From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a253c61bd6b01ab3bbd0cf6c7b0a76901cfefb99ed3be78d3431f9c930d99d42
Message ID: <1.5.4.32.19970616155214.008adc3c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-06-16 16:22:26 UTC
Raw Date: Tue, 17 Jun 1997 00:22:26 +0800
From: John Young <jya@pipeline.com>
Date: Tue, 17 Jun 1997 00:22:26 +0800
To: cypherpunks@toad.com
Subject: DREI 97: Cryptography and Network Security
Message-ID: <1.5.4.32.19970616155214.008adc3c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
http://dimacs.rutgers.edu/drei/1997/schedule/DREI97_ad_Research.htm
DIMACS Research & Education Institute
DREI 97 Cryptography and Network Security
July 28 - August 15, 1997
Rutgers University, NJ
Speakers and papers (abstracts available at the site):
Martin Abadi, Digital Systems Research Center, DEC "Strengthening Passwords"
Ross Anderson, Cambridge University, "Medical Records Security" and
"Steganography"
Alex Biryukov, Technion "Cryptanalysis of the Portz Interconnection-Network
Block-Cipher" and "Cryptanalysis of RC5"
Daniel Bleichenbacher, Bell Labs "Comparing RSA and RSA-Type
Cryptosystems Over
Elliptic Curves"
Gilles Brassard, University of Montreal "The Impact of Quantum Mechanics on
Cryptology"
Ran Canetti, IBM "Towards Realizing Random Oracles: Hash Functions That
Hide All
Partial Information" and "On the Adaptive Security of Multiparty Protocols"
Benny Chor, Technion "Private Information Retrieval"
Claude Crepeau, Universite de Montreal "Cryptographic Power of Noisy
Channel"
Cynthia Dwork, IBM "Positive Applications to Lattices of Cryptography"
Carl Ellison, Cybercash, Working Cryptanalysis of the German Enigma" and
Key Management in the Post-Identity Era"
Yair Frankel, Sandia "New Techniques for Sharing Cryptographic Functions"
Matthew Franklin, AT&T Labs - Research, "Ecash and the Power of Positive
Paranoia"
Rosario Gennaro, IBM "How to Sign Digital Streams"
Stuart Haber, Surety Technologies, "Ensuring the Integrity of Records On
Line: How to
Time-Stamp a Digital Document"
Jack Lacey, AT&T Labs - Research, "Music on the Internet and the
Intellectual
Property Protection Problem"
Susan Landau, University of Massachusetts at Amherst "Cryptology,
Technology and
Policy"
David P. Maher, AT&T Labs - Research "Security Models for Partially
Accounted
E-Cash Systems"
Dalia Malkhi, AT&T Labs - Research "Auditable Metering with Lightweight
Security"
Moni Naor, The Weizmann Institute "A Formal Teatment of Remotely Keyed
Encryption"
Hilaire Orman, DARPA "The Imperfection of Secrecy in Real Network Protocols"
Pino Persiano, University of Salerno "A Transparent Distributed
Cryptographic
Filesystem" and "Randomness-Efficient Non-Interactive Zero-Knowledge Proofs"
Marcus Ranum, Network Flight Recorder, Inc., "Hacking and Networked
Terrorism"
and "Problems with the Firewall Concept"
Mike Reiter, AT&T Labs - Research "Toward Acceptable Metrics of
Authentication"
Fred Schneider, Cornell University "Mobile Code Security Issues"
Rich Schroeppel, University of Arizona "Fast Arithmetic in GF[2^156]"
Adi Shamir, The Weizmann Institute "A New Paradigm for Massively
Parallel Random
Search" and "Cryptanalytic Fault Attacks"
Martin Strauss, AT&T Labs - Research "Proxy Cryptography" and "A Formal
Teatment
of Transactional Trust Management"
Edlyn Teske, University of Manitoba "Space Efficient Group Structure
Computation
Using Pollard's $\rho$-Method"
Return to June 1997
Return to “John Young <jya@pipeline.com>”
1997-06-16 (Tue, 17 Jun 1997 00:22:26 +0800) - DREI 97: Cryptography and Network Security - John Young <jya@pipeline.com>