Hope I'm not wasting net bandwidth here, - its long, but relevant. -AJB ------------------------------------------------------------------------------ CRYPTO '94 August 21-25, 1994 Crypto '94 is the fourteenth in a series of workshops on cryptology held at Santa Barbara, California and is sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California, Santa Barbara. Formal proceedings will be provided at the conference. Preliminary Program Monday August 22 ================ 8:30-8:45 Welcome Session 1: Block Ciphers: Differential and Linear Cryptanalysis (8:45 - 10:10) ------------------------------------------------------------------------------ 8:45 - 9:05 The First Experimental Cryptanalysis of the Data Encryption Standard Mitsuru Matsui (Mitsubishi, Japan) 9:10 - 9:20 Linear Cryptanalysis of the Fast Data Encipherment Algorithm Kazuo Ohta (NTT, Japan) and Kazumaro Aoki (Waseda Univ., Japan) 9:20 - 9:40 Differential-Linear Cryptanalysis Susan K. Langford and Martin E. Hellman (Stanford, USA) 9:45 - 10:05 Linear Cryptanalysis Using Multiple Approximations Burton S. Kaliski Jr. and M. J. B. Robshaw (RSA Laboratories, USA) Coffee Break 10:10 - 10:35 Session 2: Schemes Based on New Problems (10:40 - 11:25) -------------------------------------------------------- 10:40 - 11:00 Hashing with SL_2 Jean-Pierre Tillich and Gilles Zemor (ENS, France) 11:05 - 11:15 Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks Jinhui Chao (Chuo University, Japan), Kazuo Tanada (Tokyo Inst. of Tech., Japan) and Shigeo Tsujii (Chuo University, Japan) 11:15 - 11:25 Cryptographic Protocols based on Discrete Logarithms in Real-quadratic Orders Ingrid Biehl, Johannes Buchmann and Christoph Thiel (Univer. Saarlandes, Germany) Session 3: Practical Implementations I -------------------------------------- 11:25 - 11:55 Cryptography in the Commercial World --- Hardware Aspects (Invited presentation) David Maher (AT&T) lunch Session 4: Signatures I (1:30 - 2:30) ------------------------------------- 1:30 - 1:50 Designated Confirmer Signatures and Public-Key Encryption are Equivalent Tatsuaki Okamoto (NTT, Japan) 1:55 - 2:05 Directed Acyclic Graphs, One-way Functions and Digital Signatures Daniel Bleichenbacher and Ueli M. Maurer (ETH, Switserland) 2:05 - 2:25 An Identity-Based Signature Scheme With Bounded Life-span Olivier Delos and Jean-Jacques Quisquater (Univ. Louvain, Belgium) Session 5: Implementation and Hardware Aspects (2:30 - 3:15) ------------------------------------------------------------ 2:30 - 2:50 More Flexible Exponentiation with Precomputation Chae Hoon Lim and Pil Joong Lee (Pohang University, Korea) 2:55 - 3:05 A Parallel Permutation Multiplier for a PGM Crypto-chip Tamas Horvath (Univ. Essen, Germany), Spyros S. Magliveras (University of Nebraska, USA) and Tran van Trung (Univ. Essen, Germany) 3:05 - 3:15 Cryptographic Randomness from Air Turbulence in Disk Drives Don Davis (Openvision Technologies, USA), Ross Ihaka (Univ. Auckland, New Zealand) and Philip Fenstermacher (USA) Coffee Break 3:15 - 3:35 Session 6: Authentication and Secret Sharing (3:40 - 5:05) ---------------------------------------------------------- 3:40 - 4:00 Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol Christian Gehrmann (Lund University, Sweden) 4:05 - 4:15 LFSR-based Hashing and Authentication Hugo Krawczyk (IBM, USA) 4:15 - 4:35 New Bound on Authentication Code with Arbitration Kaoru Kurosawa (Tokyo Inst. of Tech., Japan) 4:40 - 5:00 Multi-Secret Sharing Schemes Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia and Ugo Vaccaro (Univ. Salerno, Italy) Poster Session Tuesday August 23 ================= Session 7: Zero-Knowledge (8:30 - 10:10) ---------------------------------------- 8:30 - 8:50 Designing identification schemes with keys of short size Jacques Stern (ENS, France) 8:55 - 9:15 Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols Ronald Cramer (CWI, The Netherlands), Ivan Damgard (Aarhus University, Denmark) and Berry Schoenmakers (CWI, The Netherlands) 9:20 - 9:40 Language Dependent Secure Bit Commitment Toshiya Itoh, Yuji Ohta (Tokyo Inst. of Tech., Japan) and Hiroki Shizuya (Tohoku Univ., Japan) 9:45 - 10:05 On the length of cryptographic hash-values used in identification schemes Marc Girault (SEPT, France) and Jacques Stern (ENS, France) Coffee Break 10:10 - 10:35 Session 8: Securing an Electronic World: are we ready? (10:40 - 12:00) ---------------------------------------------------------------------- 10:40 - 11:10 Securing the Information Highway (Invited presentation) Whitfield Diffie (Sun Microsystems) 11:10 - 11:30 Opening statements 11:30 - 12:00 Panel Debate (could continue till 12:45) Panel members: Ross Anderson, Bob Blakley, Matt Blaze, George Davida, Yvo Desmedt (moderator), Whitfield Diffie, Joan Feigenbaum, Bob Greenlee, Martin Hellman, David Maher and Miles Smid free afternoon 7:00 - 11:00 pm Rump session Wednesday August 24 =================== Session 9: Signatures II (8:30 - 9:20) -------------------------------------- 8:30 - 8:50 Incremental Cryptography: the Case of Hashing and Signing Mihir Bellare (IBM, USA), Oded Goldreich (Weizmann Inst., Israel) and Shafi Goldwasser (Weizmann Inst., Israel and MIT, USA) 8:55 - 9:15 An Efficient Existentially Unforgeable Signature Scheme and its Applications Cynthia Dwork (IBM, USA) and Moni Naor (Weizmann Inst., Israel) Session 10: Combinatorics and its Applications (9:20 - 10:10) ------------------------------------------------------------- 9:20 - 9:40 Bounds for resilient functions and orthogonal arrays Jurgen Bierbrauer (Math. Inst., Heidelberg, Germany), K. Gopalakrishnan and D. R. Stinson (University of Nebraska, USA) 9:45 - 10:05 Tracing Traitors Benny Chor (Technion, Israel), Amos Fiat (Tel Aviv Univ., Israel) and Moni Naor (Weizmann Inst., Israel) Coffee Break 10:10 - 10:35 Session 11: Number Theory (10:40 - 11:30) ----------------------------------------- 10:40 - 11:00 Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms Ueli M. Maurer (ETH, Switserland) 11:05 - 11:25 Fast Generation of Provable Primes Using Search in Arithmetic Progressions Preda Mihailescu (UBS, Switzerland) Session 12: Practical Implementations II 11:30 - 12:00 Cryptography in the Commercial World --- Software Aspects (Invited presentation) Joseph Pato (Hewlett-Packard Co.) lunch Session 13: Cryptanalysis and Protocol Failures (1:30 - 2:45) ------------------------------------------------------------- 1:30 - 1:50 Attack on the Cryptographic Scheme NIKS-TAS Don Coppersmith (IBM, USA) 1:55 - 2:15 On the Risk of Opening Distributed Keys Mike Burmester (Univ. London, UK) 2:20 - 2:40 Cryptanalysis of Cryptosystems based on Remote Chaos Replication Th. Beth, D. E. Lazic and A. Mathias (Univ. Karlsruhe, Germany) Coffee Break 2:45 - 3:05 Session 14: Pseudo-Random Generation (3:10 - 3:35) -------------------------------------------------- 3:10 - 3:30 A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences James L. Massey and Shirlei Serconek (ETH, Switserland) 3:30 - 4:15 Special event 4:15 - General Assembly of the IACR (IACR President: Peter Landrock) Thursday August 25 ================== Session 15: Block Ciphers: Design and Cryptanalysis (8:30 - 10:10) ------------------------------------------------------------------ 8:30 - 8:50 The Security of Cipher Block Chaining Mihir Bellare (IBM, USA), Joe Kilian (NEC, USA) and Phillip Rogaway (Univ. California, Davis, USA) 8:55 - 9:15 A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem Henri Gilbert and Pascal Chauvaud (CNET, France) 9:20 - 9:40 Ciphertext Only Attack for One-way function of the MAP using One Ciphertext Yukiyasu Tsunoo, Eiji Okamoto and Tomohiko Uyematsu (J. Adv. Inst. Sci. Techn., Japan) 9:45 - 10:05 Pitfalls in Designing Substitution Boxes Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng (Univ. Wollongong, Australia) Coffee Break 10:10 - 10:30 Session 16: Secure Computations and Protocols (10:35 - 11:50) ------------------------------------------------------------- 10:35 - 10:55 A Randomness-Rounds Tradeoff in Private Computation Eyal Kushilevitz (Technion, Israel) and Adi Rosen (Tel Aviv Univ., Israel) 11:00 - 11:20 Secure Voting Using Partially Compatible Homomorphisms Kazue Sako (NEC, Japan) and Joe Kilian (NEC, USA) 11:25 - 11:45 Maintaining Security in the Presence of Transient Faults Ran Canetti (Weizmann Inst., Israel) and Amir Herzberg (IBM, USA) adjournment and final lunch The following people served on the Program Committee. Tom Berson, Anagram Laboratories, USA Don Coppersmith, IBM T. J. Watson Research Center, USA Donald Davies, United Kingdom Yvo Desmedt, Chair, University of Wisconsin - Milwaukee, USA Shimon Even, Technion, Israel Amos Fiat, Tel Aviv University, Israel Russell Impagliazzo, University of California San Diego, USA Ingemar Ingemarsson, University of Linkoping, Sweden Mitsuru Matsui, Mitsubishi Electric Corporation, Japan Alfred Menezes, Auburn University, USA Andrew Odlyzko, AT&T Bell Laboratories, USA Jennifer Seberry, University of Wollongong, Australia Ben Smeets, Lund University, Sweden Moti Yung, IBM T. J. Watson Research Center, USA General Information Facilities will also be provided for attendees to demonstrate hardware, software and other items of cryptological interest. If you wish to demonstrate such items, you are urged to contact the General Chair so that your needs will be attended to. The social program will include hosted cocktail parties and dinners on Sunday, Monday and the Beach Barbecue on Wednesday. These events are included with the cost of registration. No evening meals will be provided at the dining hall. About the conference facilities: The workshop will be held on the campus of the University of California, Santa Barbara. The campus is located adjacent to the Santa Barbara airport and the Pacific Ocean. Accommodations are available in the university dormitories at relatively low cost for conference participants. Children under the age of 13 are not allowed to stay in the dormitories, so those bringing small children will need to make separate arrangements in one of several nearby hotels. More information on hotels is enclosed. Parking on campus is available at no cost to participants. Travel information: The campus is located approximately 2 miles from the Santa Barbara airport, which is served by several airlines, including American, America West, Delta, United and US Air. Free shuttle bus service will be provided between the Santa Barbara airport and the campus on Sunday and Thursday afternoons. All major rental car agencies are also represented in Santa Barbara, and AMTRAK has rail connections to San Francisco from the north and Los Angeles from the south. Santa Barbara is approximately 100 miles north of the Los Angeles airport, and 350 miles south of San Francisco. Registration: Participation is invited by interested parties, but attendance at the workshop is limited, and pre-registration is strongly advised. To register, fill out the attached registration form and return to the address on the form along with payment in full before July 8, 1994. Campus accommodations will be available on a first come, first serve basis for attendees who register by July 8, 1994. Late registrations, subject to a late registration fee, may be accepted if space is available, but there are no guarantees. The conference fees include participation in the program and all social functions, as well as membership to the IACR and a subscription to the Journal of Cryptology. The room and board charges include dormitory lodging Sunday night through Wednesday night and breakfast and lunch Monday through Thursday. Technical sessions will run from Monday morning to Thursday at noon. A very limited number of stipends are available to those unable to obtain funding. Students whose papers are accepted and who will present the paper themselves are invited to apply if such assistance is needed. Requests for stipends should be sent to the General Chair before June 3, 1994. ================================================================== Hotels For those who choose not to stay in the dormitories, the following is a partial list of hotels in the area. Those who choose to stay off campus are responsible for making their own reservations, and early reservations are advised since August is a popular season in Santa Barbara. Note that Goleta is closer to UCSB than Santa Barbara, but a car will probably be required to travel between any hotel and the campus. All prices are subject to change; prices should be confirmed by calling the individual hotels directly. However, mention CRYPTO '94 when you are making your reservation and in several of the hotels you will be eligible for the university rate which can be significantly less than the normal rates. We are not able to block rooms in these hotels, so please make reservations as early as possible. The quality of the hotels range from rather expensive beach-front resorts to basic inexpensive accommodations. For further information, try contacting the Santa Barbara Convention and Visitors Center, (805) 966-9222. South Coast Inn: 5620 Calle Real, Goleta, CA 93117. Single is $89; Double is $94. Call to see if they have University rates. Contact person is Ms. Murrill Forrester (805) 967-3200, Fax (805) 683-4466. Cathedral Oaks Lodge: 4770 Calle Real, Santa Barbara, CA 93110. Single rates start at $75; double rates start at $85. No University rates available. Prices include breakfast. Contact Doug Smoot or Tom Patton at (805) 964-3511. Fax (805) 964-0075 Motel 6: 5897 Calle Real , Goleta, CA 93117. Single rate is $36.99 + tax.. Double rate is 42.99 + tax. (Rates are subject to change.) (805) 964-3596. The Sandman Inn: 3714 State Street, Santa Barbara, CA 93105. Single rate: $71 Double rate: $81. (805) 687-2468. Fax (805) 687-6581. Miramar Hotel (Beachfront): 3 miles south of Santa Barbara on U.S. 101 at San Ysidro turnoff. No specific single or double rate. Rooms begin at $75. Call Laura at (805) 969-2203. Fax (805) 969-3163. Pepper Tree Inn: 3850 State Street, Santa Barbara, CA 93105. Single rate: $112 Double rate: $120. (805) 687-5511. Fax (805) 682-2410 Encina Lodge: 2220 Bath Street, Santa Barbara, CA 93105. Single rate: $112 Double rate: $118. (805) 682-7277. Fax (805) 563-9319. Pacifica Suites (formerly Quality Suites): 5500 Hollister Avenue, Santa Barbara, CA 93111 (close to campus). Normal rates begin at $120 for a suite. Includes full-cooked breakfast. Contact Michael Ensign at (805) 683-6722. Fax (805) 683-4121. Upham Hotel: (bed-and-breakfast) 1404 De La Vina Road, Santa Barbara, CA 93101. Beginning rate: $105 per night. (You must mention you are attending the Crypto conference.) Contact: Shirley Fagardo or reservations at (805) 962-0058. Fax (805) 963-2825. The El Encanto Hotel: 1900 Lasuen Road, Santa Barbara, CA 93105. Beginning rate: $90. Contact: Elizabeth Spencer, (805) 687-5000. Fax (805) 687-3903. ================================================================== CRYPTO '94 Registration Form Registration deadline: July 8, 1994 Last Name:________________________________________________________ First Name:__________________________________ Sex: (M)___ (F)___ Affiliation:______________________________________________________ Mailing Address:__________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ Phone: _________________________ Fax: __________________________ Electronic Mail: _________________________________________________ Payment of the conference fee entitles you to membership in the International Association for Cryptologic Research for 1995 at no extra charge, including a subscription to the Journal of Cryptology, published by Springer-Verlag, at no extra charge. Do you wish to be an IACR member? YES_____ NO ______ Conference fee: Regular ($300) US $ ________ Attended Eurocrypt '94, Perugia ($250) ________ Full Time Student ($150) ________ deduct $50 if you do not wish the proceedings ________ (There will be NO pre-proceedings; the proceedings will be provided at the conference) Total Conference fee: ________ Room and Board (4 nights): Smoking ______ Non-Smoking _____ (Prices include breakfast and lunch on Monday through Thursday) Single room ($250 per person) ________ Double room ($200 per person) ________ Roommate's name: ___________________ Saturday Night ________ ($50 per person single / $40 per person double) $50 late fee for registration after July 8; ________ (registration not guaranteed after July 8) Total Guest Fees (from back of form) ________ Total funds enclosed (U.S. Dollars) US$ ________ Payment must be by check payable in U.S. funds, by money order in U.S. funds or by U.S. bank draft, PAYABLE TO: CRYPTO '94. Payment should be mailed to the General Chair: Additional Contact Information: Jimmy Upton, Crypto '94 Email: crypto94@uptronics.com 1590 Oakland Road Phone: (408)451-8900 Suite B203 Fax: (408)451-8901 San Jose, CA 95131 ================================================================== CRYPTO '94 Guest Form Registration deadline: July 8, 1994 Please fill out this form for anyone who is coming with a conference attendee but not registering for the conference and wishes to either stay on campus or attend the social functions Sunday, Monday and Wednesday. Guests are not entitled to attend the talks and must be attending with someone registering for the conference. Last Name:________________________________________________________ First Name:__________________________________ Sex: (M)___ (F)____ Affiliation:______________________________________________________ Mailing Address:__________________________________________________ __________________________________________________ __________________________________________________ __________________________________________________ Phone: _________________________ Fax: __________________________ Electronic Mail: _________________________________________________ Social Program Attendance ($50) _________ (Sunday, Monday and Wednesday Night Dinners - No admittance to talks) Room and Board (4 nights): Smoking ______ Non-Smoking _____ (Prices include breakfast and lunch on Monday through Thursday) Single room ($250 per person) ________ Double room ($200 per person) ________ Roommate's name: ___________________ Saturday Night ________ ($50 per person single / $40 per person double) Total Guest Fees US$ ________ (Show here and on the other side of this form) ************************************************** * Allen J. Baum tel. (408)974-3385 * * Apple Computer, MS/305-3B * * 1 Infinite Loop * * Cupertino, CA 95014 baum@apple.com * **************************************************