ajmenezes@WATER.WATERLOO.EDU (Alfred Menezes) (07/02/90)
Here is the program for Crypto '90.
For further information, including registration information, please contact:
Sherry McMahan
Crypto '90
CYLINK
130B Kifer Court
Sunnyvale, CA 94086
USA
(The registration deadline is July 6)
------------------------------------------------------------------------------
Program for Crypto `90
August 12, Sunday
SESSION 1: CRYPTANALYSIS
Chair: S. Vanstone
[8:30 - 9:20 am] : Differential Cryptanalysis of DES-like Cryptosystems (invited
talk) - E. Biham, A. Shamir (Weizmann).
[9:25 am - 9:45 am] : A Statistical Attack of the Feal-8 Cryptosystem - H.
Gilbert, G. Chasse (CNET).
[9:50 am - 10:10 am] : An Improved Linear Syndrome Algorithm in Cryptanal-
ysis with Applications - K. Zeng (USTC), C. Yang (S.W. Louisiana), T. Rao
(S.W. Louisiana).
MORNING COFFEE BREAK
SESSION 2: PROTOCOLS
Chair: Y. Desmedt
[10:30 am - 10:50 am] : Quantum Bit Commitment and Coin Tossing Protocols
- G. Brassard (Montreal), C. Crepeau (Paris).
[10:55 am - 11:15 am] : Security with Low Communication Overhead - D. Beaver
(Harvard), J. Feigenbaum (AT&T), J. Kilian (MIT), P.Rogaway (MIT).
[11:20 am - 11:40 am] : Fair Computation of General Functions in Presence of
Immoral Majority - S. Goldwasser (MIT), L. Levin (Boston).
[11:45 am - 12:05 pm] : One-way Group Actions - G. Brassard (Montreal),M.
Yung(IBM).
LUNCH
SESSION 3: ALGEBRA AND NUMBER THEORY
Chair: H. Williams
[1:45 pm - 2:05 pm] : Solving Large Sparse Linear Systems over Finite Fields
- B. LaMacchia (MIT), A. Odlyzko (AT&T).
[2:10 pm - 2:30 pm] : On the Computation of Discrete Logarithms in Class
Groups - J. Buchmann,S. Dullmann (Saarlandes).
[2:35 pm - 2:55 pm] : Matrix Extension of the RSA Algorithm - C. Chuang, J.
Dunham (SMU).
[3:00 pm - 3:20 pm] : Constructing Elliptic Curve Cryptosystems in Character-
istic 2 - N. Koblitz (Washington).
AFTERNOON COFFEE BREAK
SESSION 4: SIGNATURES AND AUTHENTICATION
Chair: D. Stinson
[3:45 pm - 4:05 pm] : Identification Tokens - or: Solving the Chess Grandmaster
Problem - T. Beth (Karlsruhe), Y. Desmedt (Wisconsin).
[4:10 pm - 4:30 pm] : Arbitrated Unconditionally Secure Authentication Can be
Unconditionally Protected Against Arbiter's Attacks - Y. Desmedt(Wisconsin),
M. Yung (IBM).
[4:35 pm - 4:55 pm] : Convertible Undeniable Signatures - J. Boyar (Aarhus),
D. Chaum (CWI), I. Damgard (Aarhus), T. Pedersen (Aarhus).
[5:00 pm - 5:20 pm] : Unconditionally Secure Digital Signatures - D. Chaum
(CWI), S. Roijakkers (Eindhoven).
-------------------------------------------------------------------------------
August 13, Monday
SESSION 5: SECRET SHARING
Chair: M. De Soete
[8:30 am - 9:20 am] : An Introduction to Shared Secret and/or Shared Control
Schemes and Their Application - G. Simmons (Sandia).
[9:25 am - 9:45 am] : Some Improved Bounds on the Information Rate of Perfect
Secret Sharing Schemes - E. Brickell (Sandia), D. Stinson (Nebraska).
[9:50 am - 10:10 am] : Col lective Coin Tossing Without Assumptions Nor
Broadcasting - S. Micali, T. Rabin (MIT).
MORNING COFFEE BREAK
SESSION 6: KEY DISTRIBUTION
Chair: T. Berson
[10:30 am - 10:50 am] : A Key Distribution "Paradox" - Y. Yacobi (Bellcore).
[10:55 am - 11:15 pm] : A Modular Approach to Key Distribution - W. Fumy,
M. Munzert (Siemens).
SESSION 7: HASH FUNCTIONS
Chair: R. Rueppel
[11:20 am - 11:40 am] : Structural Properties of One-way Hash Functions - Y.
Zheng, T. Matsumoto, H. Imai (Yokohama).
[11:45 am - 12:00 pm] : The MD4 Message Digest Algorithm - R. Rivest (MIT,
RSA Data Security).
-------------------------------------------------------------------------------
August 14, Tuesday
[8:30 am - 9:20 am] : Invited talk by Whitfield Diffie (BNR)
SESSION 8: ZERO-KNOWLEDGE
Chair: A. Fiat
[9:25 am - 9:45 am] : Achieving Zero-knowledge Robustly - J. Kilian (MIT).
[9:50 am - 10:10 am] : Hiding Instances in Zero-knowledge Proof Systems - D.
Beaver (Harvard), J. Feigenbaum (AT&T), V. Shoup (AT&T).
MORNING COFFEE BREAK
[10:30 am - 10:50 am] : Multi Zero-knowledge Interactive Proof Systems - K.
Kurosawa, S. Tsujii (Tokyo Inst. of Tech.).
[10:55 am - 11:15 am] : Publicly Verifiable Non-interactive Zero-knowledge
Proofs - D. Lapidot, A. Shamir (Weizmann).
[11:20 am - 11:40 am] : Cryptographic Applications of the Non-interactive
Metaproof and Many-prover Systems - A. De Santis (Salerno),M. Yung (IBM).
[11:45 am - 12:05 pm] : Interactive Proofs with Provable Security Against Pas-
sive Adversaries - J. Kilian (MIT).
LUNCH
SESSION 9: RANDOMNESS
Chair: R. Rivest
[1:45 pm - 2:05 pm] : On the Universality of the Next Bit Test - A. Schrift, A.
Shamir (Weizmann).
[2:10 pm - 2:30 pm] : A Universal Statistical Test for Random Bit Generators
- U. Maurer (Swiss Fed. Inst. of Tech.).
[2:35 pm - 2:55 pm] : On the Impossibility of Private Key Cryptography with
Weakly Random Keys - J. McInnes (Toronto), B. Pinkas (Technion).
SESSION 10: APPLICATIONS
Chair: G. Agnew
[3:00 pm - 3:20 pm] : How to Time-stamp a Digital Document - S. Haber, W.
Stornetta (Bellcore).
AFTERNOON COFFEE BREAK
[3:45 - 4:05 pm] : How to Utilize the Randomness of Zero-knowledge Proofs -
T. Okamoto, K. Ohta(NTT).
[4:10 pm - 4:30 pm] : Fast Software Encryption Functions - R. Merkle (Xerox).
[4:35 pm - 4:55 pm] : CORSAIR: A Smart Card for Public Key Cryptosystems
- D. de Waleffe, J.Quisquater (Philips).
[5:00 pm - 5:10 pm] : On Developing Standard Key Generation Modules (SKGMs)
for Low to High Bandwidth Secure Data Communications and Standard Key
Management Modules (SKMMs)- R. Winter (Winter Company).
[5:15 pm - 5:30 pm] : IACR Meeting.
------------------------------------------------------------------------------
August 15, Wednesday
SESSION 11: DESIGN AND ANALYSIS I
Chair: K. Koyama
[8:35 am - 8:55 am] : Checkers for RSA / Efficient Checkers for Cryptography
- K. Kompella, L. Adleman (USC).
[9:00 am - 9:20] am : Complexity Theoretic Issues Concerning Block Ciphers
Related to DES -R. Cleve (Intern. Comp. Sc. Inst.).
[9:25 am - 9:45 am] : The REDOC-II Cryptosystem - T. Cusick (SUNY at
Buffalo), M. Wood (Cryptech Inc.).
[9:50 am - 10:10 am] : A Recursive Construction Method of S-boxes Satisfying
Strict Avalanche Criterion - K.Kim, T. Matsumoto, H. Imai (Yokohama).
MORNING COFFEE BREAK
SESSION 12: DESIGN AND ANALYSIS II
Chair: J. Buchmann
[10:30 am - 10:50 am] : A Comparison of Practical Public Key Cryptosys-
tems Based on Integer Factorization and Discrete Logarithms
P. van Oorschot (BNR).
[10:55 am - 11:15 am] : On the Cryptographic Security of Single RSA Digits in
a General Base - B. Jin (Macquaire U).
[11:20 am - 11:40 am] : Non-linear Parity Circuits and their Cryptographic
Applications - K. Koyama, R. Terada (NTT).
[11:45 am - 12:05 pm] : Cryptographic Significance of the Carry for Ciphers
Based on Integer Addition - O. Staffelbach (Gretag), W, Meier (HTL).
------------------------------------------------------------------------------