______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter Vol. 16, No. 1, Winter 1999. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * Electronic Proceedings CD-ROM * IACR 1998 Election Results * Eurocrypt '99 in Prague * Martin Hellman to hold 1999 IACR Distinguished Lecture * Slides from the 1998 IACR Distinguished Lecture by Michael Rabin * Papers to appear in the Journal of Cryptology * New Books * Calendar of Events * Conference Announcements and Calls for Papers * IACR Contact Information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the second electronic issue of the IACR Newsletter! With the the AES process going in its second round, Eurocrypt '99 in Prague, and many other interesting events coming up, 1999 promises to be an exciting year for cryptology and for IACR. We see also new workshops in the field, such as CHES (Workshop on Cryptographic Hardware and Embedded Systems), and continuation of established conferences. See the Calendar section or www.iacr.org/events! It looks as if the electronic proceedings CD-ROM may finally be ready! The CD-ROM contains PDF files for all papers published in IACR proceedings from 1981-1997. It will also be available separately from Springer in the LNCS series. I've seen the collection and it's indeed a very valuable tool to have around. If you have not received the IACR Newsletter by Email and would like to recive it in the future, then check out your Email address in the IACR member list that has been mailed in February 1999. IACR can only provide you with accurate information if you contribute your input. Please send in announcements of workshops, conferences, calls for papers, or any other item of interest to IACR members. The address for all submissions to the Newsletter and Calendar is newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in July. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ Electronic Proceedings CD-ROM ______________________________________________________________________________ It was announced last year that Spring-Verlag will be selling a CD-ROM containing the electronic proceedings of all IACR conferences from 1981-1987. For a variety of reasons (including my heavy workload, unfortunately), the production of this volume has taken much longer than expected. I recently sent a copy of what I consider to be the final version of this CD-ROM off to Springer-Verlag for reproduction, and we are hoping to get this out before Eurocrypt 1999. The CD is designed to be viewed with a Java-capable web-browser, and contains the following elements: * PDF files for all 1,275 papers from Crypto 81-87, Eurocrypt 82, and Eurocrypt 84-97. * A complete author index in HTML * A keyword index in HTML * A list of all program committees in HTML * A BibTeX file of all papers * A full-text search capability, using a Java Applet The PDF files were produced from scanned images of the pages. This results in large files, but the reproduction is as faithful as possible to the original printed paper and can be printed at reasonable resolution. The search capability was built using OCR pass on the images, so that the text index is only approximate. In order to overcome this limitation, the Java applet allows the user to control how many errors they are willing to tolerate in their searches. I sincerely apologize for the delay in getting this out. I can only hope that the finished product will be worth the wait. Kevin McCurley ______________________________________________________________________________ IACR 1998 Election Results ______________________________________________________________________________ ELECTION OF OFFICERS The four IACR officers were elected for the three-year term ending 31 December 2001. President Kevin McCurley Vice President Andrew J. Clark Secretary Josh Benaloh Treasurer Jimmy Upton ELECTION OF DIRECTORS Ten candidates stood for the three open positions of Director. The three candidates with the highest number of votes were elected. These new directors are: Eli Biham Whitfield Diffie Peter Landrock Their terms will expire on 31 December 2001. REVISION OF BYLAWS On the question of approval of revisions to the IACR Bylaws, the following votes were cast: Approve 244 Do not approve 16 Obstain 6 Therefore the revision is APPROVED. NOTES: 291 ballots were cast. Of these, 25 ballots were invalid because they could not be authenticated as coming from a member. Zurich, 19 November 1998. Ueli Maurer, Returning officer Reto Kohlas, Witness Thomas Kuehne, Witness Stefan Wolf, Witness The [1]detailed results are also available. References 1. http://www.iacr.org/elections/98/details.html ______________________________________________________________________________ Eurocrypt '99 Preliminary Technical Program ______________________________________________________________________________ For more information, see the conference web page at http://www.iacr.org/conferences/ec99/index.html. Monday, 3.5.1999 Morning sessions Cryptanalysis I (chair: Jacques Stern) * Cryptanalysis of RSA with Private Key d < N^0.292 Dan Boneh and Glenn Durfee (Stanford University) * Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Eli Biham, Alex Biryukov (Technion), and Adi Shamir (Weizmann Institute of Science Hash Functions (chair: Jean-Jacques Quisquater) * Software Performance of Universal Hash Functions Wim Nevelsteen and Bart Preneel (Universiteit Leuven) Foundations I (chair: Claus Schnorr) * Lower Bounds for Oblivious Transfer Reductions Yevgeniy Dodis and Silvio Micali (MIT) * On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions Ivan Damgard (University of Aarhus), Joe Kilian (NEC Research Institute), and Louis Salvail (University of Aarhus) * Conditional Oblivious Transfer and Timed-Release Encryption Giovanni Di Crescenzo (University of California San Diego), Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan (Bellcore) _________________________________________________________________ Afternoon sessions Public Key (chair: Paul Van Oorschot) * An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack Ran Canetti (IBM T.J. Watson) and Shafi Goldwasser (MIT) * Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes Jan Camenisch (University of Aarhus) and Markus Michels (Entrust Technologies Europe) * Secure Hash-and-Sign Signatures without the Random Oracle Rosario Gennaro, Shai Halevi, and Tal Rabin (IBM T.J. Watson) Watermarking and Fingerprinting (chair: Bruce Schneier) * A Note on the Limits of Collusion-Resistant Watermarks Funda Ergun (Bell Laboratories), Joe Kilian (NEC Research Institute), and Ravi Kumar (IBM Almaden) * Coin-Based Anonymous Fingerprinting Birgit Pfitzmann and Ahmad-Reza Sadeghi (Universitat des Saarlandes) _________________________________________________________________ Tuesday, 4.5.1999 Morning sessions Elliptic Curves (chair: Willi Meier) * On the Performance of Hyperelliptic Cryptosystems Nigel Smart (Hewlett-Packard Laboratories) * Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, and Fumitaka Hoshino (NTT Laboratories) * Comparing the MOV and FR Reductions in Elliptic Curve Cryptography Ryuichi Harasawa, Junji Shikata, Joe Suzuki (Osaka University), and Hideki Imai (University of Tokyo) New Schemes (chair: Dan Boneh) * Unbalanced Oil and Vinegar Signature Schemes Aviad Kipnis (NDS Technologies), Jacques Patarin, and Louis Goubin (Bull SmartCards and Terminals) * Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Pascal Paillier (Gemplus) * New Public Key Cryptosystems based on the Dependent--RSA Problems David Pointcheval (Ecole Normale Superieure) _________________________________________________________________ Evening rump session (chair: Ross Anderson) _________________________________________________________________ Wednesday, 5.5.1999 Morning sessions Block Ciphers (chair: Lars Knudsen) * Resistance Against General Iterated Attacks Serge Vaudenay (Ecole Normale Superieure) * XOR and non-XOR Differential Probabilities Philip Hawkes (Qualcomm International) and Luke O'Connor (IBM Zurich) * S-boxes with Controllable Nonlinearity Jung Hee Cheon, Sungtaek Chee, and Choonsik Park (ETRI) Distributed Cryptography (chair: Carlo Blundo) * Secure Distributed Key Generation for Discrete-Log Based Cryptosystems Rosario Gennaro (IBM T.J. Watson), Stanislaw Jarecki (MIT), Hugo Krawczyk (Technion), and Tal Rabin (IBM T.J. Watson) * Efficient Multiparty Computations Secure Against an Adaptive Adversary Ronald Cramer (ETH Zurich), Ivan Damgard, Stefan Dziembowski (Aarhus University), Martin Hirt (ETH Zurich), and Tal Rabin (IBM T.J. Watson) * Distributed Pseudo-Random Functions and KDCs Moni Naor, Benny Pinkas, and Omer Reingold (Weizmann Institute of Science) _________________________________________________________________ Afternoon sessions Cryptanalysis II (chair: Eli Biham) * Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes Thomas Johansson and Fredrik Jonsson (Lund University) * Cryptanalysis of An Identification Scheme Based on The Permuted Perceptron Problem Lars R. Knudsen (University of Bergen) and Willi Meier (FH-Aargau) Tools from Related Areas (chair Victor Shoup) * An Analysis of Exponentiation Based on Formal Languages Luke O'Connor (IBM Zurich Research) * Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-bit Secret Key Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki (Tohoku University) _________________________________________________________________ IACR Business Meeting _________________________________________________________________ Thursday, 6.5.1999 Morning sessions Foundations II (chair: Claude Crepeau) * Computationally Private Information Retrieval with Polylogarithmic Communication Christian Cachin (IBM Zurich), Silvio Micali (MIT), and Markus Stadler (Crypto AG) * On the Concurrent Composition of Zero-Knowledge Proofs Ransom Richardson (Groove Networks) and Joe Kilian (NEC Research Institute) * Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications Marc Fischlin (Universitat Frankfurt) Broadcast and Multicast (chair: Yuliang Zheng) * Secure Communication in Broadcast Channels: the Answer to Franklin and Wright's Question Yongge Wang and Yvo Desmedt (University of Wisconsin) * Efficient Communication-Storage Tradeoffs for Multicast Encryption Ran Canetti (IBM T. J. Watson), Tal Malkin (MIT), and Kobbi Nissim (Weizmann Institute of Science) ______________________________________________________________________________ Martin Hellman to hold 1999 IACR Distinguished Lecture ______________________________________________________________________________ Martin Hellman has been appointed 1999 IACR Distinguished Lecturer. The lecture will be given at Crypto'99 in Santa Barbara. We look forward to his presentation. ______________________________________________________________________________ Slides from the 1998 IACR Distinguished Lecture by Michael Rabin ______________________________________________________________________________ The slides from Michael Rabin IACR Distinguished Lecture at Crypto '98 are available at http://www.iacr.org/publications/dl/rabin98/rabin98.html ______________________________________________________________________________ Papers to appear in the Journal of Cryptology ______________________________________________________________________________ (as of March 1999) 1. Blundo, De Santis, Kurosawa and Ogata: On a Fallacious Bound for Authentication Codes. 2. Quinn: Bounds for Key Distribution Patterns. 3. Zbinden, Gisin, Huttner, Muller and Tittel: Practical Aspects of Quantum Cryptographic Key Distribution. 4. Biham: Cryptanalysis of Triple Modes of Operation. 5. Bernstein: How to Stretch Random Functions: The Security of Protected Counter Sums. 6. Joye, Lenstra and Quisquater: Chinese Remaindering Based Cryptosystems in the Presence of Faults. 7. Smart: The Discrete Logarithm Problem on Elliptic Curves of Trace One. 8. Pointcheval and Stern: Security Arguments for Digital Signatures and Blind Signatures. 9. Knudsen: A Detailed Analysis of SAFER K. 10. Coppersmith and Shparlinksi: On Polynomial Approximation of the Discrete Logarithm and the Diffie-Hellman Mapping. 11. Shoup: On the Security of a Practical Identification Scheme. 12. Golic, Salmasizadeh and Dawson: Fast Correlation Attacks on the Summation Generator. 13. Gennaro, Krawczyk and Rabin: RSA-Based Undeniable Signatures. 14. Blundo, De Santis and Stinson: On the Contrast in Visual Cryptography Schemes. 15. Coppersmith: Weakness in Quaternion Signatures. 16. Burmester, Desmedt, Itoh, Sakurai and Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs of Languages. 17. Fischlin and Schnorr: More RSA and Rabin Bits are More Secure. 18. Franklin and Wright: Secure Communication over Echo Lines. 19. Hirt and Maurer: Player Simulation and General Adversary Structures in Perfect Multi-Party Computation. ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology. We are looking for reviewers! Modern Cryptography, Probabilistic Proofs and Pseudorandomness Oded Goldreich: Modern Cryptography, Probabilistic Proofs and Pseudorandomness, Springer-Verlag, Algorithms and Combinatorics, Vol 17, 1998. ISBN 3-540-64766-x. This remarkable new book is one of the few that treats complexity-based approach to cryptography and it links it with two related fields, namely probabilistic proofs and pseudorandomness. Attendents of Crypto '98 will remember Oded Goldreich's invited talk that provided a basis for the first part of the book. Citing from the preface: The interplay between randomness and computation is one of the most fascinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat interwoven domains (i.e., cryptography, proofs and randomness). [...] This book offers an introduction and extensive survey to each of the three areas mentioned above. It present both the basic notions and the most important (and sometimes advanced) results. The presentation is focused on the essentials and does not ellaborate on details. In some cases it offers a novel and illuminating perspective. The goal is to provide the reader with * A clear and structured overview of each of these areas. * Knowledge of the most important notions, ideas, techniques and results in each area. * Some new insights into each of these areas. [...] _________________________________________________________________ Please send your new book announcements to the newsletter editor at newsletter at iacr.org ______________________________________________________________________________ IACR Calender of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members. If you want to have an event listed here, please send email to webmaster at iacr.org . 1999 * [1]Second AES Candidate Conference, March 22-23, 1999, Rome, Italy. * [2]Sixth Fast Software Encryption Workshop, March 24-26, 1999, Rome, Italy. * [3]ACISP '99, April 7-9, 1999, University of Wollongong, NSW, Australia. * [4]Eurocrypt '99, May 2-6, 1999, Prague, Czech Republic. * [5]STOC '99, May 2-4, Atlanta, Georgia, USA. * [6]PODC '99, May 4-6, Atlanta, Georgia, USA. * [7]IEEE Symposium on Security and Privacy, May 9-12, 1999, Oakland, California, USA. * [8]Mathematics of Public-Key Cryptography, June 13-17, 1999, Fields Institute in Toronto, Canada. * [9]IEEE Information Theory and Networking Workshop, June 27 - July 1, 1999, Metsovo, Greece. * [10]CrypTEC '99, July 5-8, 1999, Hong Kong, China. * [11]Workshop on Selected Areas in Cryptography (SAC '99), August 9-10, 1999, Queen's University, Kingston, Canada. * [12]Workshop on Cryptographic Hardware and Embedded Systems (CHES), August 12-13, 1999, Worcester, Massachusetts, USA. * [13]Crypto '99, August 15-19, 1999, Santa Barbara, California, USA. * [14]8th USENIX Security Symposium, August 23-26, 1999, JW Marriott Hotel, Washington, D.C., USA. * [15]Second Workshop on Security in Communication Networks (SCN '99), September 16-17, 1999, Amalfi, Italy. * [16]CMS'99, Communications and Multimedia Security, September 20-21, 1999, Leuven, Belgium. * [17]Workshop on Information Hiding, September 29-October 1, 1999, Dresden, Germany. * [18]6th ACM Conference on Computer and Communications Security, November 1-4, 1999, Singapore. * [19]Information Security Workshop (ISW '99), November 6-7, 1999, Kuala Lumpur, Malaysia. * [20]Asiacrypt '99, November 15-18, 1999, Singapore. * [21]CQRE [Secure], November 30-December 2, 1999, Duesseldorf, Germany. * [22]ICICS '99, 2nd International Conference on Information and Communication Security, November, 1999, Sydney, Australia. * [23]Seventh IMA International Conference on Cryptography and Coding, December 20-22, 1999, Royal Agricultural College, Cirencester, UK. 2000 * Eurocrypt '2000, May 14-18, Bruges (Brugge), Belgium. _________________________________________________________________ Journal Calls for Papers * [25]IEEE Journal on Selected Areas in Communications (JSAC). Special Issue on Network Security, February 5, 1999. Publication date: January, 2000. _________________________________________________________________ References 1. http://csrc.nist.gov/encryption/aes/aes_home.htm#conf2 2. http://www.ii.uib.no/~larsr/fse99.html 3. http://www.itacs.uow.edu.au/ccsr/proceedings/acisp99.html 4. http://www.iacr.org/conferences/ec99/index.html 5. http://sigact.acm.org/stoc99/ 6. http://www.cs.tamu.edu/people/hlee/podc.html 7. http://java.sun.com/people/gong/conf/ieee-sp/index.html 8. http://fields.utoronto.ca/publickey.html 9. http://www.cs.purdue.edu/homes/spa/itw99.html 10. http://www.cs.cityu.edu.hk/~cryptec/cryptec.htm 11. http://www.engr.mun.ca/~sac99/ 12. http://ece.wpi.edu/Research/crypt/ches/ 13. http://www.iacr.org/conferences/c99/index.html 14. http://www.usenix.org/events/sec99/ 15. http://www.unisa.it/SCN99/ 16. http://www.esat.kuleuven.ac.be/cosic/cms99/ 17. http://www.inf.tu-dresden.de/ihw99/ 18. http://www.isi.edu/ccs99/ 19. http://www.musm.edu.my/BusIT/isw99/ 20. http://www.comp.nus.edu.sg/~asia99 21. http://www.secunet.de/forum/cqre.html 22. http://icics99.cit.nepean.uws.edu.au/ 23. http://www.ima.org.uk/mathematics/conferences.htm 24. http://www.iacr.org/events/archive.html 25. http://www.iacr.org/events/pages/jsac99.txt 26. http://www.iacr.org/index.html ______________________________________________________________________________ Conference Announcements and Calls for Papers ______________________________________________________________________________ 1999 IEEE Symposium on Security and Privacy Special 20th Anniversary Program May 9-12, 1999 The Claremont Resort Berkeley, California Sponsored by the IEEE Technical Committee on Security and Privacy In cooperation with the International Association of Cryptologic Research Symposium Committee: John McLean, General Chair Jonathan Millen, Vice Chair Li Gong, Program Co-Chair Michael Reiter, Program Co-Chair PRELIMINARY PROGRAM -------------------------------------------------------------------------- Sunday, May 9, 1999 -------------------------------------------------------------------------- 5:00pm Registration 6:00pm Reception -------------------------------------------------------------------------- Monday, May 10, 1999 -------------------------------------------------------------------------- 8:00am Registration 8:45am-9:00am Welcome: Chairs -------------------------------------------------------------------------- 9:00am-10:30am Systems Session Chair: Roger Needham, Microsoft Research Hardening COTS software with generic software wrappers Timothy Fraser, Lee Badger, Mark Feldman TIS Labs at Network Associates, Inc. Firmato: A novel firewall management toolkit Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool Lucent Bell Labs Flexible policy-directed code safety David Evans, Andrew Twyman MIT ------------------------------------------------------------------------- 10:30am-11am coffee break ------------------------------------------------------------------------- 11:00am-12:00pm Policy Session Chair: Ravi Sandhu, George Mason University Local reconfiguration policies Jonathan K. Millen SRI International A modular, user-centered authorization service built on an RBAC foundation Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo Iris Associates ------------------------------------------------------------------------ 12:00pm-12:30pm Surprise ------------------------------------------------------------------------ 12:30pm-02:00pm Lunch ------------------------------------------------------------------------ 2:00pm-3:00pm Verification Session Chair: John Mitchell, Stanford University Secure communications processing for distributed languages Martin Abadi, Cedric Fournet, Georges Gonthier Compaq Systems Research Center, Microsoft Research, and INRIA Verification of control flow based security policies T. Jensen, D. Le Metayer, T. Thorn IRISA ------------------------------------------------------------------------ 3:00pm-3:30pm coffee ------------------------------------------------------------------------ 3:30pm-5:00pm Panel Discussion Brief History of Twenty Years of Computer Security Research Panel Chair: Teresa Lunt, Xerox PARC Panelists: G.R. Blakley, Texas A&M University 20 years of cryptography Virgil Gligor, U Maryland 20 years of operating system security (Unix as one focus) Steve Lipner, MITRETEK 20 years of criteria development/commercial technology Jonathan K. Millen, SRI International 20 years of covert channel modeling and analysis John McLean, NRL 20 years of formal methods Steve Kent BBN/GTE 20 years of network security ------------------------------------------------------------------------ 8:00pm Poster Session ------------------------------------------------------------------------ Tuesday, May 11, 1999 ------------------------------------------------------------------------ 9:00am-10:30am Intrusion Detection Session Chair: Cynthia Irvine, Naval Postgraduate School A data mining framework for building intrusion detection models Wenke Lee, Sal Stolfo, Kui Mok Columbia University Detecting intrusions using system calls: Alternative data models Christina Warrender, Stephanie Forrest, Barak Pearlmutter University of New Mexico Detecting computer and network misuse through the production-based expert system toolset (P-BEST) Ulf Lindqvist, Phillip A. Porras SRI International ------------------------------------------------------------------------ 10:30am-11:00am coffee ------------------------------------------------------------------------ 11:00am-12:30pm Panel 2 Near Misses and Hidden Treasures in Early Computer Security Research Panel Chair: Stan Ames, MITRE Panelists: Tom Berson, Anagram Labs and Xerox PARC Marv Schaefer, Arca Dick Kemmerer, UC Santa Barbara ------------------------------------------------------------------------ 12:30pm-2:00pm lunch ------------------------------------------------------------------------ 2:00pm-3:30pm Information Flow Session Chair: John McHugh, Portland State University A multi-threading architecture for multilevel secure transaction processing Haruna Isa, William R. Shockley, Cynthia E. Irvine U.S. Navy, Cyberscape Computer Services, and Naval Postgraduate School Specification and enforcement of classification and inference constraints Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati SRI International and University of Milan A test for non-disclosure in security level translations David Rosenthal, Francis Fung Odyssey Research Associates ------------------------------------------------------------------------ 3:30-4:00pm coffee ------------------------------------------------------------------------ 4:00-5:30pm Work-In-Progress (5-minute Presentations) Session Chair: Heather Hinton, Ryerson Polytechnic University ------------------------------------------------------------------------ 6:00pm IEEE Security and Privacy Technical Committee meeting (open to all conference attendees) ------------------------------------------------------------------------ 8:00pm Poster Session ------------------------------------------------------------------------ Wednesday, May 12, 1999 ------------------------------------------------------------------------ 9:00am-10:00am Authentication and Key Exchange Session Chair: Dieter Gollmann, Microsoft Research Software smart cards via cryptographic camouflage D. Hoover, B. N. Kausik Arcot Systems Analysis of the internet key exchange protocol using the NRL protocol analyzer Catherine Meadows, Naval Research Laboratory ------------------------------------------------------------------------ 10:00am-10:30am coffee ------------------------------------------------------------------------ 10:30am-12:00pm. Panel Discussion Time Capsule -- Twenty Years From Now Panel Chair: Michael Reiter, Lucent Bell Labs Panelists: Mark Weiser, Xerox PARC Future of computing Roger Needham, Microsoft Research, Cambridge Future of hardware technology Howard Shrobe, MIT AI Lab Future of software technology Hilarie Orman, DARPA Future of networking Brian Snow, National Security Agency Future of Security ------------------------------------------------------------------------ 12:00pm Conference Adjourns ------------------------------------------------------------------------ Registration Information Registration must be made in writing either mailed or faxed, by 5 April 1999 to qualify for the advance registration fee. This will be STRICTLY enforced by postmark or fax time. Sorry, but NO E-Mail registrations will be accepted. (The ascii version of the registration form is appended below.) ---------------------------------------------------------------------------- Five-Minute Research Talks Session A continuing feature of the symposium will be a session of 5-minute talks. We want to hear from people who are advancing the field in the areas of system design and implementation, but may lack the resources needed to prepare a full paper. Abstracts of these talks will be distributed at the Symposium. Abstracts for 5-minute talks should fit on one 8.5"x11" page, including the title and all author names and affiliations. Abstracts should be sent via email in plain ASCII format to Li Gong at li.gong@sun.com. The email should state that this abstract is being submitted for presentation at the 1999 IEEE Symposium on Security and Privacy, and should include the presenter's name, email and postal addresses, and phone and fax numbers. 5-minute abstracts due: March 12, 1999 Acceptance notification: March 26, 1999 ---------------------------------------------------------------------------- Evening Sessions The 1999 IEEE Symposium on Security and Privacy will accommodate poster sessions and evening discussions. There will be rooms for interested parties to post presentations on work in progress, recent research results, and innovative proposals, or to lead discussions on topics of current interest. These rooms will be available Monday and Tuesday, May 10 and 11. If you are interested in posting a presentation or organizing a discussion on a particular topic, please indicate so on the registration form. ---------------------------------------------------------------------------- Hotel Reservations - The Claremont Resort The Claremont Resort in Berkeley, California is situated in the Oakland-Berkeley hills overlooking the San Francisco Bay on 22 acres of beautifully landscaped lawns and gardens. Facilities include the Claremont Pool and Tennis Club and The Spa at the Claremont. To reach the hotel, allow 35 minutes from the Oakland Airport and 45 minutes from the San Francisco Airport. Bayporter Express +1-(415)-467-1800 provides shuttle service from either airport to the Claremont Resort. The charge is $16 from either the San Francisco or the Oakland Airport, per person one way. Parking is available at the hotel at a cost of $12 per day for guests and a maximum of $14 per day for non-guests. Hotel reservations must be made under the group name IEEE Symposium on Security and Privacy. The group rate is $121 for singles and $133 for double occupancy, plus 11% tax. These rates are available for the period May 7-14, 1999. The cut-off date for reservations is April 6, 1999. Reservations made after this date will be accepted on a space available basis. Reservations must be accompanied by an advance deposit or credit card guarantee. Individual cancellations will be accepted 24 hours prior to the check-in date. Please be advised the check-in time is after 3:00 p.m.; check-out is 12 noon. For reservations and information, contact: The Claremont Resort, 41 Tunnel Road, Berkeley, CA 94623-0363; Phone: +1-(800)-551-7266 (7 a.m. to 8:30 p.m., PST) or +1-(510)-843-3000; Fax: +1-(510)-549-8582. ---------------------------------------------------------------------------- 1999 IEEE Symposium on Security and Privacy Registration Form Name: _______________________________________ Affiliation: ________________________________ Postal Address: _____________________________ _____________________________________________ _____________________________________________ Phone: ______________________________________ Fax: ________________________________________ Email: ______________________________________ Note: Address information will be distributed to attendees. Please enter the appopriate registration category. Payment must be included and must be either by check in U.S. dollars, drawn on a U.S. bank and made payable to "IEEE Symposium on Security and Privacy," or by credit card. Dates are strictly enforced by postmark. Advance registration (up to 5 April 1999) __ Member: $310.00 IEEE or Computer Society Member #________, required __ Non-Member: $385.00 __ Full-time students: $100.00 Late/on-site registration __ Member: $370.00 IEEE or Computer Society Member #________, required __ Non-Member: $460.00 __ Full-time students: $100.00 Do you wish to present at a poster session or lead an evening discussion? [ ] Yes [ ] No Do you have any special requirements? ---------------------------------- Please indicate you method of payment by checking the appropriate box: [ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM) Credit card authorization: (Charges will appear on your statement as made by the IEEE COMPUTER SOCIETY. Your credit card number will be transmitted to the IEEE over the Internet, using an SSL-protected link.) [ ] Visa [ ] Mastercard [ ] American Express [ ] Diners Club Credit Card Number: Card Holder Name: Expiration Date: Signature (required for credit card payments) Mail registration to: Jonathan Millen SRI International EL233 333 Ravenswood Ave. Menlo Park, CA 94025 Or fax this form (credit card registrations only) to: FAX +1-650-859-2844 (voice confirmation +1-650-859-2358 or +1-650-859-4751) NO REGISTRATIONS BY EMAIL. NO REFUNDS. ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ Conference on The Mathematics of Public-Key Cryptography June 12-17, 1999 The Fields Institute Toronto, Ontario, Canada REGISTRATION FORM NOW AVAILABLE ONLINE AT www.fields.utoronto.ca/publickey.html ================================================== General Announcement for a Conference on The Mathematics of Public-Key Cryptography June 12-17, 1999 The Fields Institute Toronto, Ontario, Canada Organizers: Andrew Odlyzko, AT&T Gary Walsh U. Ottawa Hugh Williams, U. Manitoba Purpose of the Meeting: In recent years there has been an enormous growth in the number of implementations of Public-Key Cryptography in Government and Industry, especially in the financial sector. The level of security provided by PKC lies in the computational difficulty of certain number theoretic problems, such as integer factorization, and computing discrete logarithms in finite abelian groups. This meeting on Computational Number Theory is intended to be fairly broad, although there will be an emphasis on issues of relevance to the security and fast implementation of public-key cryptographic systems. Tentative Format: 5 day meeting, 3 plenary talks each morning, contributed talks each afternoon, Key Note Lecture by Paul Van Oorschot of Entrust Technologies Confirmed Invited Speakers: Eric Bach, University of Wisconsin Johannes Buchmann, Universitat Darmstadt Don Coppersmith, IBM Research Gerhard Frey, Universitat Essen Neal Koblitz, University of Washington Alfred Menezes, University of Waterloo Francois Morain, Ecole Polytechnique Brian Murphy, Australian National University Harald Neiderreiter, Austrian Academy of Sciences Carl Pomerance, University of Georgia Herman te Riele, CWI Oliver Schirokauer, Oberlin College Claus Schnorr, Universitat Frankfurt Victor Shoup, IBM Research Andreas Stein, University of Waterloo Paul van Oorschot, Entrust Technologies Scott Vanstone, Certicom Corporation Contributed Talks. There will be room for contributed talks. For those interested, send three (3) hard copies of an extended abstract (no more than 10 pages) by March 1, 1999 to Gary Walsh Department of Mathematics University of Ottawa 585 King Edward St. Ottawa, Ontario K1N 6N5 Canada Funding: There may be some funding available for grads and postdocs. Interested parties can send an email to publickey@fields.utoronto.ca as soon as possible and will be notified some time before the meeting. Sponsors: Certicom Corporation, Communications Security Establishment, Entrust Technologies, Fields Institute, RSA Data Security. Further Information: For any further information please contact publickey@fields.utoronto.ca or see the website http://www.fields.utoronto.ca/publickey.html ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES) http://ece.WPI.EDU/Research/crypt/ches Worcester Polytechnic Institute Worcester, Massachusetts, USA August 12 & 13, 1999 Second Call for Papers General Information The focus of this workshop is on all aspects of cryptographic hardware and embedded system design. The workshop will be a forum of new results from the research community as well as from the industry. Of special interest are contributions that describe new methods for efficient hardware implementations and high-speed software for embedded systems, e.g., smart cards, microprocessors, DSPs, etc. We hope that the workshop will help to fill the gap between the cryptography research community and the application areas of cryptography. Consequently, we encourage submission from academia, industry, and other organizations. All submitted papers will be reviewed. The topics of interest include but are not limited to: * Computer architectures for public-key cryptosystems * Computer architectures for secret-key cryptosystems * Reconfigurable computing and applications in cryptography * Cryptographic processors and co-processors * Modular and Galois field arithmetic architectures * Tamper resistance on the chip and board level * Architectures for smart cards * Tamper resistance for smart cards * Efficient algorithms for embedded processors * Special-purpose hardware for cryptanalysis * Fast network encryption * True and pseudo random number generators Mailing List If you want to receive emails with subsequent Call for Papers and registration information, please send a brief mail to ches@ece.orst.edu. Instructions for Authors Authors are invited to submit original papers. The preferred submission form is by electronic mail to ches@ece.orst.edu. Papers should be formatted in 12pt type and not exceed 12 pages (not including the title page and the bibliography). The title page should contain the author's name, address (including email address and an indication of the corresponding author), an abstract, and a small list of key words. Please submit the paper in Postscript or PDF. We recommend that you generate the PS or PDF file using LaTeX, however, MS Word is also acceptable. All submissions will be refereed. Only original research contributions will be considered. Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences or workshops that have proceedings. Workshop Proceedings The post-proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series. Notice that in order to be included in the proceedings, the authors of an accepted paper must guarantee to present their contribution at the workshop. Important Dates Submission Deadline: April 30th, 1999. Acceptance Notification: June 15th, 1999. Final Version due: July 15th, 1999. Workshop: August 12th & 13th, 1999. NOTES: The CHES dates August 12 & 13 are the Thursday & Friday preceding CRYPTO '99 which starts on August 15. Invited Speakers Dale Hopkins, Compaq - Atalla, USA. Brian Snow, National Security Agency, USA. Eberhard von Faber, Debis IT Security Services, Germany. "Evaluation Schemes for Financial Organizations." Colin D. Walter, Computation Department - UMIST, U.K. "An Overview of Montgomery's Multiplication Technique: How to make it Smaller and Faster." Program Chairs All correspondence and/or questions should be directed to either of the Program Chairs: Cetin Kaya Koc Christof Paar Dept. of Electrical & Computer Dept. of Electrical & Computer Engineering Engineering Oregon State University Worcester Polytechnic Institute Corvallis, Oregon 97331, USA Worcester, MA 01609, USA Phone: +1 541 737 4853 Phone: +1 508 831 5061 Fax: +1 541 737 1300 Fax: +1 508 831 5491 Email: Koc@ece.orst.edu Email: christof@ece.wpi.edu Program Committee Gordon Agnew, University of Waterloo, Canada David Aucsmith, Intel Corporation, USA Ernie Brickell, CertCo, USA Wayne Burleson, University of Massachusetts at Amherst, USA Burt Kaliski, RSA Laboratories, USA Jean-Jacques Quisquater, Université Catholique de Louvain, Belgium Christoph Ruland, University of Siegen, Germany Victor Shoup, IBM Research, Switzerland Michael Wiener, Entrust Technologies, Canada Location WPI is in Worcester, the second largest city in New England. The city is 80 km (50 miles) West of Boston and 280 km (175 miles) North-East of New York City. Worcester is home to a wealth of cultural treasures, many of which are just a short distance from WPI. These include the historic Higgins Armory Museum, which houses one of the world's largest collections of armor; the EcoTarium (formerly New England Science Center), one of the only museums in the country dedicated to environmental education; and the beautifully restored Mechanics Hall, one of America's finest concert halls. The Worcester Art Museum, holding one of the nation's finest collections, and the world-renowned American Antiquarian Society, with the largest collection of items printed during the nation's colonial period, are within two blocks of the WPI campus. Worcester is also well known for its ten colleges, which cooperate through the Colleges of Worcester Consortium. Recreation areas within easy driving distance include Boston and Cape Cod to the east, the White and Green mountains to the north, and the Berkshires to the west. August weather in New England is usually very pleasant with average temperatures of 20 C (70 F). Workshop Sponsors This workshop has received generous support from Advanced Communications Inc., Compaq - Atalla Security Products, Intel, SECUNET, and SITI. The organizers express their sincere thanks. ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ Call for Papers Second Workshop on Security in Communication Networks September 16--17, 1999, Amalfi, Italy General Information Security and privacy are increasing concerns in computer networks like the Internet. The availability of fast, reliable, and cheap electronic communication offers the opportunity to perform electronically and in a distributed way a wide range of transactions of the most diverse nature. The problem of security, privacy and integrity of information is of dramatic importance in transactions of commercial and financial nature. The Second Workshop Security in Communication Networks (SCN '99) will be held in Amalfi (Italy) on September 16--17, 1999. SCN '99 aims at bringing together researchers in the field of data security to foster cooperation and exchange of ideas. Papers are solicited on all technical aspects of data security including: Anonymity Identification Authentication Implementations Block Ciphers Key Distribution Computer Security Privacy Cryptanalysis Protocols Hash Functions Public Key Digital Signatures Secret Sharing Electronic Money Standards Foundations and Theory Survey and state of the art Instructions for Authors: Authors are strongly encouraged to submit their papers electronically (Postscript file). A detailed description of the electronic submission procedure will appear by March 29, 1999 at http://www.unisa.it/SCN99/. Electronic submissions must conform to this procedure in order to be considered. Authors unable to submit electronically are invited to send a cover letter and 14 copies of an extended abstract to the Program Chair at the address given below. Submission must be received by the Program Chair on or before May 15, 1999 (or postmarked by May 1, 1999 and sent via airmail or courier). The program committee will also consider papers that are currently submitted to other conferences as well as reports on ongoing research. The extended abstract should start with the title and an abstract and should state whether the paper is currently submitted to a conference and the name of the conference. The abstract should be followed by a succinct statement appropriate for a non-specialist reader specifying the subject addressed, its background, the main achievements, and their significance to data security. Submissions are limited to 12 single-spaced pages of 12pt type. Notification of acceptance or rejection will be sent to authors no later than July 1, 1999. Conference Proceedings: There will be no conference proceedings but a booklet of extended abstracts will be distributed to the participants and made available through the WWW. We are currently negotiating to have a special issue of an international journal devoted to selected papers from the conference. Important Dates: Submission: May 15, 1999. Acceptance: July 1, 1999. Conference: September 16-17, 1999 Program Chair: Giuseppe Persiano Dip. di Informatica ed Appl. Universita` di Salerno 84081 Baronissi (Salerno), ITALY e-mail: giuper@dia.unisa.it phone (+39)-089-965.241 FAX: (+39)-089-965.272 Programme Committee: Carlo Blundo (Universita` di Salerno, Italy) Dan Boneh (Stanford University, USA) Johannes Buchmann (T. U. of Darmstadt, Germany) Benny Chor (Technion, Israel) Rosario Gennaro (IBM T.J. Watson, USA) Rafael Hirschfeld (Unipay Technologies, The Netherlands) Jim Massey (Lund University, Sweden) Ueli Maurer (ETH Zurich, Switzerland) Rafail Ostrovsky (Bellcore, USA) Giuseppe Persiano (Chair) (Universita` di Salerno, Italy) Doug Stinson (University of Waterloo, Canada) Gene Tsudik (U. of Southern California, USA) Moti Yung (CertCo, USA) General Chairs: C. Blundo and A. De Santis Dip. di Informatica ed Appl. Universita` di Salerno 84081 Baronissi (Salerno), ITALY e-mail: {carblu,ads}@dia.unisa.it phone (+39)-089-965.403 Local Organizing Committee: V. Auletta (Chair) P. D'Arco, C. Galdi, B. Masucci Publicity Chairs: C. Galdi and V. Scarano e-mail: {clegal,vitsca}@dia.unisa.it phone (+39)-089-965.264 ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ Preliminary Announcement and Call for Papers 6th ACM Conference on Computer and Communications Security November 1-4, 1999 Kent Ridge Digital Labs, Singapore http://www.isi.edu/ccs99 Papers offering research contributions in any aspect of computer security are solicited for submission to the Sixth ACM Conference on Computer and Communications Security. Papers may present theoretical results, techniques/protocols, applications, or practical experience on a wide rage of topics, e.g.: Novel cryptographic constructs Implementation experiences New security architectures Intrusion detection & response Malicious code & countermeasures Authentication & key management Authorization, access control & audit Secure electronic commerce Privacy & anonymity Licensing & intellectual property New attacks & threats Database security Accepted papers will be presented at the conference and published by the ACM in a conference proceedings. Outstanding papers will be invited for submission to ACM Transactions on Information and System Security (TISSEC). Submitting papers: submitted material must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with a proceedings. Papers should be at most 15 pages excluding bibliographies and well-marked appendices (using 11-point font and reasonable margins on 8.5'x11' or A4 paper), and at most 20 pages total. Since reviewers are not required to read the appendices papers should be intelligible without them. All submissions should be appropriately anonymized, i.e., no author names or affiliations, no obvious citations (where possible) and no web pointers! Submission Procedure: 1. Email to ccs99@isi.edu in plain ASCII: paper title, abstract, authors and contact information. 2. In addition, submit your paper using ONE of the following two methods: + Electronic submission (preferred): Instructions for submitting postscript papers by e-mail are available from [4]http://www.isi.edu/ccs99/esub.html . Early electronic submission is strongly recommended. Allow at least five (5) days ahead of the due date to allow for test-printing of the paper and, in case of problems, leaving sufficient time to re-submit in hardcopy. Organizers are not responsible for unprintable papers! + Hardcopy submission: Send eight (8) copies of your paper to the program chair at the address below along with a cover letter and a listing (on a separate page) of authors' names, email/postal addresses, phone/fax numbers, and identifying the contact author. Submissions received after the submission deadline will be rejected without review. Where possible all further communications to authors will be via email. Submitting Panel and Tutorial Proposals: this conference will include panel and tutorial sessions addressing topics of interest to the computer security community. Proposals should be no longer than five (5) pages in length and, for panels, should include possible panelists and an indication of which of those panelists have confirmed participation. Proposals can be e-mailed or sent in hardcopy to the program chair at the address below along with a cover letter indicating that the proposal is for the 6th ACM CCCS, and listing the proposers' names, email/postal addresses as well as phone/fax numbers. Papers Panel & Tutorial Proposals Submissions due April 30, 1999 May 15, 1999 Acceptance June 30, 1999 June 30, 1999 Final versions July 30, 1999 July 30, 1999 Conference Organizers: General chair: Juzar Motiwalla Kent Ridge Digital Labs (KRDL) 21 Heng Mui Keng Terrace Singapore 119613 juzar@krdl.org.sg (65) 874-2075 Steering committee chair: Ravi Sandhu George Mason University ISSE Department, Mail Stop 4A4 Fairfax, VA 22030-4444, USA sandhu@isse.gmu.edu (1) 703 993-1659 Program chair: Gene Tsudik USC Information Sciences Institute 4676 Admiralty Way, Suite 10001 Marina del Rey, CA 90292 USA ccs99@isi.edu (1) 310 822-1511 ext. 329 Program committee: N. Asokan, Nokia Research Dan Boneh, Stanford University Robert Deng, Kent Ridge Digital Labs Matt Franklin, Xerox PARC Eli Gafni, UCLA and RSA Labs Ravi Ganesan, Checkfree, Inc. Li Gong, SUN Javasoft Sushil Jajodia, George Mason University Markus Jakobsson, Lucent Bell Labs Ari Juels, RSA Labs Mike Just, Entrust and Carleton University Alain Mayer, Lucent Bell Labs Refik Molva, Eurecom Institute Clifford Neuman, USC ISI Radia Perlman, SUN Labs Mike Reiter, Lucent Bell Labs Ravi Sandhu, George Mason University Gene Spafford, Purdue University Vijay Varadharajan, University of Western Sydney Yuliang Zheng, Monash University Local Arrangements Chair: Desai Narasimhalu, KRDL Publicity chair: Jianying Zhou, KRDL Registration Chair: Victorine Chen-Toh, KRDL Exhibits Chair: Robert Deng, KRDL Tutorials Chair: Ngair Teow Hin, KRDL Proceedings Chair: TBD ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ Asiacrypt '99 November 14-18, 1999 Singapore Call For Papers General Information Nowadays, Asiacrypt becomes one of three major events in security and cryptography in the world. Original papers on all technical aspects of cryptology and information security are solicited for ASIACRYPT '99. ASIACRYPT '99, the fifth annual ASIACRYPT conference will be held in Singapore from November 14 to 18, 1999. ASIACRYPT '99 is sponsored by [1]CSSR (Centre for Systems Security, National University of Singapore), ASC (Asiacrypt Steering Committee), in co-operation with [2]IACR (the International Association for Cryptologic Research). Instructions for Authors Authors are invited to send a cover letter and 17 copies of an anonymous paper to the Program Co-Chair at the post address stated below. Submissions must reach the Program Co-Chair no later than May 10, 1999. Late submissions and submissions by other mediums will not be considered. The cover letter should contain the title, and the authors' names, e-mail and postal addresses. The paper must be anonymous. It should not have the authors' names, affiliations, acknowledgments or obvious references. The paper should begin with the title, a short abstract and a list of keywords. An introduction is also required to summarize the contributions of the paper. The paper should be at most 15 pages including the bibliography and appendices. Only original research contributions will be considered. Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences or workshops that have proceedings. Notification of acceptance or rejection will be sent to authors by July 25, 1999. Conference Proceedings Proceedings will be published in [3]Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the final copy will be sent to the authors of accepted papers. Important Dates Submission Deadline: May 10, 1999 Acceptance Notification: July 25, 1999 Proceedings Version: August 25, 1999 Address for Submission For enquiries, please contact Dr. Kwok Yan Lam Dr. Chaoping Xing, Program Co-Chair Asiacrypt '99 Organizing Chair Asiacrypt '99 School of Computing Department of Mathematics National University of Singapore National University of Singapore Kent Ridge Crescent, Singapore,119260 Kent Ridge Crescent, Singapore, 119260 Tel: (65) 8746613 Tel: (65) 8746747 Fax: (65) 7794580 Fax: (65) 7795452 [4]lamky@comp.nus.edu.sg [5]xingcp@comp.nus.edu.sg Program Co-Chairs Kwok Yan Lam, National University of Singapore Eiji Okamoto, JAIST, Japan General Chair Yongfei Han, Gemplus, Singapore Program Committee Colin Boyd, Queensland University of Technology, Australia Micheal Burmester, University of London, UK Chin-Chen Chang, National Chung Cheng University, Taiwan Cunsheng Ding, National University of Singapore, Singapore Markus Jakobsson, Bell Labs, USA Kwangjo Kim, Information and Communications University, Korea Kwok Yan Lam, National University of Singapore, Singapore (Co-Chair) Pil-Joong Lee, Postech, Korea Ueli Maurer, ETH, Zurich Mitsuru Matsui, Mitsubishi Electronic Corp., Japan David Naccache, Gemplus, France Harald Niederreiter, Austrian Academy of Sciences, Austria Andrew Odlyzko, AT&T Research Lab, USA Eiji Okamoto, JAIST, Japan (Co-Chair) Dingyi Pei, Chinese Academy of Science, China Jacques Stern, ENS, France Guozhen Xiao, Xidian University, China Yuliang Zheng, Monash University, Australia References 1. http://www.comp.nus.edu.sg/~lamky/css.html ______________________________________________________________________________ ________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ Officers and Directors of the IACR (1999) ______________________________________________________________________________ Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. Officers Kevin S. McCurley Andrew J. Clark President Vice President 6721 Tannahill Drive P.O. Box 743 San Jose, CA 95120 Brighton USA East Sussex Phone: (408) 927-1838 BN1 5HS Email: [president(at)iacr.org] United Kingdom Phone: +44 1273 270752 Fax: +44 1273 276558 Email: [vicepresident(at)iacr.org] Josh Benaloh Jimmy Upton Secretary Treasurer Microsoft Research Uptronics Incorporated One Microsoft Way 298 S. Sunnyvale Ave, Suite 211 Redmond, WA 98052 Sunnyvale, CA 94086-6245 USA USA Phone: (425) 703-3871 Phone: (408) 774-6202 Fax: (425) 936-7329 Fax: (408) 774-6201 Email: [secretary(at)iacr.org] Email: [treasurer(at)iacr.org] Directors Don Beaver Thomas Berson Crypto '99 General Chair Anagram Labs Certco Inc. P.O. Box 791 55 Broad Street, 22nd Floor Palo Alto CA, 94301 New York, NY 10004 USA USA Phone: (415) 324-0100 Phone: (212) 709-8900 Email: [berson(at)anagram.com] Fax: (212) 709-6754 Email: crypto99(at)iacr.org Eli Biham Gilles Brassard Computer Science Department Département IRO Technion Université de Montréal Haifa 32000 C.P. 6128, succursale centre-ville Israel Montréal, Québec H3C 3J7 Email: [biham(at)cs.technion.ac.il] Canada Voice: +972-4-8294308 Email: [brassard(at)iro.umontreal.ca] Fax: +972-4-8221128 Christian Cachin Whitfield Diffie IACR Newsletter Editor MTV01-40 IBM Zurich Research Laboratory Sun Microsystems Säumerstrasse 4 2550 Garcia Avenue CH-8803 Rüschlikon Mountain View, CA 94043 Switzerland USA Email: [cachin(at)acm.org] Email: Phone: +41-1-724-8989 [whitfield.diffie(at)eng.sun.com] Fax: +41-1-724-8953 Joan Feigenbaum Matt Franklin Editor-in-Chief, Journal of Cryptology Crypto '2000 General Chair AT&T Labs Research Xerox PARC Room C203 3333 Coyote Hill Road 180 Park Avenue Palo Alto, CA 94304 Florham Park, NJ 07932-0971 (W) 650-812-4228 USA (fax) 650-812-4471 Email: [jf(at)research.att.com] Email: crypto2000(at)iacr.org [jofc(at)iacr.org] Phone: +1 973 360-8442 Fax: +1 973 360-8178 Jaroslav Hruby Peter Landrock Eurocrypt '99 General Chair Mathematics Institute GCUCMP Praha Aarhus University PO Box 21/OST Ny Munkegade 170 34 Prague 7 8000 Aarhus C Czech Republic Denmark Email: [eurocrypt99(at)iacr.org] Email: Phone: 420 2 6143 5524 [landrock(at)cryptomathic.aau.dk] Fax: 420 2 324450 Ueli Maurer Bart Preneel Department of Computer Science Department of Electrical Engineering ETH Zürich Katholieke Universiteit Leuven CH-8092 Zürich Kardinaal Mercierlaan 94 Switzerland B-3001 Heverlee Email: [maurer(at)inf.ethz.ch] Belgium Tel-1: +41-1-632 7420 Email: Tel-2: +41-1-632 7371 [bart.preneel(at)esat.kuleuven.ac.be] Fax : ++41-1-632 1172 Phone: +32 16 32 11 48 Fax: +32 16 32 19 86 Tatsuaki Okamoto Paul C. Van Oorschot NTT Labs Entrust Technologies 1-1 Kikarinooka 750 Heron Road, Suite E08 Yokosuka-Shi 239 Ottawa, Ontario Japan K1V 1A7 USA Canada Phone: 81-468-59-2511 Email: [paulv(at)entrust.com] Fax: 91-468-59-3858 Email: [okamoto(at)sucaba.isl.ntt.jp] Prof.Joos Vandewalle Eurocrypt '2000 General Chair Electrical Engineering Department (ESAT) Katholieke Universiteit Leuven Kard. Mercierlaan 94 B-3001 Heverlee Belgium Fax: 32/16/32.19.70 Phone: 32/16/32.10.52 email : Joos.Vandewalle(at)esat.kuleuven.ac.be ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For calls for papers, please submit a one page ASCII version. Send your contributions to newsletter(at)iacr.org Deadline for submissions to the next newsletter issue is May 31, 1999. However, many items will be posted on the website as soon as possible. The IACR Newsletter is copyright (c) 1999, International Association for Cryptologic Research. ______________________________________________________________________________ End of IACR Newsletter, Vol. 16, no. 1, Winter 1999. ______________________________________________________________________________