SAC '98
Selected Areas in Cryptography
Preliminary Program
August 17 and 18, 1998
Walter Light Hall
Queen's University
Kingston, Ontario, Canada
Webpage: http://adonis.ee.queensu.ca:8000/sac98/
Sunday, August 16, 1998
------------------------------------
Registration and Reception(arrangements to be confirmed)
18:30 - 21:00 University Club at Queen's,
Monday, August 17, 1998
-------------------------------------
8:00 - 8:50 Registration and Refreshments
8:50 - 9:00 Opening Remarks
Session I: Design of Secret Key Cryptosystems
Chair: Howard Heys
9:00 - 9:20 "Feistel Ciphers with L2-Decorrelation"
Serge Vaudenay(Ecole Normale Superieure/CNRS)
9:20 - 9:40 "Key-Dependent S-Box Manipulations"
Sandy Harris(Kaya Consulting) and Carlisle Adams(Entrust)
9:40 - 10:00 "Twofish: A 128-Bit Block Cipher"
Bruce Schneier, John Kelsey, Doug Whiting
David Wagner and Chris Hall(Counterpane & Berkeley)
10:00 - 10:20 "Toward Provable Security of Substitution-Permutation
Networks"
Zhi Guo Chen and Stafford Tavares(Queen's)
10:20 - 10:50 Refreshment Break
Session II: Randomness and Computational Issues
Chair: Mike Wiener
10:50 - 11:10 "An Accurate Evaluation of Maurer's Universal Test"
Jean-Sebastien Coron(Ecole Normale Superieure) and
David Naccache(Gemplus)
11:10 - 11:30 "Computational Alternatives to Randomn Number Generators"
David M'Raihi, David Naccache(Gemplus),
David Pointcheval and Serge Vaudenay(Ecole Normale
Superieure)
11:30 - 11:50 "Storage-Efficient Finite Field Basis Conversion"
Burton S. Kaliski Jr., Yiqun Lisa Yin,(RSA Labs).
11:50 - 12:10 "Verifiable Partial Sharing of the Factors of an Integer"
Wenbo Mao(HP Labs U.K.)
12:10 - 13:40 Lunch, University Club at Queen's
INVITED TALK
13:40 - 14:30 Alfred Menezes(U. of Waterloo): "Key Agreement Protocols"
Introduced by: Stafford Tavares
14:30 - 14:40 Refreshment Break
Session III: Analysis of Secret Key Cryptosystems
Chair: Serge Vaudenay
14:40 - 15:00 "Higher Order Differential Attack using Chosen Higher
Order Differences"
Shiho Moriai(NTT), Takeshi Shimoyama(TAO) and
Toshinobu Kaneko(TAO & Science U. of Tokyo)
15:00 - 15:20 "On Maximum Non-Averaged Differential Probability"
Kazumaro Aoki(NTT Labs)
15:20 - 15:40 "Cryptanalysis of RC4-like Ciphers"
Serge Mister(Entrust) and Stafford Tavares(Queen's)
15:40 - 16:10 Refreshment Break
Session IV: Cryptographic Systems
Chair: Carlisle Adams
16:10 - 16:30 "Key Preassigned Traceability Schemes for Broadcast
Encryption"
Doug Stinson and R. Wei(U. of Waterloo)
16:30 - 16:50 "Mix-Based Electronic Payments"
Markus Jakobsson(Bell Labs) and David M'Raihi(Gemplus)
16:50 - 17:10 "Over the Air Service Provisioning"
Sarvar Patel(Lucent)
Dinner Monday
18:30 University Club at Queen's,
Tuesday, August 18, 1998
--------------------------------------
Session V: Public Key Cryptosystems
Chair: Doug Stinson
8:50 - 9:10 "Faster Attacks on Elliptic Curve Cryptosystems"
Mike Wiener and Robert Zuccherato(Entrust)
9:10 - 9:30 "Improved Algorithms for Elliptic Curve Arithmetic
in GF(2^n)"
Julio Lopez and Ricardo Dahab(State U. of Campinas)
9:30 - 9:50 "Cryptanalysis of a Fast PKCS Presented at SAC '97"
Phong Nguyen and Jacques Stern(Ecole Normale
Superieure)
9:50 - 10:10 "A Lattice-Based Public-Key Cryptosystem"
Jin-Yi Cai and Tom Cusick(SUNY Buffalo)
10:10 - 10:40 Refreshment Break
Session VI: Design and Implementation of Secret Key Cryptosystems
Chair: Tom Cusick
10:40 - 11:00 "Fast DES Implementation for FPGAs and its Application
to a Universal Key-Search Machine"
Jens-Peter Kaps and Christof Paar(WPI, Worcester)
11:00 - 11:20 IDEA: A Cipher for Multimedia Architectures?"
Helger Lipmaa(Tallinn, Estonia)
11:20 - 11:40 "A Strategy for Constructing Fast Round Functions with
Practical Security against Differential and Linear
Cryptanalysis"
Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto,
Kazumaro Aoki and Kazuo Ohta(NTT & Yokohama)
11:40 - 12:00 "The kth-order Nonhomomorphicity of Boolean Functions"
Xian-Mo Zhang and Yuliang Zheng(Wollongong & Monash)
12:00 - 13:40 Lunch(University Club)
INVITED TALK
13:40 - 14:30 Eli Biham(Technion): "Design and Analysis of Triple Modes
of Operation"
Introduced by: Stafford Tavares
14:30 - 14:40 Refreshment Break
Session VII: Attacks on Secret Key Cryptosystems
Chair: Henk Meijer
14:40 - 15:10 "A Timing Attack on RC5"(coordinated presentation)
Helena Handschuh(Gemplus) and Howard Heys(Memorial)
15:10 - 15:30 "Cryptanalysis of SPEED"
Chris Hall(Counterpane), John Kelsey(Counterpane),
Vincent Rijmen(K.U. Leuven),Bruce Schneier(Counterpane),
and David Wagner(Berkeley)
15:30 - 15:50 "Cryptanalysis of ORYX"
David Wagner(Berkeley), Leone Simpson(QUT),
Ed Dawson(QUT), John Kelsey(Counterpane)
Bill Millan(QUT) and Bruce Schneier(Counterpane)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++