1994-06-27 - CRYPTO ‘94 prelim. pgm (long)

Header Data

From: baum@apple.com (Allen J. Baum)
To: cypherpunks@toad.com
Message Hash: b7d006095a7139f63515eb1142e63af9f2b68f73aca7a3aadc12ea170e72bfb0
Message ID: <9406272329.AA15066@newton.apple.com>
Reply To: N/A
UTC Datetime: 1994-06-27 23:33:11 UTC
Raw Date: Mon, 27 Jun 94 16:33:11 PDT

Raw message

From: baum@apple.com (Allen J. Baum)
Date: Mon, 27 Jun 94 16:33:11 PDT
To: cypherpunks@toad.com
Subject: CRYPTO '94 prelim. pgm (long)
Message-ID: <9406272329.AA15066@newton.apple.com>
MIME-Version: 1.0
Content-Type: text/plain


Hope I'm not wasting net bandwidth here, - its long, but relevant.
                -AJB
------------------------------------------------------------------------------

                            CRYPTO '94

                         August 21-25, 1994

Crypto '94 is the fourteenth in a series of workshops on cryptology
held at Santa Barbara, California and is sponsored by the
International Association for Cryptologic Research, in
cooperation with the IEEE Computer Society Technical Committee on
Security and Privacy and the Computer Science Department of the
University of California, Santa Barbara. Formal proceedings
will be provided at the conference.


                         Preliminary Program


Monday August 22
================

8:30-8:45 Welcome


Session 1: Block Ciphers: Differential and Linear Cryptanalysis (8:45 - 10:10)
------------------------------------------------------------------------------
8:45 - 9:05  The First Experimental Cryptanalysis of the Data
             Encryption Standard
                   Mitsuru Matsui (Mitsubishi, Japan)

9:10 - 9:20  Linear Cryptanalysis of the Fast Data Encipherment
             Algorithm
                   Kazuo Ohta (NTT, Japan) and Kazumaro Aoki (Waseda
                     Univ., Japan)

9:20 - 9:40  Differential-Linear Cryptanalysis
                   Susan K. Langford and Martin E. Hellman (Stanford,
                     USA)

9:45 - 10:05  Linear Cryptanalysis Using Multiple Approximations
                   Burton S. Kaliski Jr. and M. J. B. Robshaw
                     (RSA Laboratories, USA)


Coffee Break 10:10 - 10:35



Session 2: Schemes Based on New Problems (10:40 - 11:25)
--------------------------------------------------------
10:40 - 11:00  Hashing with SL_2
                   Jean-Pierre Tillich and Gilles Zemor
                      (ENS, France)

11:05 - 11:15  Design of Elliptic Curves with Controllable Lower
               Boundary of Extension Degree for Reduction Attacks
                   Jinhui Chao (Chuo University, Japan), Kazuo Tanada
                   (Tokyo Inst. of Tech., Japan) and Shigeo Tsujii
                   (Chuo University, Japan)

11:15 - 11:25  Cryptographic Protocols based on Discrete Logarithms in
               Real-quadratic Orders
                   Ingrid Biehl, Johannes Buchmann and Christoph Thiel
                       (Univer. Saarlandes, Germany)


Session 3: Practical Implementations I
--------------------------------------
11:25 - 11:55 Cryptography in the Commercial World  --- Hardware Aspects
              (Invited presentation)
                   David Maher (AT&T)


lunch


Session 4: Signatures I (1:30 - 2:30)
-------------------------------------
1:30 - 1:50  Designated Confirmer Signatures and Public-Key Encryption
             are Equivalent
                   Tatsuaki Okamoto (NTT, Japan)

1:55 - 2:05  Directed Acyclic Graphs, One-way Functions and
             Digital Signatures
                   Daniel Bleichenbacher and Ueli M. Maurer
                     (ETH, Switserland)

2:05 - 2:25  An Identity-Based Signature Scheme With Bounded Life-span
                   Olivier Delos and Jean-Jacques Quisquater
                     (Univ. Louvain, Belgium)


Session 5: Implementation and Hardware Aspects (2:30 - 3:15)
------------------------------------------------------------
2:30 - 2:50  More Flexible Exponentiation with Precomputation
                   Chae Hoon Lim and Pil Joong Lee
                      (Pohang University, Korea)

2:55 - 3:05  A Parallel Permutation Multiplier for a PGM Crypto-chip
                   Tamas Horvath (Univ. Essen, Germany),
                   Spyros S. Magliveras (University of Nebraska, USA)
                   and Tran van Trung (Univ. Essen, Germany)

3:05 - 3:15  Cryptographic Randomness from Air Turbulence in Disk Drives
                   Don Davis (Openvision Technologies, USA),
                   Ross Ihaka (Univ. Auckland, New Zealand)
                   and Philip Fenstermacher (USA)


Coffee Break 3:15 - 3:35


Session 6: Authentication and Secret Sharing (3:40 - 5:05)
----------------------------------------------------------
3:40 - 4:00  Cryptanalysis of the Gemmell and Naor Multiround
             Authentication Protocol
                   Christian Gehrmann (Lund University, Sweden)

4:05 - 4:15  LFSR-based Hashing and Authentication
                   Hugo Krawczyk (IBM, USA)

4:15 - 4:35  New Bound on Authentication Code with Arbitration
                   Kaoru Kurosawa (Tokyo Inst. of Tech., Japan)

4:40 - 5:00  Multi-Secret Sharing Schemes
                   Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo,
                   Antonio Giorgio Gaggia and Ugo Vaccaro
                        (Univ. Salerno, Italy)


Poster Session



Tuesday August 23
=================

Session 7: Zero-Knowledge (8:30 - 10:10)
----------------------------------------
8:30 - 8:50  Designing identification schemes with keys of short size
                   Jacques Stern (ENS, France)

8:55 - 9:15  Proofs of Partial Knowledge and Simplified Design of Witness
             Hiding Protocols
                   Ronald Cramer (CWI, The Netherlands),
                   Ivan Damgard (Aarhus University, Denmark) and
                   Berry Schoenmakers (CWI, The Netherlands)

9:20 - 9:40  Language Dependent Secure Bit Commitment
                   Toshiya Itoh, Yuji Ohta (Tokyo Inst. of Tech., Japan)
                   and Hiroki Shizuya (Tohoku Univ., Japan)

9:45 - 10:05  On the length of cryptographic hash-values used in
              identification schemes
                   Marc Girault (SEPT, France) and Jacques Stern (ENS,
                       France)


Coffee Break 10:10 - 10:35


Session 8: Securing an Electronic World: are we ready? (10:40 - 12:00)
----------------------------------------------------------------------
10:40 - 11:10 Securing the Information Highway (Invited presentation)
                 Whitfield Diffie (Sun Microsystems)
11:10 - 11:30 Opening statements
11:30 - 12:00 Panel Debate (could continue till 12:45)
              Panel members: Ross Anderson, Bob Blakley, Matt Blaze,
                  George Davida, Yvo Desmedt (moderator), Whitfield Diffie,
                  Joan Feigenbaum, Bob Greenlee, Martin Hellman,
                  David Maher and Miles Smid


free afternoon


7:00 - 11:00 pm Rump session



Wednesday August 24
===================

Session 9: Signatures II (8:30 - 9:20)
--------------------------------------
8:30 - 8:50  Incremental Cryptography: the Case of Hashing and Signing
                   Mihir Bellare (IBM, USA), Oded Goldreich (Weizmann
                   Inst., Israel) and Shafi Goldwasser (Weizmann Inst.,
                   Israel and MIT, USA)

8:55 - 9:15  An Efficient Existentially Unforgeable Signature Scheme and
              its Applications
                   Cynthia Dwork (IBM, USA) and Moni Naor (Weizmann
                      Inst., Israel)



Session 10: Combinatorics and its Applications (9:20 - 10:10)
-------------------------------------------------------------
9:20 - 9:40  Bounds for resilient functions and orthogonal arrays
                   Jurgen Bierbrauer (Math. Inst., Heidelberg,
                   Germany), K. Gopalakrishnan and
                   D. R. Stinson (University of Nebraska, USA)

9:45 - 10:05  Tracing Traitors
                   Benny Chor (Technion, Israel), Amos Fiat (Tel Aviv
                   Univ., Israel) and Moni Naor (Weizmann Inst., Israel)


Coffee Break 10:10 - 10:35


Session 11: Number Theory (10:40 - 11:30)
-----------------------------------------
10:40 - 11:00  Towards the Equivalence of Breaking the Diffie-Hellman
              Protocol and Computing Discrete Logarithms
                   Ueli M. Maurer (ETH, Switserland)

11:05 - 11:25  Fast Generation of Provable Primes Using Search in
               Arithmetic Progressions
                   Preda Mihailescu (UBS, Switzerland)


Session 12: Practical Implementations II
11:30 - 12:00 Cryptography in the Commercial World  --- Software Aspects
              (Invited presentation)
                 Joseph Pato (Hewlett-Packard Co.)


lunch


Session 13: Cryptanalysis and Protocol Failures (1:30 - 2:45)
-------------------------------------------------------------
1:30 - 1:50  Attack on the Cryptographic Scheme NIKS-TAS
                   Don Coppersmith (IBM, USA)

1:55 - 2:15  On the Risk of Opening Distributed Keys
                   Mike Burmester (Univ. London, UK)

2:20 - 2:40  Cryptanalysis of Cryptosystems based on Remote Chaos
             Replication
                   Th. Beth, D. E. Lazic and A. Mathias
                      (Univ. Karlsruhe, Germany)


Coffee Break 2:45 - 3:05


Session 14: Pseudo-Random Generation (3:10 - 3:35)
--------------------------------------------------
3:10 - 3:30  A Fourier Transform Approach to the Linear Complexity of
             Nonlinearly Filtered Sequences
                   James L. Massey and Shirlei Serconek
                        (ETH, Switserland)

3:30 - 4:15 Special event
4:15 -      General Assembly of the IACR (IACR President: Peter Landrock)



Thursday August 25
==================

Session 15: Block Ciphers: Design and Cryptanalysis (8:30 - 10:10)
------------------------------------------------------------------
8:30 - 8:50  The Security of Cipher Block Chaining
                   Mihir Bellare (IBM, USA), Joe Kilian (NEC, USA)
                   and Phillip Rogaway (Univ. California, Davis, USA)

8:55 - 9:15  A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
                   Henri Gilbert and Pascal Chauvaud (CNET, France)

9:20 - 9:40  Ciphertext Only Attack for One-way function of the MAP using
             One Ciphertext
                   Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu
                       (J. Adv. Inst. Sci. Techn., Japan)

9:45 - 10:05  Pitfalls in Designing Substitution Boxes
                   Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng
                       (Univ. Wollongong, Australia)


Coffee Break 10:10 - 10:30


Session 16: Secure Computations and Protocols (10:35 - 11:50)
-------------------------------------------------------------
10:35 - 10:55  A Randomness-Rounds Tradeoff in Private Computation
                   Eyal Kushilevitz (Technion, Israel) and
                   Adi Rosen (Tel Aviv Univ., Israel)

11:00 - 11:20  Secure Voting Using Partially Compatible Homomorphisms
                   Kazue Sako (NEC, Japan) and Joe Kilian (NEC, USA)

11:25 - 11:45  Maintaining Security in the Presence of Transient Faults
                   Ran Canetti (Weizmann Inst., Israel) and
                   Amir Herzberg (IBM, USA)


adjournment and final lunch


The following people served on the Program Committee.

Tom Berson, Anagram Laboratories, USA
Don Coppersmith, IBM T. J. Watson Research Center, USA
Donald Davies, United Kingdom
Yvo Desmedt, Chair, University of Wisconsin - Milwaukee, USA
Shimon Even, Technion, Israel
Amos Fiat, Tel Aviv University, Israel
Russell Impagliazzo, University of California San Diego, USA
Ingemar Ingemarsson, University of Linkoping, Sweden
Mitsuru Matsui, Mitsubishi Electric Corporation, Japan
Alfred Menezes, Auburn University, USA
Andrew Odlyzko, AT&T Bell Laboratories, USA
Jennifer Seberry, University of Wollongong, Australia
Ben Smeets, Lund University, Sweden
Moti Yung, IBM T. J. Watson Research Center, USA



                        General  Information

Facilities will also be provided for attendees to demonstrate hardware,
software and other items of cryptological interest.  If you wish to
demonstrate such items, you are urged to contact the General Chair so
that your needs will be attended to.  The social program will
include hosted cocktail parties and dinners on Sunday, Monday and
the Beach Barbecue on Wednesday.  These events are included with the
cost of registration.  No evening meals will be provided at the dining
hall.

About the conference facilities:  The workshop will be held on the
campus of the University of California, Santa Barbara.  The campus
is located adjacent to the Santa Barbara airport and the Pacific
Ocean.  Accommodations are available in the university dormitories
at relatively low cost for  conference participants.  Children
under the age of 13 are not allowed to stay in the dormitories, so
those bringing small children will need to make separate
arrangements in one of several nearby hotels.  More information on
hotels is enclosed.  Parking on campus is available at no cost to
participants.

Travel information:  The campus is located approximately 2 miles
from the Santa Barbara airport, which is served by several
airlines, including American, America West, Delta, United and US
Air.  Free shuttle bus service will be provided between the Santa
Barbara airport and the campus on Sunday and Thursday afternoons.
All major rental car agencies are also represented in Santa
Barbara, and AMTRAK has rail connections to San Francisco from the
north and Los Angeles from the south.  Santa Barbara is
approximately 100 miles north of the Los Angeles airport, and 350
miles south of San Francisco.

Registration:  Participation is invited by interested parties, but
attendance at the workshop is limited, and pre-registration is
strongly advised. To register, fill out the attached registration
form and return to the address on the form along with payment in
full before July 8, 1994.  Campus accommodations will be available
on a first come, first serve basis for attendees who register by
July 8, 1994. Late registrations, subject to a late registration
fee, may be accepted if space is available, but there are no
guarantees.  The conference fees include participation in the
program and all social functions, as well as membership to the
IACR and a subscription to the Journal of Cryptology.  The room
and board charges include dormitory lodging Sunday night through
Wednesday night and breakfast and lunch Monday through Thursday.
Technical sessions will run from Monday morning to Thursday at
noon.  A very limited number of stipends are available to those
unable to obtain funding.  Students whose papers are accepted and
who will present the paper themselves are invited to apply if such
assistance is needed.  Requests for stipends should be sent to the
General Chair before June 3, 1994.

==================================================================

                                Hotels


For those who choose not to stay in the dormitories, the following
is a partial list of hotels in the area.  Those who choose to stay
off campus are responsible for making their own reservations, and
early reservations are advised since August is a popular season in
Santa Barbara.  Note that Goleta is closer to UCSB than Santa
Barbara, but a car will probably be required to travel between any
hotel and the campus.  All prices are subject to change; prices
should be confirmed by calling the individual hotels directly.
However, mention CRYPTO '94 when you are making your reservation
and in several of the hotels you will be eligible for the
university rate which can be significantly less than the normal
rates.  We are not able to block rooms in these hotels, so please
make reservations as early as possible.  The quality of the hotels
range from rather expensive beach-front resorts to basic
inexpensive accommodations.  For further information, try
contacting the Santa Barbara Convention and Visitors Center, (805)
966-9222.

South Coast Inn:  5620 Calle Real, Goleta, CA  93117.  Single is
$89; Double is $94. Call to see if they have University rates.
Contact person is Ms. Murrill Forrester (805) 967-3200, Fax (805)
683-4466.

Cathedral Oaks Lodge:  4770 Calle Real, Santa Barbara, CA 93110.
Single rates start at $75; double rates start at $85.  No
University rates available.  Prices include breakfast.  Contact
Doug Smoot or Tom Patton at (805) 964-3511.  Fax (805) 964-0075

Motel 6: 5897 Calle Real , Goleta, CA  93117.  Single rate is
$36.99 + tax.. Double rate is 42.99 + tax. (Rates are subject to
change.)  (805)  964-3596.

The Sandman Inn:  3714 State Street, Santa Barbara, CA  93105.
Single rate: $71  Double rate: $81. (805) 687-2468.  Fax (805)
687-6581.

Miramar Hotel (Beachfront): 3 miles south of Santa Barbara on U.S.
101 at San Ysidro turnoff. No  specific single or double rate.
Rooms begin at $75.  Call  Laura at (805) 969-2203.  Fax (805)
969-3163.

Pepper Tree Inn:  3850 State Street, Santa Barbara, CA  93105.
Single rate: $112  Double rate: $120.
(805) 687-5511.  Fax (805) 682-2410

Encina Lodge:  2220 Bath Street, Santa Barbara, CA  93105.  Single
rate: $112  Double rate: $118.
(805) 682-7277.  Fax (805) 563-9319.

Pacifica Suites (formerly Quality Suites):  5500 Hollister Avenue,
Santa Barbara, CA  93111 (close to campus).  Normal rates begin at
$120 for a suite.  Includes full-cooked breakfast.  Contact
Michael Ensign at (805) 683-6722.   Fax (805) 683-4121.

Upham Hotel: (bed-and-breakfast) 1404 De La Vina Road, Santa
Barbara, CA  93101.  Beginning rate: $105 per night.  (You must
mention you are attending the Crypto conference.)  Contact:
Shirley Fagardo  or reservations at  (805) 962-0058.  Fax (805)
963-2825.

The El Encanto Hotel:  1900 Lasuen Road, Santa Barbara, CA 93105.
Beginning rate: $90.  Contact: Elizabeth Spencer, (805) 687-5000.
Fax (805) 687-3903.

==================================================================

                    CRYPTO '94 Registration Form

                 Registration deadline: July 8, 1994

Last Name:________________________________________________________

First Name:__________________________________  Sex: (M)___  (F)___

Affiliation:______________________________________________________

Mailing Address:__________________________________________________

                __________________________________________________

                __________________________________________________

                __________________________________________________

Phone: _________________________   Fax: __________________________

Electronic Mail: _________________________________________________

Payment of the conference fee entitles you to membership in the
International Association for Cryptologic Research for 1995 at no
extra charge, including a subscription to the Journal of
Cryptology, published by Springer-Verlag, at no extra charge.  Do
you wish to be an IACR member?   YES_____  NO ______

Conference fee:
        Regular ($300)                            US $    ________

        Attended Eurocrypt '94, Perugia ($250)            ________

        Full Time Student ($150)                          ________

        deduct $50 if you do not wish the proceedings     ________
        (There will be NO pre-proceedings; the
        proceedings will be provided at the conference)

        Total Conference fee:                             ________

Room and Board (4 nights):    Smoking ______ Non-Smoking _____
(Prices include breakfast and lunch on Monday through Thursday)

        Single room ($250 per person)                     ________

        Double room ($200 per person)                     ________
                Roommate's name: ___________________

        Saturday Night                                    ________
                ($50 per person single / $40 per person double)

        $50 late fee for registration after July 8;       ________
        (registration not guaranteed after July 8)

        Total Guest Fees (from back of form)              ________

Total funds enclosed (U.S. Dollars)               US$     ________

Payment must be by check payable in U.S. funds, by money order in
U.S. funds or by U.S. bank draft, PAYABLE  TO: CRYPTO '94.



Payment should be mailed to
the General Chair:                  Additional Contact Information:

        Jimmy Upton, Crypto '94     Email:  crypto94@uptronics.com
        1590 Oakland Road           Phone:  (408)451-8900
        Suite B203                  Fax:    (408)451-8901
        San Jose, CA  95131

==================================================================

                      CRYPTO '94 Guest Form

               Registration deadline: July 8, 1994

Please fill out this form for anyone who is coming with a
conference attendee but not registering for the conference and
wishes to either stay on campus or attend the social functions
Sunday, Monday and Wednesday.  Guests are not entitled to attend
the talks and must be attending with someone registering for the
conference.

Last Name:________________________________________________________

First Name:__________________________________  Sex: (M)___ (F)____

Affiliation:______________________________________________________

Mailing Address:__________________________________________________

                __________________________________________________

                __________________________________________________

                __________________________________________________

Phone: _________________________   Fax: __________________________

Electronic Mail: _________________________________________________

Social Program Attendance ($50)                          _________
        (Sunday, Monday and Wednesday Night
        Dinners - No admittance to talks)

Room and Board (4 nights):  Smoking ______   Non-Smoking _____

(Prices include breakfast and lunch on Monday through Thursday)
        Single room ($250 per person)                     ________

        Double room ($200 per person)                     ________
                Roommate's name: ___________________

        Saturday Night                                    ________
                ($50 per person single / $40 per person double)


Total Guest Fees                                  US$     ________
(Show here and on the other side of this form)

**************************************************
* Allen J. Baum              tel. (408)974-3385  *
* Apple Computer, MS/305-3B                      *
* 1 Infinite Loop                                *
* Cupertino, CA 95014        baum@apple.com      *
**************************************************







Thread