[news.announce.conferences] Auscrypt '90 PROGRAM

lpb@csadfa.cs.adfa.oz.au (Lawrie Brown) (09/29/89)

				AUSCRYPT '90

			     9-12  January, 1990
			      Sydney, Australia

		A Workshop on Cryptology, Secure Communication
			     and Computer Security

				sponsored by

			Department of Computer Science,
			   University College, UNSW,

				Unisearch

				 and the

	      International Association for Cryptologic Research

	General Chair				Local Organization
	Professor Jennifer R. Seberry		Christine Bourke
	Head, Department of Computer Science	Unisearch Ltd
	University College			University of NSW
	University of NSW,			PO Box 1, Sydney
	Canberra, A.C.T. 2600  Australia	NSW  2033, Australia

	tel: +61 (62) 68 8182			tel: +61 (2) 662 2711
	telex: ADFADM AA62030			telex: USERCH.AA74215
	fax: +61 (62) 68 8581			fax: +61(2) 663 2949
	Email: et@cs.adfa.oz.au

The conference deals with all aspects of the theory and the application of
cryptography including symmetric and asymmetric ciphers, authentication,
protocols, secure transactions, signatures, sequences and linear complexity,
hardware and software topics, security of telecommunication systems and
computer networks.

The meeting will be held in sunny Sydney on the main campus of the University
of NSW.  A few kilometres from several beaches of golden sand on the edge of
the Pacific Ocean.  The campus is only a few kilometres from downtown Sydney
with its January Festival, glistening blue harbour and cosmopolitan atmosphere.



	    AUSCRYPT '90 PROGRAM
	    THE UNIVERSITY OF NEW SOUTH WALES
	    THE INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH
	    ALL SESSIONS ARE IN THE SQUARE HOUSE

	    SKILLS WORKSHOP
	    ===============
________________________________MONDAY, 8th January, 1990_________________

8:00 - 9:00  Square House   Skills workshop Registration
9:00 - 5:00  Square House   Workshop

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

	    AUSCRYPT '90 CONFERENCE
	    =======================

________________________________MONDAY, 8th January, 1990_________________

16:00 - 20:00  Registration
19:00 - 22:00  Ice Breaker Cocktail Party

_______________________________TUESDAY, 9th January, 1990_________________

	Session 1: Opening Session
	Chair: Jennifer Seberry

8:45 - 9:00 Welcome to AUSCRYPT '90
9:00 - 9:45 Elliptic curve cryptosystems,  Scott Vanstone (University of
	Waterloo).
9:45 - 10:05 Direct demonstration of the power to break public-key
	cryptosystems,  K. Koyama (NTT, Tokyo, Japan).
10:05 - 10:45 Coffee Break

	Session 2: Pseudo-randomness and sequences
	Chair: Rei Safavi-Naini

10:45 - 11:05 Continued fractions and Berlekamp-Massey algorithm,  Z. Dai
	(Academia Sinica, Beijing, PRC), K.C. Zeng.
11:05 - 11:25 Nonlinear generators of binary sequences with controllable
	complexity and double key,  G. Guang (Electronic and Technology
	University, Sichuan, PRC).
11:25 - 11:45 K-M sequence is forwardly predictable,  Y. Xian (Beijing
	University of P&T, Beijing, PRC).
11:45 - 12:05 Lower bounds on the weight complexities of cascaded binary
	sequences,  C. Ding (NW Telecommunication Inst., Xian, PRC).
12:05 - 2:00 Lunch

	Session 3: Network Security
	Chair: Svein Knapskog

2:00 - 2:20 Secure user access control for public networks,  P. Lee (Bell
	Communications Res., USA).
2:20 - 2:40 Formal specification and verification of secure communication
	protocols,  S. Knapskog (University of Trondheim, Norway).
2:40 - 3:00 Network security policy models,  V. Varadjarajan, (Hewlett
	Packard, UK).
3:00 - 3:20 KEYMEX: an expert system for the design of key management
	schemes,  J.C.A. Van der Lubbe (Delft University, Netherlands) and D.E.
	Boekee (Delft University, Netherlands).
3:20 - 4:00 Coffee Break

	Session 4: Authentication
	Chair: Scott Vanstone

4:00 - 4:20 On the formal analysis of PKCs authentication protocols,  K.
	Gaarder and E. Snekkenes (Alcatel, Okern, Norway).
4:20 - 4:40 On authentication arrays,  Martin G. H. Anthony (RHBNC, London,
	UK), K. M. Martin (RHBNC, London, UK), Jennifer Seberry (University of
	NSW, Australia), Peter Wild (RHBNC, London, UK)
4:40 - 5:00 Meet-in-the-middle attack on digital signature schemes,  K.
	Ohta (NTT, Yokosuka-shi, Japan), K. Koyama (NTT, Tokyo, Japan).
19:00 - 22:00 Cocktail Party

_______________________________WEDNESDAY, 10th January, 1990_______

	Session 5:  Pseudo-randomness and sequences
	Chair: Rainer Rueppel

8:45 - 9:05 A binary sequence generator based on Ziv-Lempel source coding,
	C. Jansen  (Phillips, Eindhoven, Netherlands) and D. Boekee (Technical
	University of Delft, Netherlands).
9:05 - 9:25 On iteractive algorithms for a shift-register initial state
	reconstruction using the noisy output sequence,  M. Mihaljevic
	(Belgrade, Yugoslavia) and J. Golic (Belgrade, Yugoslavia).
9:25 - 9:45 Parallel generation of pseudo random sequences, Reihaneh
	Safavi-Naini (University of NSW, Australia).
9:45 - 10:05 Large primes in stream cipher cryptography,   Zeng, Yang, and Rao.
10:05 - 10:45 Coffee Break

	Session 6: Block Ciphers
	Chair: Josef Pieprzyk

10:45 - 11:05 Comparison of block ciphers,  H. Gustafson (QUT, Australia),
	E. Dawson (QUT, Australia), and B. Caelli (QUT, Australia).
11:05 - 11:25 Loki: symmetric algorithms,  L.P. Brown, (University of NSW,
	Australia).
11:25 - 11:45 Permutation generators of alternating groups, Josef Pieprzyk
	(University of NSW, Australia) and Xian-mo Zhang (University of NSW,
	Australia).
11:45 - 12:05 Key scheduling in DES type cryptosystems, Lawrence Brown
	(University of NSW, Australia) and Jennifer Seberry (University of NSW,
	Australia).
12:05 - 2:00 Lunch
	Free Afternoon
19:00 - Rump Session and Happy Hour

_______________________________THURSDAY, 11th January, 1990_________

	Session 7: Zero-Knowledge Protocols
	Chair: David Chaum

8:45 - 9:05 Showing credentials without identification transferring
	signatures between unconditionally unlinkable pseudonyms,  D. Chaum
	(Centre for Mathematics and Computer Science, Amsterdam, Netherlands).
9:05 - 9:25 A (non-practical) three-pass identification protocol using
	coding,  M. Girault (PTT, Caen, France).
9:25 - 9:45 Demonstrating possession without revealing factors and its
	application,  K. Koyama (NTT, Tokyo, Japan), H. Shizuya (NTT, Tokyo,
	Japan).
9:45 - 10:05 Anonymous one-time signatures and flexible untraceable
	electronic cash,   Hayes.
10:05 - 10:45 Coffee Break

	Session 8: Theory
	Chair: Bill Caelli

10:45 - 11:05 Dyadic matrices and their potential significance in
	cryptography,  Y. Xian (Beijing University of P&T, Beijing, PRC).
11:05 - 11:25 Some remarks on strong Finonacci pseudoprimes,  R. Lidl
	(University of Tasmania, Australia) and W. Muller (Klagenfurt, Austria).
11:25 - 11:45 On the significance of the directed acyclic word graph in
	cryptology,  C. Jansen  (Phillips, Eindhoven, Netherlands) and
	D. Boekee (Technical University of Delft, Netherlands).
11:45 - 12:05 Solving equations of sequences,   Zeng and Huang.
12:05 - 2:00 Lunch

	Session 9: Applications
	Chair: Mirka Miller

2:00 - 2:20 The practical application of state of the art cryptography in
	real environments,  R. Ferreira (CTI, Paris, France).
2:20 - 2:40 RSA as a benchmark for multiprocessor machines, Cooper and
	Patterson.
2:40 - 3:00 Range equations and range matrices : a study in statistical
	database security,   Alagar.
3:00 - 3:20 Record encryption in distributed databases,  Thomas Hardjono,
	(University of NSW, Australia).
3:20 - 4:00 Coffee Break

	Session 10: Implementations
	Chair: John Gordon

4:00 - 4:20 VLSI design for exponentiation in GF( ),  W. Geiselmann (Inst
	fur Informatik, Karlsruhe, West Germany) and D. Gollman (Inst. fur
	Informatik, Karlsruhe, West Germany).
4:20 - 4:40 A fast modular-multiplication module for smart cards,  H.
	Morita (NTT, Tokyo, Japan).
4:40 - 5:00 Minos : extended user authentication,  Michael Newberry
	(University of NSW, Australia).
18:00 -       Harbour Cruise Dinner

________________________________ADJOURN_______________________________
-- 
Someday has arrived