ajmenezes@WATER.WATERLOO.EDU (Alfred Menezes) (07/02/90)
Here is the program for Crypto '90. For further information, including registration information, please contact: Sherry McMahan Crypto '90 CYLINK 130B Kifer Court Sunnyvale, CA 94086 USA (The registration deadline is July 6) ------------------------------------------------------------------------------ Program for Crypto `90 August 12, Sunday SESSION 1: CRYPTANALYSIS Chair: S. Vanstone [8:30 - 9:20 am] : Differential Cryptanalysis of DES-like Cryptosystems (invited talk) - E. Biham, A. Shamir (Weizmann). [9:25 am - 9:45 am] : A Statistical Attack of the Feal-8 Cryptosystem - H. Gilbert, G. Chasse (CNET). [9:50 am - 10:10 am] : An Improved Linear Syndrome Algorithm in Cryptanal- ysis with Applications - K. Zeng (USTC), C. Yang (S.W. Louisiana), T. Rao (S.W. Louisiana). MORNING COFFEE BREAK SESSION 2: PROTOCOLS Chair: Y. Desmedt [10:30 am - 10:50 am] : Quantum Bit Commitment and Coin Tossing Protocols - G. Brassard (Montreal), C. Crepeau (Paris). [10:55 am - 11:15 am] : Security with Low Communication Overhead - D. Beaver (Harvard), J. Feigenbaum (AT&T), J. Kilian (MIT), P.Rogaway (MIT). [11:20 am - 11:40 am] : Fair Computation of General Functions in Presence of Immoral Majority - S. Goldwasser (MIT), L. Levin (Boston). [11:45 am - 12:05 pm] : One-way Group Actions - G. Brassard (Montreal),M. Yung(IBM). LUNCH SESSION 3: ALGEBRA AND NUMBER THEORY Chair: H. Williams [1:45 pm - 2:05 pm] : Solving Large Sparse Linear Systems over Finite Fields - B. LaMacchia (MIT), A. Odlyzko (AT&T). [2:10 pm - 2:30 pm] : On the Computation of Discrete Logarithms in Class Groups - J. Buchmann,S. Dullmann (Saarlandes). [2:35 pm - 2:55 pm] : Matrix Extension of the RSA Algorithm - C. Chuang, J. Dunham (SMU). [3:00 pm - 3:20 pm] : Constructing Elliptic Curve Cryptosystems in Character- istic 2 - N. Koblitz (Washington). AFTERNOON COFFEE BREAK SESSION 4: SIGNATURES AND AUTHENTICATION Chair: D. Stinson [3:45 pm - 4:05 pm] : Identification Tokens - or: Solving the Chess Grandmaster Problem - T. Beth (Karlsruhe), Y. Desmedt (Wisconsin). [4:10 pm - 4:30 pm] : Arbitrated Unconditionally Secure Authentication Can be Unconditionally Protected Against Arbiter's Attacks - Y. Desmedt(Wisconsin), M. Yung (IBM). [4:35 pm - 4:55 pm] : Convertible Undeniable Signatures - J. Boyar (Aarhus), D. Chaum (CWI), I. Damgard (Aarhus), T. Pedersen (Aarhus). [5:00 pm - 5:20 pm] : Unconditionally Secure Digital Signatures - D. Chaum (CWI), S. Roijakkers (Eindhoven). ------------------------------------------------------------------------------- August 13, Monday SESSION 5: SECRET SHARING Chair: M. De Soete [8:30 am - 9:20 am] : An Introduction to Shared Secret and/or Shared Control Schemes and Their Application - G. Simmons (Sandia). [9:25 am - 9:45 am] : Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes - E. Brickell (Sandia), D. Stinson (Nebraska). [9:50 am - 10:10 am] : Col lective Coin Tossing Without Assumptions Nor Broadcasting - S. Micali, T. Rabin (MIT). MORNING COFFEE BREAK SESSION 6: KEY DISTRIBUTION Chair: T. Berson [10:30 am - 10:50 am] : A Key Distribution "Paradox" - Y. Yacobi (Bellcore). [10:55 am - 11:15 pm] : A Modular Approach to Key Distribution - W. Fumy, M. Munzert (Siemens). SESSION 7: HASH FUNCTIONS Chair: R. Rueppel [11:20 am - 11:40 am] : Structural Properties of One-way Hash Functions - Y. Zheng, T. Matsumoto, H. Imai (Yokohama). [11:45 am - 12:00 pm] : The MD4 Message Digest Algorithm - R. Rivest (MIT, RSA Data Security). ------------------------------------------------------------------------------- August 14, Tuesday [8:30 am - 9:20 am] : Invited talk by Whitfield Diffie (BNR) SESSION 8: ZERO-KNOWLEDGE Chair: A. Fiat [9:25 am - 9:45 am] : Achieving Zero-knowledge Robustly - J. Kilian (MIT). [9:50 am - 10:10 am] : Hiding Instances in Zero-knowledge Proof Systems - D. Beaver (Harvard), J. Feigenbaum (AT&T), V. Shoup (AT&T). MORNING COFFEE BREAK [10:30 am - 10:50 am] : Multi Zero-knowledge Interactive Proof Systems - K. Kurosawa, S. Tsujii (Tokyo Inst. of Tech.). [10:55 am - 11:15 am] : Publicly Verifiable Non-interactive Zero-knowledge Proofs - D. Lapidot, A. Shamir (Weizmann). [11:20 am - 11:40 am] : Cryptographic Applications of the Non-interactive Metaproof and Many-prover Systems - A. De Santis (Salerno),M. Yung (IBM). [11:45 am - 12:05 pm] : Interactive Proofs with Provable Security Against Pas- sive Adversaries - J. Kilian (MIT). LUNCH SESSION 9: RANDOMNESS Chair: R. Rivest [1:45 pm - 2:05 pm] : On the Universality of the Next Bit Test - A. Schrift, A. Shamir (Weizmann). [2:10 pm - 2:30 pm] : A Universal Statistical Test for Random Bit Generators - U. Maurer (Swiss Fed. Inst. of Tech.). [2:35 pm - 2:55 pm] : On the Impossibility of Private Key Cryptography with Weakly Random Keys - J. McInnes (Toronto), B. Pinkas (Technion). SESSION 10: APPLICATIONS Chair: G. Agnew [3:00 pm - 3:20 pm] : How to Time-stamp a Digital Document - S. Haber, W. Stornetta (Bellcore). AFTERNOON COFFEE BREAK [3:45 - 4:05 pm] : How to Utilize the Randomness of Zero-knowledge Proofs - T. Okamoto, K. Ohta(NTT). [4:10 pm - 4:30 pm] : Fast Software Encryption Functions - R. Merkle (Xerox). [4:35 pm - 4:55 pm] : CORSAIR: A Smart Card for Public Key Cryptosystems - D. de Waleffe, J.Quisquater (Philips). [5:00 pm - 5:10 pm] : On Developing Standard Key Generation Modules (SKGMs) for Low to High Bandwidth Secure Data Communications and Standard Key Management Modules (SKMMs)- R. Winter (Winter Company). [5:15 pm - 5:30 pm] : IACR Meeting. ------------------------------------------------------------------------------ August 15, Wednesday SESSION 11: DESIGN AND ANALYSIS I Chair: K. Koyama [8:35 am - 8:55 am] : Checkers for RSA / Efficient Checkers for Cryptography - K. Kompella, L. Adleman (USC). [9:00 am - 9:20] am : Complexity Theoretic Issues Concerning Block Ciphers Related to DES -R. Cleve (Intern. Comp. Sc. Inst.). [9:25 am - 9:45 am] : The REDOC-II Cryptosystem - T. Cusick (SUNY at Buffalo), M. Wood (Cryptech Inc.). [9:50 am - 10:10 am] : A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion - K.Kim, T. Matsumoto, H. Imai (Yokohama). MORNING COFFEE BREAK SESSION 12: DESIGN AND ANALYSIS II Chair: J. Buchmann [10:30 am - 10:50 am] : A Comparison of Practical Public Key Cryptosys- tems Based on Integer Factorization and Discrete Logarithms P. van Oorschot (BNR). [10:55 am - 11:15 am] : On the Cryptographic Security of Single RSA Digits in a General Base - B. Jin (Macquaire U). [11:20 am - 11:40 am] : Non-linear Parity Circuits and their Cryptographic Applications - K. Koyama, R. Terada (NTT). [11:45 am - 12:05 pm] : Cryptographic Significance of the Carry for Ciphers Based on Integer Addition - O. Staffelbach (Gretag), W, Meier (HTL). ------------------------------------------------------------------------------