From: baum@apple.com (Allen J. Baum)
To: cypherpunks@toad.com
Message Hash: b7d006095a7139f63515eb1142e63af9f2b68f73aca7a3aadc12ea170e72bfb0
Message ID: <9406272329.AA15066@newton.apple.com>
Reply To: N/A
UTC Datetime: 1994-06-27 23:33:11 UTC
Raw Date: Mon, 27 Jun 94 16:33:11 PDT
From: baum@apple.com (Allen J. Baum)
Date: Mon, 27 Jun 94 16:33:11 PDT
To: cypherpunks@toad.com
Subject: CRYPTO '94 prelim. pgm (long)
Message-ID: <9406272329.AA15066@newton.apple.com>
MIME-Version: 1.0
Content-Type: text/plain
Hope I'm not wasting net bandwidth here, - its long, but relevant.
-AJB
------------------------------------------------------------------------------
CRYPTO '94
August 21-25, 1994
Crypto '94 is the fourteenth in a series of workshops on cryptology
held at Santa Barbara, California and is sponsored by the
International Association for Cryptologic Research, in
cooperation with the IEEE Computer Society Technical Committee on
Security and Privacy and the Computer Science Department of the
University of California, Santa Barbara. Formal proceedings
will be provided at the conference.
Preliminary Program
Monday August 22
================
8:30-8:45 Welcome
Session 1: Block Ciphers: Differential and Linear Cryptanalysis (8:45 - 10:10)
------------------------------------------------------------------------------
8:45 - 9:05 The First Experimental Cryptanalysis of the Data
Encryption Standard
Mitsuru Matsui (Mitsubishi, Japan)
9:10 - 9:20 Linear Cryptanalysis of the Fast Data Encipherment
Algorithm
Kazuo Ohta (NTT, Japan) and Kazumaro Aoki (Waseda
Univ., Japan)
9:20 - 9:40 Differential-Linear Cryptanalysis
Susan K. Langford and Martin E. Hellman (Stanford,
USA)
9:45 - 10:05 Linear Cryptanalysis Using Multiple Approximations
Burton S. Kaliski Jr. and M. J. B. Robshaw
(RSA Laboratories, USA)
Coffee Break 10:10 - 10:35
Session 2: Schemes Based on New Problems (10:40 - 11:25)
--------------------------------------------------------
10:40 - 11:00 Hashing with SL_2
Jean-Pierre Tillich and Gilles Zemor
(ENS, France)
11:05 - 11:15 Design of Elliptic Curves with Controllable Lower
Boundary of Extension Degree for Reduction Attacks
Jinhui Chao (Chuo University, Japan), Kazuo Tanada
(Tokyo Inst. of Tech., Japan) and Shigeo Tsujii
(Chuo University, Japan)
11:15 - 11:25 Cryptographic Protocols based on Discrete Logarithms in
Real-quadratic Orders
Ingrid Biehl, Johannes Buchmann and Christoph Thiel
(Univer. Saarlandes, Germany)
Session 3: Practical Implementations I
--------------------------------------
11:25 - 11:55 Cryptography in the Commercial World --- Hardware Aspects
(Invited presentation)
David Maher (AT&T)
lunch
Session 4: Signatures I (1:30 - 2:30)
-------------------------------------
1:30 - 1:50 Designated Confirmer Signatures and Public-Key Encryption
are Equivalent
Tatsuaki Okamoto (NTT, Japan)
1:55 - 2:05 Directed Acyclic Graphs, One-way Functions and
Digital Signatures
Daniel Bleichenbacher and Ueli M. Maurer
(ETH, Switserland)
2:05 - 2:25 An Identity-Based Signature Scheme With Bounded Life-span
Olivier Delos and Jean-Jacques Quisquater
(Univ. Louvain, Belgium)
Session 5: Implementation and Hardware Aspects (2:30 - 3:15)
------------------------------------------------------------
2:30 - 2:50 More Flexible Exponentiation with Precomputation
Chae Hoon Lim and Pil Joong Lee
(Pohang University, Korea)
2:55 - 3:05 A Parallel Permutation Multiplier for a PGM Crypto-chip
Tamas Horvath (Univ. Essen, Germany),
Spyros S. Magliveras (University of Nebraska, USA)
and Tran van Trung (Univ. Essen, Germany)
3:05 - 3:15 Cryptographic Randomness from Air Turbulence in Disk Drives
Don Davis (Openvision Technologies, USA),
Ross Ihaka (Univ. Auckland, New Zealand)
and Philip Fenstermacher (USA)
Coffee Break 3:15 - 3:35
Session 6: Authentication and Secret Sharing (3:40 - 5:05)
----------------------------------------------------------
3:40 - 4:00 Cryptanalysis of the Gemmell and Naor Multiround
Authentication Protocol
Christian Gehrmann (Lund University, Sweden)
4:05 - 4:15 LFSR-based Hashing and Authentication
Hugo Krawczyk (IBM, USA)
4:15 - 4:35 New Bound on Authentication Code with Arbitration
Kaoru Kurosawa (Tokyo Inst. of Tech., Japan)
4:40 - 5:00 Multi-Secret Sharing Schemes
Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo,
Antonio Giorgio Gaggia and Ugo Vaccaro
(Univ. Salerno, Italy)
Poster Session
Tuesday August 23
=================
Session 7: Zero-Knowledge (8:30 - 10:10)
----------------------------------------
8:30 - 8:50 Designing identification schemes with keys of short size
Jacques Stern (ENS, France)
8:55 - 9:15 Proofs of Partial Knowledge and Simplified Design of Witness
Hiding Protocols
Ronald Cramer (CWI, The Netherlands),
Ivan Damgard (Aarhus University, Denmark) and
Berry Schoenmakers (CWI, The Netherlands)
9:20 - 9:40 Language Dependent Secure Bit Commitment
Toshiya Itoh, Yuji Ohta (Tokyo Inst. of Tech., Japan)
and Hiroki Shizuya (Tohoku Univ., Japan)
9:45 - 10:05 On the length of cryptographic hash-values used in
identification schemes
Marc Girault (SEPT, France) and Jacques Stern (ENS,
France)
Coffee Break 10:10 - 10:35
Session 8: Securing an Electronic World: are we ready? (10:40 - 12:00)
----------------------------------------------------------------------
10:40 - 11:10 Securing the Information Highway (Invited presentation)
Whitfield Diffie (Sun Microsystems)
11:10 - 11:30 Opening statements
11:30 - 12:00 Panel Debate (could continue till 12:45)
Panel members: Ross Anderson, Bob Blakley, Matt Blaze,
George Davida, Yvo Desmedt (moderator), Whitfield Diffie,
Joan Feigenbaum, Bob Greenlee, Martin Hellman,
David Maher and Miles Smid
free afternoon
7:00 - 11:00 pm Rump session
Wednesday August 24
===================
Session 9: Signatures II (8:30 - 9:20)
--------------------------------------
8:30 - 8:50 Incremental Cryptography: the Case of Hashing and Signing
Mihir Bellare (IBM, USA), Oded Goldreich (Weizmann
Inst., Israel) and Shafi Goldwasser (Weizmann Inst.,
Israel and MIT, USA)
8:55 - 9:15 An Efficient Existentially Unforgeable Signature Scheme and
its Applications
Cynthia Dwork (IBM, USA) and Moni Naor (Weizmann
Inst., Israel)
Session 10: Combinatorics and its Applications (9:20 - 10:10)
-------------------------------------------------------------
9:20 - 9:40 Bounds for resilient functions and orthogonal arrays
Jurgen Bierbrauer (Math. Inst., Heidelberg,
Germany), K. Gopalakrishnan and
D. R. Stinson (University of Nebraska, USA)
9:45 - 10:05 Tracing Traitors
Benny Chor (Technion, Israel), Amos Fiat (Tel Aviv
Univ., Israel) and Moni Naor (Weizmann Inst., Israel)
Coffee Break 10:10 - 10:35
Session 11: Number Theory (10:40 - 11:30)
-----------------------------------------
10:40 - 11:00 Towards the Equivalence of Breaking the Diffie-Hellman
Protocol and Computing Discrete Logarithms
Ueli M. Maurer (ETH, Switserland)
11:05 - 11:25 Fast Generation of Provable Primes Using Search in
Arithmetic Progressions
Preda Mihailescu (UBS, Switzerland)
Session 12: Practical Implementations II
11:30 - 12:00 Cryptography in the Commercial World --- Software Aspects
(Invited presentation)
Joseph Pato (Hewlett-Packard Co.)
lunch
Session 13: Cryptanalysis and Protocol Failures (1:30 - 2:45)
-------------------------------------------------------------
1:30 - 1:50 Attack on the Cryptographic Scheme NIKS-TAS
Don Coppersmith (IBM, USA)
1:55 - 2:15 On the Risk of Opening Distributed Keys
Mike Burmester (Univ. London, UK)
2:20 - 2:40 Cryptanalysis of Cryptosystems based on Remote Chaos
Replication
Th. Beth, D. E. Lazic and A. Mathias
(Univ. Karlsruhe, Germany)
Coffee Break 2:45 - 3:05
Session 14: Pseudo-Random Generation (3:10 - 3:35)
--------------------------------------------------
3:10 - 3:30 A Fourier Transform Approach to the Linear Complexity of
Nonlinearly Filtered Sequences
James L. Massey and Shirlei Serconek
(ETH, Switserland)
3:30 - 4:15 Special event
4:15 - General Assembly of the IACR (IACR President: Peter Landrock)
Thursday August 25
==================
Session 15: Block Ciphers: Design and Cryptanalysis (8:30 - 10:10)
------------------------------------------------------------------
8:30 - 8:50 The Security of Cipher Block Chaining
Mihir Bellare (IBM, USA), Joe Kilian (NEC, USA)
and Phillip Rogaway (Univ. California, Davis, USA)
8:55 - 9:15 A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
Henri Gilbert and Pascal Chauvaud (CNET, France)
9:20 - 9:40 Ciphertext Only Attack for One-way function of the MAP using
One Ciphertext
Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu
(J. Adv. Inst. Sci. Techn., Japan)
9:45 - 10:05 Pitfalls in Designing Substitution Boxes
Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng
(Univ. Wollongong, Australia)
Coffee Break 10:10 - 10:30
Session 16: Secure Computations and Protocols (10:35 - 11:50)
-------------------------------------------------------------
10:35 - 10:55 A Randomness-Rounds Tradeoff in Private Computation
Eyal Kushilevitz (Technion, Israel) and
Adi Rosen (Tel Aviv Univ., Israel)
11:00 - 11:20 Secure Voting Using Partially Compatible Homomorphisms
Kazue Sako (NEC, Japan) and Joe Kilian (NEC, USA)
11:25 - 11:45 Maintaining Security in the Presence of Transient Faults
Ran Canetti (Weizmann Inst., Israel) and
Amir Herzberg (IBM, USA)
adjournment and final lunch
The following people served on the Program Committee.
Tom Berson, Anagram Laboratories, USA
Don Coppersmith, IBM T. J. Watson Research Center, USA
Donald Davies, United Kingdom
Yvo Desmedt, Chair, University of Wisconsin - Milwaukee, USA
Shimon Even, Technion, Israel
Amos Fiat, Tel Aviv University, Israel
Russell Impagliazzo, University of California San Diego, USA
Ingemar Ingemarsson, University of Linkoping, Sweden
Mitsuru Matsui, Mitsubishi Electric Corporation, Japan
Alfred Menezes, Auburn University, USA
Andrew Odlyzko, AT&T Bell Laboratories, USA
Jennifer Seberry, University of Wollongong, Australia
Ben Smeets, Lund University, Sweden
Moti Yung, IBM T. J. Watson Research Center, USA
General Information
Facilities will also be provided for attendees to demonstrate hardware,
software and other items of cryptological interest. If you wish to
demonstrate such items, you are urged to contact the General Chair so
that your needs will be attended to. The social program will
include hosted cocktail parties and dinners on Sunday, Monday and
the Beach Barbecue on Wednesday. These events are included with the
cost of registration. No evening meals will be provided at the dining
hall.
About the conference facilities: The workshop will be held on the
campus of the University of California, Santa Barbara. The campus
is located adjacent to the Santa Barbara airport and the Pacific
Ocean. Accommodations are available in the university dormitories
at relatively low cost for conference participants. Children
under the age of 13 are not allowed to stay in the dormitories, so
those bringing small children will need to make separate
arrangements in one of several nearby hotels. More information on
hotels is enclosed. Parking on campus is available at no cost to
participants.
Travel information: The campus is located approximately 2 miles
from the Santa Barbara airport, which is served by several
airlines, including American, America West, Delta, United and US
Air. Free shuttle bus service will be provided between the Santa
Barbara airport and the campus on Sunday and Thursday afternoons.
All major rental car agencies are also represented in Santa
Barbara, and AMTRAK has rail connections to San Francisco from the
north and Los Angeles from the south. Santa Barbara is
approximately 100 miles north of the Los Angeles airport, and 350
miles south of San Francisco.
Registration: Participation is invited by interested parties, but
attendance at the workshop is limited, and pre-registration is
strongly advised. To register, fill out the attached registration
form and return to the address on the form along with payment in
full before July 8, 1994. Campus accommodations will be available
on a first come, first serve basis for attendees who register by
July 8, 1994. Late registrations, subject to a late registration
fee, may be accepted if space is available, but there are no
guarantees. The conference fees include participation in the
program and all social functions, as well as membership to the
IACR and a subscription to the Journal of Cryptology. The room
and board charges include dormitory lodging Sunday night through
Wednesday night and breakfast and lunch Monday through Thursday.
Technical sessions will run from Monday morning to Thursday at
noon. A very limited number of stipends are available to those
unable to obtain funding. Students whose papers are accepted and
who will present the paper themselves are invited to apply if such
assistance is needed. Requests for stipends should be sent to the
General Chair before June 3, 1994.
==================================================================
Hotels
For those who choose not to stay in the dormitories, the following
is a partial list of hotels in the area. Those who choose to stay
off campus are responsible for making their own reservations, and
early reservations are advised since August is a popular season in
Santa Barbara. Note that Goleta is closer to UCSB than Santa
Barbara, but a car will probably be required to travel between any
hotel and the campus. All prices are subject to change; prices
should be confirmed by calling the individual hotels directly.
However, mention CRYPTO '94 when you are making your reservation
and in several of the hotels you will be eligible for the
university rate which can be significantly less than the normal
rates. We are not able to block rooms in these hotels, so please
make reservations as early as possible. The quality of the hotels
range from rather expensive beach-front resorts to basic
inexpensive accommodations. For further information, try
contacting the Santa Barbara Convention and Visitors Center, (805)
966-9222.
South Coast Inn: 5620 Calle Real, Goleta, CA 93117. Single is
$89; Double is $94. Call to see if they have University rates.
Contact person is Ms. Murrill Forrester (805) 967-3200, Fax (805)
683-4466.
Cathedral Oaks Lodge: 4770 Calle Real, Santa Barbara, CA 93110.
Single rates start at $75; double rates start at $85. No
University rates available. Prices include breakfast. Contact
Doug Smoot or Tom Patton at (805) 964-3511. Fax (805) 964-0075
Motel 6: 5897 Calle Real , Goleta, CA 93117. Single rate is
$36.99 + tax.. Double rate is 42.99 + tax. (Rates are subject to
change.) (805) 964-3596.
The Sandman Inn: 3714 State Street, Santa Barbara, CA 93105.
Single rate: $71 Double rate: $81. (805) 687-2468. Fax (805)
687-6581.
Miramar Hotel (Beachfront): 3 miles south of Santa Barbara on U.S.
101 at San Ysidro turnoff. No specific single or double rate.
Rooms begin at $75. Call Laura at (805) 969-2203. Fax (805)
969-3163.
Pepper Tree Inn: 3850 State Street, Santa Barbara, CA 93105.
Single rate: $112 Double rate: $120.
(805) 687-5511. Fax (805) 682-2410
Encina Lodge: 2220 Bath Street, Santa Barbara, CA 93105. Single
rate: $112 Double rate: $118.
(805) 682-7277. Fax (805) 563-9319.
Pacifica Suites (formerly Quality Suites): 5500 Hollister Avenue,
Santa Barbara, CA 93111 (close to campus). Normal rates begin at
$120 for a suite. Includes full-cooked breakfast. Contact
Michael Ensign at (805) 683-6722. Fax (805) 683-4121.
Upham Hotel: (bed-and-breakfast) 1404 De La Vina Road, Santa
Barbara, CA 93101. Beginning rate: $105 per night. (You must
mention you are attending the Crypto conference.) Contact:
Shirley Fagardo or reservations at (805) 962-0058. Fax (805)
963-2825.
The El Encanto Hotel: 1900 Lasuen Road, Santa Barbara, CA 93105.
Beginning rate: $90. Contact: Elizabeth Spencer, (805) 687-5000.
Fax (805) 687-3903.
==================================================================
CRYPTO '94 Registration Form
Registration deadline: July 8, 1994
Last Name:________________________________________________________
First Name:__________________________________ Sex: (M)___ (F)___
Affiliation:______________________________________________________
Mailing Address:__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
Phone: _________________________ Fax: __________________________
Electronic Mail: _________________________________________________
Payment of the conference fee entitles you to membership in the
International Association for Cryptologic Research for 1995 at no
extra charge, including a subscription to the Journal of
Cryptology, published by Springer-Verlag, at no extra charge. Do
you wish to be an IACR member? YES_____ NO ______
Conference fee:
Regular ($300) US $ ________
Attended Eurocrypt '94, Perugia ($250) ________
Full Time Student ($150) ________
deduct $50 if you do not wish the proceedings ________
(There will be NO pre-proceedings; the
proceedings will be provided at the conference)
Total Conference fee: ________
Room and Board (4 nights): Smoking ______ Non-Smoking _____
(Prices include breakfast and lunch on Monday through Thursday)
Single room ($250 per person) ________
Double room ($200 per person) ________
Roommate's name: ___________________
Saturday Night ________
($50 per person single / $40 per person double)
$50 late fee for registration after July 8; ________
(registration not guaranteed after July 8)
Total Guest Fees (from back of form) ________
Total funds enclosed (U.S. Dollars) US$ ________
Payment must be by check payable in U.S. funds, by money order in
U.S. funds or by U.S. bank draft, PAYABLE TO: CRYPTO '94.
Payment should be mailed to
the General Chair: Additional Contact Information:
Jimmy Upton, Crypto '94 Email: crypto94@uptronics.com
1590 Oakland Road Phone: (408)451-8900
Suite B203 Fax: (408)451-8901
San Jose, CA 95131
==================================================================
CRYPTO '94 Guest Form
Registration deadline: July 8, 1994
Please fill out this form for anyone who is coming with a
conference attendee but not registering for the conference and
wishes to either stay on campus or attend the social functions
Sunday, Monday and Wednesday. Guests are not entitled to attend
the talks and must be attending with someone registering for the
conference.
Last Name:________________________________________________________
First Name:__________________________________ Sex: (M)___ (F)____
Affiliation:______________________________________________________
Mailing Address:__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
Phone: _________________________ Fax: __________________________
Electronic Mail: _________________________________________________
Social Program Attendance ($50) _________
(Sunday, Monday and Wednesday Night
Dinners - No admittance to talks)
Room and Board (4 nights): Smoking ______ Non-Smoking _____
(Prices include breakfast and lunch on Monday through Thursday)
Single room ($250 per person) ________
Double room ($200 per person) ________
Roommate's name: ___________________
Saturday Night ________
($50 per person single / $40 per person double)
Total Guest Fees US$ ________
(Show here and on the other side of this form)
**************************************************
* Allen J. Baum tel. (408)974-3385 *
* Apple Computer, MS/305-3B *
* 1 Infinite Loop *
* Cupertino, CA 95014 baum@apple.com *
**************************************************
Return to June 1994
Return to “baum@apple.com (Allen J. Baum)”
1994-06-27 (Mon, 27 Jun 94 16:33:11 PDT) - CRYPTO ‘94 prelim. pgm (long) - baum@apple.com (Allen J. Baum)