[comp.theory] Crypto-90 program

ajmenezes@WATER.WATERLOO.EDU (Alfred Menezes) (07/02/90)

Here is the program for Crypto '90.
For further information, including registration information, please contact:
          Sherry McMahan
          Crypto '90
          CYLINK
          130B Kifer Court
          Sunnyvale, CA 94086
          USA
(The registration deadline is July 6)

------------------------------------------------------------------------------

                         Program for Crypto `90


                            August 12, Sunday



SESSION 1: CRYPTANALYSIS
Chair: S. Vanstone

[8:30 - 9:20 am] : Differential Cryptanalysis of DES-like Cryptosystems (invited
    talk) - E. Biham, A. Shamir (Weizmann).
[9:25 am - 9:45 am] : A Statistical Attack of the Feal-8 Cryptosystem - H.
    Gilbert, G. Chasse (CNET).
[9:50 am - 10:10 am] : An Improved Linear Syndrome Algorithm in Cryptanal-
    ysis with Applications - K. Zeng (USTC), C. Yang (S.W. Louisiana), T. Rao
    (S.W. Louisiana).


MORNING COFFEE BREAK


SESSION 2: PROTOCOLS
Chair: Y. Desmedt

[10:30 am - 10:50 am] : Quantum Bit Commitment and Coin Tossing Protocols
    - G. Brassard (Montreal), C. Crepeau (Paris).
[10:55 am - 11:15 am] : Security with Low Communication Overhead - D. Beaver
    (Harvard), J. Feigenbaum (AT&T), J. Kilian (MIT), P.Rogaway (MIT).
[11:20 am - 11:40 am] : Fair Computation of General Functions in Presence of
    Immoral Majority - S. Goldwasser (MIT), L. Levin (Boston).
[11:45 am - 12:05 pm] : One-way Group Actions - G. Brassard (Montreal),M.
    Yung(IBM).


LUNCH



SESSION 3: ALGEBRA AND NUMBER THEORY
Chair: H. Williams

[1:45 pm - 2:05 pm] : Solving Large Sparse Linear Systems over Finite Fields
    - B. LaMacchia (MIT), A. Odlyzko (AT&T).
[2:10 pm - 2:30 pm] : On the Computation of Discrete Logarithms in Class
    Groups - J. Buchmann,S. Dullmann (Saarlandes).
[2:35 pm - 2:55 pm] : Matrix Extension of the RSA Algorithm - C. Chuang, J.
    Dunham (SMU).
[3:00 pm - 3:20 pm] : Constructing Elliptic Curve Cryptosystems in Character-
    istic 2 - N. Koblitz (Washington).


AFTERNOON COFFEE BREAK


SESSION 4: SIGNATURES AND AUTHENTICATION
Chair: D. Stinson

[3:45 pm - 4:05 pm] : Identification Tokens - or: Solving the Chess Grandmaster
    Problem - T. Beth (Karlsruhe), Y. Desmedt (Wisconsin).
[4:10 pm - 4:30 pm] : Arbitrated Unconditionally Secure Authentication Can be
    Unconditionally Protected Against Arbiter's Attacks - Y. Desmedt(Wisconsin),
    M. Yung (IBM).
[4:35 pm - 4:55 pm] : Convertible Undeniable Signatures - J. Boyar (Aarhus),
    D. Chaum (CWI), I. Damgard (Aarhus), T. Pedersen (Aarhus).
[5:00 pm - 5:20 pm] : Unconditionally Secure Digital Signatures - D. Chaum
    (CWI), S. Roijakkers (Eindhoven).



-------------------------------------------------------------------------------


                            August 13, Monday



SESSION 5: SECRET SHARING
Chair: M. De Soete

[8:30 am - 9:20 am] : An Introduction to Shared Secret and/or Shared Control
    Schemes and Their Application - G. Simmons (Sandia).
[9:25 am - 9:45 am] : Some Improved Bounds on the Information Rate of Perfect
    Secret Sharing Schemes - E. Brickell (Sandia), D. Stinson (Nebraska).
[9:50 am - 10:10 am] :  Col lective Coin Tossing Without Assumptions Nor
    Broadcasting - S. Micali, T. Rabin (MIT).


MORNING COFFEE BREAK


SESSION 6: KEY DISTRIBUTION
Chair: T. Berson

[10:30 am - 10:50 am] : A Key Distribution "Paradox" - Y. Yacobi (Bellcore).
[10:55 am - 11:15 pm] : A Modular Approach to Key Distribution - W. Fumy,
    M. Munzert (Siemens).


SESSION 7: HASH FUNCTIONS
Chair: R. Rueppel

[11:20 am - 11:40 am] : Structural Properties of One-way Hash Functions - Y.
    Zheng, T. Matsumoto, H. Imai (Yokohama).
[11:45 am - 12:00 pm] : The MD4 Message Digest Algorithm - R. Rivest (MIT,
    RSA Data Security).


-------------------------------------------------------------------------------



                            August 14, Tuesday





[8:30 am - 9:20 am] : Invited talk by Whitfield Diffie (BNR)


SESSION 8: ZERO-KNOWLEDGE
Chair: A. Fiat

[9:25 am - 9:45 am] : Achieving Zero-knowledge Robustly - J. Kilian (MIT).
[9:50 am - 10:10 am] : Hiding Instances in Zero-knowledge Proof Systems - D.
    Beaver (Harvard), J. Feigenbaum (AT&T), V. Shoup (AT&T).


MORNING COFFEE BREAK


[10:30 am - 10:50 am] : Multi Zero-knowledge Interactive Proof Systems - K.
    Kurosawa, S. Tsujii (Tokyo Inst. of Tech.).
[10:55 am - 11:15 am] : Publicly Verifiable Non-interactive Zero-knowledge
    Proofs - D. Lapidot, A. Shamir (Weizmann).
[11:20 am - 11:40 am] :  Cryptographic Applications of the Non-interactive
    Metaproof and Many-prover Systems - A. De Santis (Salerno),M. Yung (IBM).
[11:45 am - 12:05 pm] : Interactive Proofs with Provable Security Against Pas-
    sive Adversaries - J. Kilian (MIT).


LUNCH


SESSION 9: RANDOMNESS
Chair: R. Rivest

[1:45 pm - 2:05 pm] : On the Universality of the Next Bit Test - A. Schrift, A.
    Shamir (Weizmann).
[2:10 pm - 2:30 pm] : A Universal Statistical Test for Random Bit Generators
    - U. Maurer (Swiss Fed. Inst. of Tech.).
[2:35 pm - 2:55 pm] : On the Impossibility of Private Key Cryptography with
    Weakly Random Keys - J. McInnes (Toronto), B. Pinkas (Technion).



SESSION 10: APPLICATIONS
Chair: G. Agnew

[3:00 pm - 3:20 pm] : How to Time-stamp a Digital Document - S. Haber, W.
    Stornetta (Bellcore).


AFTERNOON COFFEE BREAK


[3:45 - 4:05 pm] : How to Utilize the Randomness of Zero-knowledge Proofs -
    T. Okamoto, K. Ohta(NTT).
[4:10 pm - 4:30 pm] : Fast Software Encryption Functions - R. Merkle (Xerox).
[4:35 pm - 4:55 pm] : CORSAIR: A Smart Card for Public Key Cryptosystems
    - D. de Waleffe, J.Quisquater (Philips).
[5:00 pm - 5:10 pm] : On Developing Standard Key Generation Modules (SKGMs)
    for Low to High Bandwidth Secure Data Communications and Standard Key
    Management Modules (SKMMs)- R. Winter (Winter Company).
[5:15 pm - 5:30 pm] : IACR Meeting.



------------------------------------------------------------------------------


                          August 15, Wednesday



SESSION 11: DESIGN AND ANALYSIS I
Chair: K. Koyama

[8:35 am - 8:55 am] : Checkers for RSA / Efficient Checkers for Cryptography
    - K. Kompella, L. Adleman (USC).
[9:00 am - 9:20] am : Complexity Theoretic Issues Concerning Block Ciphers
    Related to DES -R. Cleve (Intern. Comp. Sc. Inst.).
[9:25 am - 9:45 am] : The REDOC-II Cryptosystem - T. Cusick (SUNY at
    Buffalo), M. Wood (Cryptech Inc.).
[9:50 am - 10:10 am] : A Recursive Construction Method of S-boxes Satisfying
    Strict Avalanche Criterion - K.Kim, T. Matsumoto, H. Imai (Yokohama).


MORNING COFFEE BREAK
SESSION 12: DESIGN AND ANALYSIS II
Chair: J. Buchmann

[10:30 am - 10:50 am] : A  Comparison of Practical Public Key Cryptosys-
    tems Based on Integer Factorization and Discrete Logarithms
    P. van Oorschot (BNR).
[10:55 am - 11:15 am] : On the Cryptographic Security of Single RSA Digits in
    a General Base - B. Jin (Macquaire U).
[11:20 am - 11:40 am] : Non-linear Parity Circuits and their Cryptographic
    Applications - K. Koyama, R. Terada (NTT).
[11:45 am - 12:05 pm] : Cryptographic Significance of the Carry for Ciphers
    Based on Integer Addition - O. Staffelbach (Gretag), W, Meier (HTL).

------------------------------------------------------------------------------