, K. Koyama (NTT, Tokyo, Japan), H. Shizuya (NTT, Tokyo, Japan). 9:45 - 10:05 Anonymous one-time signatures and flexible untraceable electronic cash, Hayes. 10:05 - 10:45 Coffee Break Session 8: Theory Chair: Bill Caelli 10:45 - 11:05 Dyadic matrices and their potential significance in cryptography, Y. Xian (Beijing University of P&T, Beijing, PRC). 11:05 - 11:25 Some remarks on strong Finonacci pseudoprimes, R. Lidl (University of Tasmania, Australia) and W. Muller (Klagenfurt, Austria). 11:25 - 11:45 On the significance of the directed acyclic word graph in cryptology, C. Jansen (Phillips, Eindhoven, Netherlands) and D. Boekee (Technical University of Delft, Netherlands). 11:45 - 12:05 Solving equations of sequences, Zeng and Huang. 12:05 - 2:00 Lunch Session 9: Applications Chair: Mirka Miller 2:00 - 2:20 The practical application of state of the art cryptography in real environments, R. Ferreira (CTI, Paris, France). 2:20 - 2:40 RSA as a benchmark for multiprocessor machines, Cooper and Patterson. 2:40 - 3:00 Range equations and range matrices : a study in statistical database security, Alagar. 3:00 - 3:20 Record encryption in distributed databases, Thomas Hardjono, (University of NSW, Australia). 3:20 - 4:00 Coffee Break Session 10: Implementations Chair: John Gordon 4:00 - 4:20 VLSI design for exponentiation in GF( ), W. Geiselmann (Inst fur Informatik, Karlsruhe, West Germany) and D. Gollman (Inst. fur Informatik, Karlsruhe, West Germany). 4:20 - 4:40 A fast modular-multiplication module for smart cards, H. Morita (NTT, Tokyo, Japan). 4:40 - 5:00 Minos : extended user authentication, Michael Newberry (University of NSW, Australia). 18:00 - Harbour Cruise Dinner ________________________________ADJOURN_______________________________ -- Someday has arrived