______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter Vol. 18, No. 1, Winter 2001. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * 2000 IACR Distinguished Lecture by Tom Berson * IACR 2000 Election Results * New Reports in the Cryptology ePrint Archive * Crypto 2001: Call for Papers * Asiacrypt 2001: Call for Papers * Obituary - Johan Borst * Announcements + Coding Theory and Data Integrity at National University of Singapore + Honorary Doctorate for Bob Blakley + NESSIE - Review of Cryptographic Primitives * Open Positions * Calender of Events in Cryptology * IACR Contact Information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the 8th electronic issue of the IACR Newsletter! We are entering the third calendar year of the electronic IACR Newsletter. I think it is fair to say that the current form of the Newsletter together with the Web site is well accepted by cryptographers from around the world -- at least judging by the number of inputs I receive for publication. Noteworthy items in this issue: * Tom Berson's IACR Distinguished Lecture of 2000 held at Asiacrypt 2000 * IACR election results If you have not received the IACR Newsletter by email and would like to receive it in the future, then check out your email address in the IACR member list that is mailed yearly (last in early 2000). Please send your input to the Newsletter to newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in June 2001. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ 2000 IACR Distinguished Lecture ______________________________________________________________________________ Tom Berson Cryptography Everywhere presented December 4, 2000 at ASIACRYPT 2000, in Kyoto, Japan. Abstract The past twenty years have seen cryptography move from arcane to commonplace, from difficult to easy, from expensive to cheap. Many influences are at work. These include: the professionalization of cryptographers, in which the IACR has played a significant role; the creation of textbooks and of courses; the steady growth of computational power delivered by the operation of Moore's law; the algorithmic advances made by cryptographic researchers and engineers; the rise of e-commerce and wireless infrastructures which have a seemingly endless appetite for cryptographic services; the entry of many young people into the field; and the easing of government export controls. We envisage a near future where cryptographic operations will be as pervasive, cheap, and unremarkable as IP protocol operations have become today. Some things about this future are already clear. Cryptographic operations will disappear into the infrastructure. The complexities of cryptography and of cryptographic key management will be hidden from users. New sorts of protocols will become practical. New sorts of businesses will be possible. We will describe several such protocols and businesses. Other important aspects of this future are less clear, such as the social, economic, and political implications. We will hazard guesses at these and other impacts of cryptography everywhere. The slides from the lecture are available from http://www.anagram.com/berson/ac2000.html. ______________________________________________________________________________ IACR 2000 Elections: Results ______________________________________________________________________________ ELECTION OF DIRECTORS Eight candidates stood for the three open positions of Director. The three candidates with the highest number of votes were elected. These new directors are: Tom Berson Yvo Desmedt Lars Knudsen Their terms will expire on 31 December 2003. For the IACR Elections Committee: Andy Clark, Returning Officer The detailed results are also available from http://www.iacr.org/elections/2000/details.html ___________________________________________________________________________ New Reports in the Cryptology ePrint Archive ______________________________________________________________________________ 2001/007 ( PS PS.GZ ) Are 'Strong' Primes Needed for RSA Ron RIvest & Robert Silverman 2001/006 ( PS PS.GZ PDF ) Secure and Efficient Asynchronous Broadcast Protocols Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup 2001/005 ( PS PS.GZ PDF ) A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme Ilya Mironov 2001/004 ( -- withdrawn -- ) MinRank problem and Zero-knowledge authentication Nicolas T. Courtois 2001/003 ( PS PS.GZ ) Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups Antoine Joux and Kim Nguyen 2001/002 ( PS PS.GZ PDF ) The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko 2001/001 ( PS PS.GZ PDF ) Efficient Algorithms for Computing Differential Properties of Addition Helger Lipmaa, Shiho Moriai 2000/069 ( PS PS.GZ ) New constructions of resilient Boolean functions with maximal nonlinearity Yuriy Tarannikov 2000/068 ( PDF ) A Content Certified E-mail Protocol with a Public Mailbox Tak-Ming Law 2000/067 ( PS PS.GZ ) A unified framework for analyzing security of protocols Ran Canetti 2000/066 ( PS PS.GZ ) A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann and Michael Waidner 2000/065 ( PS PS.GZ ) How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes Masashi Mitomo and Kaoru Kurosawa 2000/064 ( PS PS.GZ ) On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators Oded Goldreich and Vered Rosen 2000/063 ( PS PS.GZ ) Candidate One-Way Functions Based on Expander Graphs Oded Goldreich 2000/062 ( -- withdrawn -- ) Non-Deforming Digital Watermarks Gideon Samid 2000/061 ( PS PS.GZ PDF ) RSA-OAEP is Still Alive! Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern 2000/060 ( PS PS.GZ PDF ) OAEP Reconsidered Victor Shoup 2000/059 ( PDF ) Essential Shannon Security with Keys Smaller Than the Encrypted Message Gideon Samid 2000/058 ( PS PS.GZ ) Graph-Based Authentication of Digital Streams Sara Miner and Jessica Staddon 2000/057 ( PS PS.GZ PDF ) Session-Key Generation using Human Passwords Only Oded Goldreich and Yehuda Lindell 2000/056 ( PS PS.GZ ) A Complete Problem for Statistical Zero Knowledge Amit Sahai and Salil Vadhan 2000/055 ( PS PS.GZ PDF ) Multiparty Computation from Threshold Homomorphic Encryption Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen 2000/054 ( PS PS.GZ ) Correlation Immune Boolean Functions with Very High Nonlinearity Subhamoy Maitra 2000/053 ( PS PS.GZ PDF ) A Construction of Resilient Functions with High Nonlinearity Thomas Johansson and Enes Pasalic 2000/052 ( PDF ) CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic and Amparo Fúster-Sabater 2000/051 ( PS PS.GZ ) Reducing the Gate Count of Bitslice DES Matthew Kwan 2000/050 ( PS PS.GZ ) Spectral Analysis of High Order Correlation Immune Functions Yuriy Tarannikov and Denis Kirienko ______________________________________________________________________________ Crypto 2001: Call for Papers ______________________________________________________________________________ CRYPTO 2001 August 19-23, 2001 Santa Barbara, California, USA Call for Papers Original papers on all technical aspects of cryptology are solicited for submission to Crypto 2001, the Twenty-First Annual IACR Crypto Conference. Crypto 2001 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. Important Dates are: Conference August 19 - 23, 2001 Submission Deadline February 12, 2001, 17:00 EST Notification of decision April 25, 2001 Proceedings version deadline May 29, 2001 Instructions for Authors Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. Submission Format: The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 12 pages excluding bibliography and appendices. It should use at least 11-point fonts and have reasonable sized margins. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Electronic Submission: Electronic submission is strongly encouraged. A detailed description of the electronic submission procedure will appear by January 20, 2001 at http://www.iacr.org/conferences/c2001/electronic.html. Electronic submissions must conform to this procedure and be received by February 12, 2001, 17:00 EST in order to be considered. Hardcopy Submission: Authors unable to submit electronically may, as a strongly discouraged last resort, send a cover letter and 21 double-sided hardcopies of their submission to the program chair at the postal address below. Authors intending to submit via hardcopy should contact the program chair on or before February 5, 2001. Submissions must be received by the program chair on or before February 12, 2001, 17:00 EST. Late submissions, regardless of postmark, and submissions by fax will not be considered. Hardcopy submission must include a cover letter containing the paper's title and the names and affiliations of the authors, and should identify the contact author including e-mail and postal addresses. Decisions and Presentation: Notification of acceptance or rejection will be sent to authors by April 25, 2001. Authors of accepted papers must guarantee that their paper will be presented at the conference. Conference Proceedings: Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on May 29, 2001. Program Committee Bill Aiello, AT&T Research Don Beaver, CertCo Josh Benaloh, Microsoft Research Antoon Bosselaers, Katholieke Universiteit Leuven Jan Camenisch, IBM Zurich Ran Canetti, IBM T. J. Watson Claude Crépeau, McGill University Alfredo De-Santis, Università di Salerno Marc Girault, France Telecom Stuart Haber, InterTrust Star Lab Joe Kilian (program chair), Yianilos Labs Dominic Mayers, NEC Research Institute Tatsuaki Okamoto, NTT Labs Jacques Patarin, BULL Erez Petrank, Technion Omer Reingold, AT&T Research Kazue Sako, NEC C&C Media Research Lab Tomas Sander, InterTrust Star Lab Doug Stinson, University of Waterloo Yacov Yacobi, Microsoft Research Advisory Members: Mihir Bellare, University of California, San Diego, Crypto 2000 program chair Moti Yung, CertCo, Crypto 2002 program chair Contact Information for the Program Chair Joe Kilian Program Chair, Crypto 2001 Yianilos Labs 707 State Rd., Rt. 206 Suite 212 Princeton, NJ 08540 joe@pnylab.com ______________________________________________________________________________ Asiacrypt 2001: Call for Papers ______________________________________________________________________________ Asiacrypt 2001 9-13 December 2001 Gold Coast - Australia http://www.isrc.qut.edu.au/asiacrypt/ CALL FOR PAPERS Original papers on all technical aspects of cryptology are solicited for submission to Asiacrypt 2001, the seventh annual Asiacrypt conference. Asiacrypt 2001 is organised by the International Association for Cryptologic Research (IACR). * Submission: 5th June, 2001 * Acceptance: August 20th, 2001 * Proceedings version: September 25th, 2001 Instructions for authors Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Submission Format The paper must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the paper should be at most 12 pages excluding bibliography and appendices, and at most 20 pages total using at least 11-point fonts and with reasonable margins. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Electronic Submission This is strongly encouraged. A detailed description of the electronic submission procedure will appear by April 17, 2001 on the Asiacrypt 2001 web pages. Electronic submissions must conform to this procedure and be received by June 5, 2001, 09:00 GMT in order to be considered. This is early morning in many countries. Hardcopy Submission Authors unable to submit electronically are invited to send a cover letter and 20 hardcopies of their submission (double-sided) to the Program Chair at the postal address below. Submissions must be received by the Program Chair on or before June 5, 2001 (or postmarked by May 28, 2001, and sent via airmail or courier). Late submissions and submissions by fax will not be considered. The cover letter should contain the paper's title and the names and affiliations of the authors, and should identify the contact author including e-mail and postal addresses. Conference Proceedings Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors of accepted papers must guarantee that their paper will be presented at the conference. Program Committee * Masayuki Abe (NTT Laboratories, Japan) * Ronald Cramer (BRICS & University of Aarhus, Denmark) * ZongDuo Dai (University of Science and Technology of China) * Rosario Gennaro (IBM TJ Watson Research Centre, USA) * Jovan Golic (University of Belgrade, Yugoslavia) * Chi-Sung Laih (National Cheng Kung University, Taiwan) * Kwok Yan Lam (PrivyLink International Ltd, Singapore) * Pil Joong Lee (POSTECH, Korea) * Arjen K Lenstra (Citibank, USA; Technical University Eindhoven, Netherlands) * Wenbo Mao (HP Laboratories, UK) * Pascal Paillier (Gemplus, France) * Vincent Rijmen (KU Leuven, Belgium) * Bimal Roy (Indian Statistical Institute) * Rei Safavi-Naini (University of Wollongong, Australia) * Kouichi Sakurai (Kyushu University, Japan) * Nigel Smart (University of Bristol, UK) * Stefan Wolf (University of Waterloo, Canada) * Moti Yung (CertCo, USA) * Yuliang Zheng (Monash University, Australia) * Advisory Member: Tatsuaki Okamoto, Asiacrypt 2000 Program Chair Program Chair Colin Boyd Information Security Research Centre Queensland University of Technology 2 George Street, GPO Box 2434, Brisbane 4001, Australia Phone: +61 7 3864 5229 Fax: +61 7 3221 2384 Email: c.boyd@qut.edu.au General Chair Ed Dawson Information Security Research Centre Queensland University of Technology 2 George Street, GPO Box 2434, Brisbane 4001, Australia Phone: +61 7 3864 1919 Fax: +61 7 3221 2384 Email: e.dawson@qut.edu.au ______________________________________________________________________________ Obituary - Johan Borst (1972-2000) ______________________________________________________________________________ Obituary - Johan Borst (1972-2000) We have to report the sad news that Johan Borst, PhD student in our research group, died in Breda (The Netherlands) on 19 October 2000 at age 28. Johan studied mathematis at the Eindhoven University of Technology, where he graduated in 1997 under supervision of Prof. Henk van Tilborg. His Master's thesis is a survey of public key cryptosystems using elliptic curves, an assignment of the Netherlands National Communications Security Agency, a department of the Dutch Ministry of the Exterior. In 1997, Johan became a PhD student at the Katholieke Universiteit Leuven in Belgium. He performed research on the design and analysis of cryptographic algorithms. He wrote papers on the analysis of IDEA and RC-5 and on implementation measures against differential power analysis. He left us a complete Phd thesis. Johan's research work was published in the proceedings of Eurocrypt, Fast Software Encryption and the Benelux Symposium of Information Theory, and in the Journal of Computer Networks and Electronics Letters. We will remember Johan as a smart researcher and an excellent chess player. He was a man of few words, but those who got to know him valued his sense humour. Johan was always willing to help out. He refereed several papers for IACR conferences; his reports were always thorough and fair. Johan was a member of the organizing team of Eurocrypt 2000 in Bruges. Bart Preneel, Joos Vandewalle October 20, 2000, Leuven, Belgium * J. Borst, Public key cryptography using elliptic curves, Master's thesis, University of Technology Eindhoven, 1997. * J. Borst, L.R. Knudsen, V. Rijmen, Two attacks on reduced IDEA, Eurocrypt '97. * J. Borst, B. Preneel, J. Vandewalle, On the time-memory tradeoff between exhaustive key search and table precomputation, 19th Symposium on Information Theory in the Benelux, 1998. * J. Borst, Weak keys of CRYPTON, Comment to NIST, 1998, Presented at the 2nd AES conference, 1999. * J. Borst, B. Preneel, J. Vandewalle, Linear cryptanalysis of RC5 and RC6, FSE '99. * J. Borst, B. Preneel, J. Vandewalle, An adaptive chosen ciphertext attack on a variation of the Cramer-Shoup public-key encryption scheme, Electronics Letters, Vol. 36, No. 1, 2000. * J. Borst, B. Preneel, J. Vandewalle, Power analysis: methods and countermeasures, 21st Symposium on Information Theory in the Benelux, 2000. * J. Borst, B. Preneel, V. Rijmen, Cryptography on smart cards, Journal of Computer Networks, 2001. ______________________________________________________________________________ Announcements ______________________________________________________________________________ ** Coding Theory and Data Integrity -- Inaugural Program of the Institute for Mathematical Sciences, National University of Singapore The National University of Singapore has recently formed the new Institute for Mathematical Sciences, whose mission is to provide for an international center of excellence for mathematical research, focusing on fundamental issues in and applications of the mathematical sciences, as well as to promote interest in those fields and in multi-disciplinary research within Singapore and the region. In each year the Institute will organize two programs, each lasting up to six months, in accordance with the trends of development in the mathematical sciences and with the interests of scientists in Singapore and the region. Senior and young mathematical scientists as well as graduate students are expected to visit the Institute for periods of varying lengths, ranging from a month to six months, and to interact with each other through workshops, seminars and informal discussions. The inaugural program of the Institute will be held during July - December 2001 on Coding Theory and Data Integrity. The program will be divided into three parts, each lasting six to eight weeks: * Mathematical Foundations (computational number theory, algebraic curves, etc.) * Coding and Cryptography (constructions of codes and cryptosystems, etc.) * Applied Cryptology (implementations, commercial applications, etc.) For each part of the program, a one-week tutorial and a one-week workshop will be held. Organizing Committee: Shih-Ping Chan, Robert Deng, San Ling, Harald Niederreiter (Chair), Eiji Okamoto, Igor E. Shparlinski, Neil J.A. Sloane, Chaoping Xing The Institute solicits applications for membership for participation in the above program. A limited number of fellowships, covering travel and living expenses, are available to young mathematical scientists. Applications should be received at least three (3) months before the commencement of membership. Further information and application forms are available from http://www.ims.nus.edu.sg/ or by writing to the Secretary, Institute for Mathematical Sciences, 2 Science Drive 2, Singapore 117543, Republic of Singapore. ** Honorary Doctorate for Bob Blakley Professor Bob Blakley will be awarded an honorary doctorate from Queensland University of Technology in Australia on Feburary 13, 2001 in recognition of his research in the area of information security. ** NESSIE - Review of Cryptographic Primitives NESSIE (New European Schemes for Signature, Integrity, and Encryption) is a project within the Information Societies Technology (IST) Programme of the European Commission. It is a 3-year project, which started on 1st January 2000. Further information about NESSIE is available at http://cryptonessie.org. The main objective of the project is to put forward a portfolio of strong cryptographic primitives for a number of different platforms. These primitives have been obtained after an open call and are being evaluated using a transparent and open process. They should be the building blocks of the future standard protocols for the information society. 39 primitives have been submitted (both symmetric and asymmetric). They are available at http://cryptonessie.org. The project would like to invite comments on these primitives; an electronic discussion forum has been established to facilitate open discussions. A 2-day open workshop has been planned for the first half of September 2001. Details will be available shortly on the NESSIE website. ______________________________________________________________________________ Open Positions in Cryptology ______________________________________________________________________________ IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at [1]http://www.iacr.org/jobs/ and also included in the [2]IACR Newsletter that is sent to members three times per year. To advertise your job opportunities, please send a description of no more than 150 words in plain ASCII text by email to jobs(at)iacr.org. This should include an URL and further contact information. No attachments or word documents, please! (Submissions in other formats than text will not be posted.) As this is intended to be a service to the members of IACR, it is free for all members. We ask that commercial enterprises who want to advertise their openings identify at least one of their employees who is a member of IACR. (IACR does not know corporate membership.) Please contact the membership secretariat to [3]become a member of IACR. On top of that, IACR accepts donations and is always looking for sponsors for its conferences. 14-aug-00: Entries are now sorted by inverse chronological order. _________________________________________________________________ COSIC, Katholieke Universiteit Leuven, Belgium POSTDOCTORAL POSITION: CRYPTOGRAPHIC PROTOCOLS COSIC (Computer Security and Industrial Cryptography) Dept. Electrical Engineering-ESAT Katholieke Universiteit Leuven, Belgium Applications are invited for a postdoctoral position in the area of "Anonymity and Privacy in Electronic Services". The project addresses both technical and legal aspects (for more details: http://www.cosic.esat.kuleuven.ac.be/apes/). The task of the postdoc will be to perform research in this area and to assist with project management (contact with project user group, planning and reporting, organization of workshops). The first appointment will be for 1 year, but an extension with 2 years is possible. We prefer candidates with a Ph.D. and proven ability, or the potential, for excellent research. Candidates who do not have a PhD but who can demonstrate relevant research experience are also encouraged to apply. Successful candidates will be joining a research group of 20 people with an international reputation in the area of cryptography and its applications (http://www.esat.kuleuven.ac.be/cosic). The normal starting date of appointment is April 15, 2001. However, this date can be changed at the applicant's request. Interested individuals should send a curriculum vitae, 2 or 3 selected reprints/preprints, and the name of at least one reference to: Bart Preneel Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT/COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, BELGIUM bart.preneel@esat.kuleuven.ac.be Closing date for receipt of applications is March 15, 2001. (03-feb-01) _________________________________________________________________ BRICS - Basic Research in Computer Science at the Universities of Aarhus and Aalborg, Denmark BRICS, a centre for Basic Research in Computer Science, is funded by the Danish National Research Foundation. It compromises an International PhD School with an associated Research Laboratory. BRICS is based on a commitment to develop theoretical computer science, covering core areas such as: - Semantics of Computation, - Logic, - Algorithms and Data Structures, - Complexity Theory, - Data Security and Cryptology, and - Verification, as well as a number of spin-off activities including - Web Technology, - Quantum Informatics, - Bio Informatics, and - Networks and Distributed Realtime Systems. BRICS has a substantial number of new PhD grants and research positions available, starting in 2001. Applications can be submitted at any time. However, the application deadline for PhD grants and positions starting August 2001 is February 15, 2001. PhD admission and grants: Any student with at least four years of studies in computer science is eligibele to apply for PhD admission and grants. Marie Curie Training Sites Fellowships: These fellowships are offered within Interactive Computation - Methodology, Security, and Efficiency - and are open to PhD students who are nationals of a member state of the European Community or an associated state, and who wish to spend time (from three months to twelve months) at BRICS, as part of their PhD studies. Research positions: These positions are open to applicants already holding a PhD degree in computer science. Further information, including instructions on how to apply, can be found at: www.brics.dk/Positions and general information on BRICS at: www.brics.dk. (03-jan-01) _________________________________________________________________ McGill University Bell Canada Enterprises (BCE) Chairs in e-Commerce Applications are invited for up to three newly established Bell Canada Enterprises (BCE) Chairs in e-Commerce, with the possibility of an additional University funded junior Chair in this same domain. It is the wish of both BCE and McGill University that these Chairs should become a cornerstone of teaching and research on e-commerce at McGill University, in close cooperation with the "Laboratoires Universitaires Bell". One of these positions is expected to be in the field of Cryptography, Privacy and e-Cash, and will most likely be in the School of Computer Science and/or the Department of Mathematics. Candidates with some industrial experience are preferred, but with a strong background in cryptography and number theory, as well as some interest in the legal, economic, social issues relating to the field. For information and restrictions please see the McGill e-commerce web page http://nickd.vpa.mcgill.ca/e-commerce/ or contact Claudine@ums1.lan.mcgill.ca. (22-dec-00) _________________________________________________________________ Infineon Technologies Description of the position VHDL design, verification and synthesis of a Cryptocoprozessor for Security and Chipcard ICs Simulations of VHDL and full custom part of the coprocessor Analysis of the coprozessor (on silicon) Coordination of the design, verification and backend team Development as a specialist for hardware crypto modules for Security and Chipcard ICs Work place Munich, Germany Required profile Driving power to push the tasks in the projekt Teamplayer Work hard but have fun and bring in own ideas (never stop thinking) Education Master or PhD in Electrical Engineering or Computer Science Experience Circuit design: VDHL design and synthesis Basic knowledge in full custom design Preferable knowledge in Cryptographie, i.e.. RSA, elliptic curves, DES Preferable knowledge in chipcard design (area optimization, low power design, security design) Area of work Hardware development with emphasis on the implementation of cryptographic algorithms HomePage: www.infineon.de Contact: Please call Jean-Pierre Seifert, Infineon Security and Chipcard ICs, Phone: ++49 89-234-26938 or send an e-mail to jean-pierre.seifert@infineon.com . (15-dec-00) _________________________________________________________________ University of Bristol POSTDOCTORAL RESEARCH ASSISTANT IN PROCESSOR ARCHITECTURES FOR CRYPTOGRAPHIC OPERATIONS The Department of Computer Science of the University of Bristol has a 3 year post-doctoral research position available, funded by the EPSRC, to conduct research into hardware for implementing cryptographic protocols. Candidates should have a PhD, or be near completion of one, in either Computer Science, Mathematics, Electronic Engineering or some allied discipline. The successful applicant will be working with Prof. David May, FRS and Dr Nigel Smart. The applicant will be part of two of the main research themes of the department; namely Computer Architecture and Information Security. The department has a lively research culture and was rated grade 5A in the 1996 Research Assessment Exercise. The appointment, available as soon as the right candidate is found, will be on the RA1A Scale. Informal enquiries can be made to Dr. Nigel Smart via email nigel@cs.bris.ac.uk or phone (0117) 954 5163. Further details can be found on our website http://www.cs.bris.ac.uk/ Bristol University is an Equal Opportunity employer. (5-dec-00) _________________________________________________________________ Technical University Hamburg-Harburg [...] C4-professorship For Safety in Distributed Technical Systems as an endowment professorship (Kenn-Nr.: 2000-405) This professorship aims at providing a liable and trustworthy electronic business communication in global networks. Safe, coded transmission of authentic data is prerequisite here. The research area of "Safety in Distributed Technical Systems" shall be represented comprehensively and interdisciplinarily, prioritizing in theoretical and practical aspects of complex IT-systems and their demands on safety infrastructure. The bearer of this position should be approved in one or more of the following areas of teaching and research: * Safety models for communicating and cooperating systems * Safety infrastructures and safety architectures * Safety mechanisms, key management and public-key-infrastructures * Application of chip cards * Safety-sensitive applications * General set-up of standardization * Analysis of international law, comparison of international safety standards and liabilities. Within the teaching-framework, the professorship is supposed to take part in the study field of Computer Science Engineering; furthermore, we expect the future professor to participate in basic instructions of Mathematics and to play a vital role in set up and extension of interdisciplinary studies and in the international study areas of the TUHH. [...] Please submit your application, including all customary documents, under the above identification code until October 13th to: TUHH Technical University Hamburg-Harburg The Chairman Schwarzenbergstrasse 95, D-21073 Hamburg Phone: +49 (40) 42878-3002 (14-oct-00) _________________________________________________________________ GEMPLUS Gemplus, the worldwide leader in smart card technology and security solutions, has open R&D positions in Marseille (France), Singapore, Montreal, Dubai, Rome and Paris for both junior and senior experts in cryptography, information security and risk management. With high skills in mathematics, cryptography and/or computer science, you will join the fast growing Product Security Group (currently 60 researchers), and enjoy the dynamic and challenging environment of our applied research labs where publishing is encouraged. For more information visit http://www.gemplus.com or send an email to david.naccache@gemplus.com. (09-oct-00) _________________________________________________________________ The University of North Carolina at Charlotte The Department of Software and Information Systems at UNC Charlotte has an open faculty position in the area of applied cryptography. Applications at all professorial ranks will be considered. This faculty member will have the opportunity to consult for a major U.S. banking company head quartered in Charlotte. Qualifications for this position include: an earned Ph.D. degree, in-depth knowledge of cryptographic protocols and algorithms, well established research record, strong interests in teaching, and industrial experiences. Salary is highly competitive. For full considerations please send a detailed CV together with four references, published papers and other support material to: Professor Bill Chu (billchu@uncc.edu), College of Information Technology, University of North Carolina at Charlotte, 9201 University City Blvd., Charlotte, NC 28223. For more details, please visit www.coit.uncc.edu/hiring or email billchu@uncc.edu. (05-oct-00) ______________________________________________________________________________ IACR Calendar of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please send email to webmaster(at)iacr.org . 2001 * [1]ISOC 2001 Network and Distributed System Security (NDSS), February 7-9, San Diego, California, USA. * [2]International Workshop on Practice and Theory in Public Key Cryptography (PKC2001), February 13-15, Cheju Island, Korea. * [3]Financial Cryptography '01, February 19-22, Grand Cayman, Cayman Islands, BWI. * [4]Cryptography and Lattices Conference (CaLC 2001), March 29-30, Brown University, Providence, RI, USA. * [5]Fast Software Encryption Workshop (FSE2001), April 2-4, Yokohama, Japan. * [6]RSA Conference 2001, April 8-12, San Francisco, USA. * [7]Eurocrypt 2001, May 6-11, Innsbruck, Austria. * [8]Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001), May 13 - 16, Paris, France. * [9]4th International Information Hiding Workshop (IHW 2001) , April 25-27, Pittsburgh, USA. * [10]IEEE Symposium on Security and Privacy, May 13-16, Oakland, California, USA. * [11]14th IEEE Computer Security Foundations Workshop, June 11-13, Cape Breton, Nova Scotia, Canada. * [12]Mathematics of Public Key Cryptography, June 25-27, KIAS, Seoul, Korea. * [13]6th Australasian Conference on Information Security and Privacy (ACISP'01), July 2-4, Sydney, Australia. * [14]33rd Annual ACM Symposium on Theory of Computing (STOC), July 6-8, Crete, Greece. * [15]RSA Conference 2001 Asia, July 9-12, Singapore. * [16]Workshop on the Mathematical Foundations of Coding Theory and Cryptology, July 16-20, National University of Singapore, Singapore. * [17]Eighth Annual Workshop on Selected Areas in Cryptography (SAC 2001), August 16-17, Toronto, Canada. * [18]Crypto 2001, August 19-23, Santa Barbara, California, USA. * [19]20th Symposium on Principles of Distributed Computing (PODC 2001), August 26-29, Newport, Rhode Island, USA. * [20]5th Workshop on Elliptic Curve Cryptography (ECC 2001), September 17-19, Waterloo, Canada. * [21]Information Security Solutions Europe (ISSE 2001), September 26-28, London, UK. * [22]International Workshop on Cryptology and Network Security, September 26-28, Tamkang University, Taipei, Taiwan. * [23]Information Security Conference 2001, October 1-3, Malaga, Spain. * [24]42nd Annual Symposium on Foundations of Computer Science (FOCS 2001), October 14-17, Las Vegas, USA. * [25]RSA Conference 2001 Europe, October 15-18, Amsterdam, Netherlands. * [26]Eighth ACM Conference on Computer and Communications Security, 6-8 November, Philadelphia, Pennsylvania, USA. * [27]Third International Conference on Information and Communications Security (ICICS), November 13-16, Xian, China. * [28]Asiacrypt 2001, December 9-13, Gold Coast, Queensland, Australia. * [29]Second International Conference on Cryptology in India (Indocrypt 2001), December 16-20, Madras, Chennai, India. 2002 * Eurocrypt 2002, (tentatively: May), Amsterdam, The Netherlands. * Crypto 2002, (tentatively: late August), Santa Barbara, California, USA. * Asiacrypt 2002, (tentatively: December 1-5), Queenstown, New Zealand. References 1. http://www.isoc.org/ndss2001/ 2. http://caislab.icu.ac.kr/pkc01/ 3. http://fc01.ai/ 4. http://www.math.brown.edu/~jhs/CALC/CALC.html 5. http://www.venus.dti.ne.jp/~matsui/FSE2001/ 6. http://www.rsaconference.com/rsa2001 7. http://www.ec2001.ocg.at/ 8. http://www.chesworkshop.org/ 9. http://chacs.nrl.navy.mil/IHW2001/ 10. http://www.ieee-security.org/TC/sp2001.html 11. http://www2.csl.sri.com/csfw/csfw14/ 12. http://www.kias.re.kr/ 13. http://www.cit.uws.edu.au/~acisp01/ 14. http://sigact.acm.org/stoc01/ 15. http://www.rsaconference.com/rsa2001/asia/ 16. http://www.ims.nus.edu.sg/programs/coding.html 17. http://lasecwww.epfl.ch/sac2001/ 18. http://www.iacr.org/conferences/c2001/ 19. http://www.podc.org/podc2001/ 20. http://www.iacr.org/events/pages/ecc01.txt 21. http://www.eema.org/isse/ 22. http://cs.anu.edu.au/~Chuan.Wu/conference/cns01_cfp.html 23. http://www.isconference.org/ 24. http://theory.stanford.edu/focs2001/ 25. http://www.rsaconference.com/rsa2001/europe/ 26. http://www.bell-labs.com/user/reiter/ccs8/ 27. http://homex.coolconnect.com/member2/icisa/icics2001.html 28. http://www.isrc.qut.edu.au/asiacrypt/ 29. http://www.cs.iitm.ernet.in/indocrypt/ 30. http://www.iacr.org/events/archive.html 31. http://www.cs.utah.edu/flux/cipher/cipher-hypercalendar.html 32. http://www.cs.vt.edu/~theoryc/ 33. http://www.dice.ucl.ac.be/crypto/call_for_papers.html 34. http://www.cl.cam.ac.uk/users/bc201/security/conf.html 35. http://www.acm.org/events/ 36. http://www.ieee.org/conferences/tag/ 37. http://www.iacr.org/index.html 38. http://www.iacr.org/copyright.html ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (2001) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. Officers Kevin S. McCurley Andrew J. Clark President Vice President 6721 Tannahill Drive P.O. Box 743 San Jose, CA 95120 Brighton USA East Sussex Tel: +1 408 927 1838 BN1 5HS Email: [president(at)iacr.org] United Kingdom Tel: +44 1273 270752 Fax: +44 1273 276558 Email: [vicepresident(at)iacr.org] Josh Benaloh Susan Langford Secretary Treasurer Microsoft Research Certicom One Microsoft Way 25801 Industrial Blvd Redmond, WA 98052 Hayward, CA 94545 USA USA Tel: +1 425 703 3871 Tel: +1 510 780 5422 Fax: +1 425 936 7329 Fax: +1 510 780 5401 Email: [secretary(at)iacr.org] Email: [treasurer(at)iacr.org] Directors Dave Balenson Don Beaver Crypto 2001 General Chair Membership Secretary Technical Outreach and Special Certco Inc. Projects 55 Broad Street, 22nd Floor NAI Labs New York, NY 10004 The Security Research Division USA of Network Associates, Inc. Tel: +1 212 709 8900 3060 Washington Road Fax: +1 212 709 6754 Glenwood, MD 21738 USA Email: beaverd(at)certco.com Email: david_balenson(at)nai.com Tel: +1 443 259 2358 Fax: +1 301 854 4731 Thomas Berson Eli Biham Anagram Labs Computer Science Department P.O. Box 791 Technion Palo Alto CA, 94301 Haifa 32000 USA Israel Tel: +1 650 324 0100 Email: [biham(at)cs.technion.ac.il] Email: [berson(at)anagram.com] Tel: +972 4 8294308 Fax: +972 4 8294308 Christian Cachin Ed Dawson Editor, IACR Newsletter Asiacrypt 2001 General Chair IBM Zurich Research Laboratory Information Security Research Centre Säumerstrasse 4 Queensland University of Technology CH-8803 Rüschlikon GPO Box 2434 Switzerland 3060 Washington Road Tel: +41 1 724 8989 Brisbane, Qld 4001, Australia Fax: +41 1 724 8953 Tel: +61 7 3864 1919 Email: [cachin(at)acm.org] Fax: +61 7 3221 2384 Email: dawson(at)fit.qut.edu.au Yvo Desmedt Whitfield Diffie Department of Computer Science Sun Microsystems, MPK15-214 Florida State University 901 San Antonio Road PO Box 4530, 206 Love Building Palo Alto, California 94303 Tallahassee, FL 32306-4530 Tel: +1 650 786 6359 USA Fax: +1 650 786 6445 Tel: +1 850 644 9298 Email: Fax: +1 850 644 0058 [whitfield.diffie(at)eng.sun.com] Email: desmedt(at)nu.cs.fsu.edu Joan Feigenbaum Kwangjo Kim Editor-in-Chief, Journal of School of Engineering Cryptology Information and Communications Univ. Department of Computer Science 58-4 Hwaam-dong Yusong-ku Yale University Taejon, 305-348 P. O. Box 208285 KOREA New Haven, CT 06520-8285 Tel: +82 42 866 6118 USA Fax: +82 42 866 6154 Email: Email: [kkj (at) icu.ac.kr] joan.feigenbaum(at)yale.edu or [jofc(at)iacr.org] Tel: +1 203 432 6432 Fax: +1 203 432 0593 Lars Knudsen Peter Landrock University of Bergen Mathematics Institute Dept. of Informatics Aarhus University Hightechcenter Ny Munkegade N-5020 Bergen 8000 Aarhus C NORWAY Denmark Tel: +47 55 58 41 57 Email: Fax: +47 55 58 41 99 [landrock(at)cryptomathic.aau.dk] Email: Lars.Knudsen(at)ii.uib.no Ueli Maurer Bart Preneel Department of Computer Science Department of Electrical Engineering ETH Zürich Katholieke Universiteit Leuven CH-8092 Zürich Kardinaal Mercierlaan 94 Switzerland B-3001 Heverlee Email: [maurer(at)inf.ethz.ch] BELGIUM Tel-1: +41 1 632 7420 Email: Tel-2: +41 1 632 7371 [bart.preneel(at)esat.kuleuven.ac.be] Fax: +41 1 632 1172 Tel: +32 16 32 11 48 Fax: +32 16 32 19 86 Reinhard Posch Eurocrypt 2001 General Chair Hank Wolfe Scientific Director AsiaCrypt 2002 General Chair Secure Information Technology Information Science Department Center - AUSTRIA School of Business Inffeldgasse 16a University of Otago A-8010 GRAZ P.O. Box 56 AUSTRIA Dunedin, New Zealand Tel: +43 316 873 5510 Tel: +64 3 479-8141 Fax: +43 316 873 5520 Fax: +64 3 479-8311 Email: Email: hwolfe(at)commerce.otago.ac.nz Reinhard.Posch(at)iaik.at Rebecca Wright Crypto 2002 General Chair AT&T Labs Research Room A213 P.O. Box 971 180 Park Avenue Florham Park, NJ 07932-0971 USA Tel: +1 973 360 8346 Fax: +1 973 360 8970 Email: rwright(at)research.att.com ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org . Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For calls for papers, please submit a one page ASCII version. Send your contributions to newsletter(at)iacr.org Deadline for submissions to the next newsletter issue is May 31, 2001. However, many items will be posted on the website as soon as possible. The IACR Newsletter is copyright (c) 2001, International Association for Cryptologic Research. ______________________________________________________________________________ End of IACR Newsletter, Vol. 18, No. 1, Winter 2001. ______________________________________________________________________________