______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter The newsletter of the International Association for Cryptologic Research. Vol. 21, No. 2, Summer 2004. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * IACR 2004 Elections: Announcement and Nominations * First IACR Fellows' Celebration * CD-ROM of IACR Conference Proceedings 1998-2003 * Crypto 2004: Online registration coming soon! (Early registration deadline: July 16) * Eurocrypt 2004 Wrap-up: Presentations, Rump Session, Fotos * ECRYPT - European Network of Excellence for Cryptology * Announcements + Workshop on Secure Multiparty Protocols (SMP 2004) + SASC - The State of the Art of Stream Ciphers + Workshop on Provable Security + Compsec 2004: building business security - New rules; New threats: Game on... * New reports in the Cryptology ePrint Archive * Open positions * Calendar of events in cryptology * IACR contact information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the 18th electronic issue of the IACR Newsletter! http://www.iacr.org/newsletter/v21n2/4fellows.jpg This dynamic group of cryptographers are four of the six first IACR Fellows, designated in 2004, at Eurocrypt in Interlaken. From left: Adi Shamir, Tom Berson, Whit Diffie, and Don Coppersmith; Ron Rivest and David Chaum couldn't join the celebration. More pictures from Eurocrypt are available here. In this newsletter issue, you'll find information about ECRYPT, a European Network of Excellence for Cryptology, sponsored by the European Commission's Sixth Framework Programme (FP6). Many European IACR members take an active role in ECRYPT; you are invited to attend several workshops and schools organized by the Network, see the announcements section. The year 2004 is important for IACR also because of the upcoming IACR elections; the posts of four officers and three directors will be filled. Moreover, your Newsletter editor also intends to resign after about 6 years of service in order make way for new talents in IACR. If you are interested in taking up some responsibility for your IACR, then you should talk to Andy Clark, IACR president, or any other member of the board. Please send your contributions to the Newsletter to newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in October 2004. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ IACR 2004 Elections: Announcement and Nominations ______________________________________________________________________________ The election committee consists of: James Hughes - Chair Jean-Jacques Quisquater - Returns Ed Dawson Positions to be filled at this election (starting 1-Jan-2005): POSITION TERM CURRENTLY President 3 Years Andrew Clark Vice President 3 Years Bart Preneel Secretary 3 Years Josh Benaloh Treasurer 3 Years Susan Langford Director 3 Years Eli Biham Director 3 Years Tsutomu Matsumoto Director 3 Years Kevin S. McCurley Nominators and nominees must be regular members of IACR. Any IACR member can nominate another regular member and all nominations must be made in writing to the election chairperson. Please download and fill in the nomination form. * http://www.iacr.org/elections/2004/nom_form.pdf Nominations forms must be received by mail or fax by September 12, 2004 at the address below. Receipt will be acknowledged by email within two working days (before the deadline). It is the responsibility of the candidates to ensure the nominations and statements are received! If you have any questions please contact the election chairperson. Election Chair James Hughes Storage Technology Corporation 7600 Boone Ave No. Minneapolis, MN, 55428 USA Fax: +1 612 677 3007 Email: James_Hughes@StorageTek.com Ballots will be mailed by October 1. Ballots must be mailed to be received by the Returning Officer in the official envelopes by NOVEMBER 15, 2004. ______________________________________________________________________________ 2004 IACR Fellows ______________________________________________________________________________ * Tom Berson * David Chaum * Don Coppersmith * Whitfield Diffie * Ron Rivest * Adi Shamir Four of them were present at Eurocrypt 2004 in Interlaken/Switzerland for the celebration: http://www.iacr.org/fellows/2004/92970023.JPG More pictures are available at the Eurocrypt 2004 web site at http://www.zurich.ibm.com/eurocrypt2004/fotos/banquet/index3.html ______________________________________________________________________________ CD-ROM of IACR Conference Proceedings 1998-2003 ______________________________________________________________________________ Together with the printed proceedings, the attendees of a Eurocrypt, Crypto or Asiacrypt conference in 2004 receive a CD-ROM containing the electronic versions of the IACR conference proceedings from 1998 until 2003. The CD-ROM included the proceedings of Eurocrypt 1998-2003 Crypto 1998-2003 Asiacrypt 1998-2003 FSE 1998-2003 PKC 1998-2003 This CD-ROM is only available from IACR, and not from Springer-Verlag. Currently, we have a few extra copies of the Eurocrypt 2004 proceedings including the CD-ROM available that we sell to IACR members or others who are not attending any of the conferences in 2004. For details, please contact eurocrypt2004(at)zurich.ibm.com. (The Eurocrypt 2004 proceedings available from Springer-Verlag and in books stores does not include the CD-ROM.) ______________________________________________________________________________ Eurocrypt 2004 Wrap-up ______________________________________________________________________________ The program of the rump session at Eurocrypt 2004 is available at http://www.zurich.ibm.com/eurocrypt2004/rump.html Many presentations from the regular program are also available from http://www.zurich.ibm.com/eurocrypt2004/program.html And, last but not least, some fotos are available from the banquet and from the rump session at http://www.zurich.ibm.com/eurocrypt2004/ -- Jan Camenisch & Christian Cachin ______________________________________________________________________________ ECRYPT - European Network of Excellence for Cryptology ______________________________________________________________________________ http://www.ecrypt.eu.org/ ECRYPT - European Network of Excellence for Cryptology is a 4-year network of excellence funded within the [2]Information Societies Technology (IST) Programme of the European Commission's [3]Sixth Framework Programme (FP6) under contract number IST-2002-507932. It falls under the action line Towards a global dependability and security framework. ECRYPT was launched on February 1st, 2004. Its objective is to intensify the collaboration of European researchers in information security, and more in particular in cryptology and digital watermarking. The activities of the ECRYPT Network of Excellence will be organized into five virtual laboratories established as follows: 1. Symmetric techniques virtual lab (STVL) 2. Asymmetric techniques virtual lab (AZTEC) 3. Protocols virtual lab (PROVILAB) 4. Secure and efficient implementations virtual lab (VAMPIRE), and 5. Watermarking and perceptual hashing virtual lab (WAVILA). ECRYPT activities: * Summer schools and workshops * Exchanges of researchers, outside visitors * Common publications, integration of tools * Input to standardization bodies and other dissemination activities. * Jointly executed targeted research, within ECRYPT's virtual labs Calendar of Open (Public) Workshops and Schools organized by ECRYPT: * [4]Workshop on Secure Multiparty Protocols (SMP 2004), Amsterdam, Netherlands, 7-8 October 2004. * [5]Workshop on Provable Security, Versailles, France, 3-5 November 2004. * [6]State of the Art of Stream Ciphers (SASC), October 14-15, Brugge, Belgium. * Workshop on Stream Ciphers, Bruges, Belgium, 14-15 October 2004. * School on Elliptic Curve Cryptography, Autumn 2004. * Workshop on Watermarking, Winter 2005. * School on Algorithm Crptanalysis, Spring 2005. * Workshop on Lightweight Cryptography, Summer 2005. * School on Unconditionally Secure Protocols, Summer 2005. * Workshop on Special-Purpose Hardware, Summer 2005. References 1. http://www.ecrypt.eu.org/ 2. http://www.cordis.lu/ist/ 3. http://www.cordis.lu/fp6/ 4. http://www.zurich.ibm.com/~cca/smp2004/ 5. http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Provable_Security.html 6. http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html ______________________________________________________________________________ Announcements ______________________________________________________________________________ ** Workshop on Secure Multiparty Protocols (SMP 2004) WORKSHOP ON SECURE MULTIPARTY PROTOCOLS (SMP 2004) Announcement and Call for Contributions October 7-8, 2004, Amsterdam, The Netherlands http://www.zurich.ibm.com/~cca/smp2004/ The workshop is organized by ECRYPT, the European Network of Excellence in Cryptology, and in connection with DISC 2004, the 18th Annual Conference on Distributed Computing, which takes place October 5-7, in Amsterdam. (The program of October 7 will be partially joint with DISC, and held at the same venue.) The workshop is an activity of ECRYPT's PROVILAB, the virtual lab on cryptographic protocols. SCOPE Cryptographic protocols play an important role for building secure distributed systems. Such protocols involve the interaction of several agents with potentially conflicting security goals. Protocols involving only two agents, such as establishing a secure point-to-point channel, are used widely today. However, protocols for jointly executed tasks among multiple distrusting agents are not frequently used because they are more difficult to define and even harder to construct. The goal of a multiparty protocol can be of technical nature, such as synchronization of distributed state information, carrying out a distributed computation, or transferring digitally signed credentials anonymously. But it can also consist of an application itself, such as a secure payment system, privacy-preserving data access, electronic voting, secure auctions, and contract bidding. Secure protocols must reach their goals despite attacks from agents who participate in the protocol. The aim of this workshop is to bring together researchers and practitioners from the cryptography and distributed computing areas, from academia and industry, who are working on secure multiparty protocols for distributed systems, in order to engage in a discussion about common goals and important research problems in the overlap of the areas. Topics include, but are not limited to: * secure group communication * distributed cryptosystems * threshold cryptography * secure multiparty computation * anonymity-preserving protocols * protocols supporting private data access * secure payment schemes * secure peer-to-peer systems * privacy-preserving protocols for auctions and bidding FORMAT The workshop will consist of invited keynote presentations and contributed presentations. There will be no proceedings, but a handout with abstracts will be provided to all participants. KEYNOTE SPEAKERS Juan Garay (Bell Labs - Lucent Technologies) Dahlia Malkhi (The Hebrew University of Jerusalem) Keith Marzullo (University of California, San Diego) Gene Tsudik (University of California, Irvine) Moti Yung (Columbia University) CONTRIBUTIONS To contribute a presentation, please submit an extended abstract summarizing a technical contribution or a position paper summarizing your research. Contributions will be selected by the expected interest in the topic and the potential for stimulating exchange of ideas among the participants. A submission must be a PDF file of at most 4 (four) pages, in letter- or A4-format, using at least 10pt fonts and no non-standard character sets. Submissions must be sent as an attachment by email to cca+smp2004(at)zurich.ibm.com and will be acknowledged within one working day after receiving. All submissions must be received before or on July 12, 2004, and notification of acceptance will be sent by August 10, 2004. Contributions deviating from these guidelines will not be considered. PROGRAM COMMITTEE Lorenzo Alvisi (University of Texas, Austin, USA) Christian Cachin (IBM Zurich Research Laboratory, Switzerland), chair Ronald Cramer (Aarhus University and BRICS, Denmark) Giuseppe Persiano (Università di Salerno, Italy) STIPENDS A limited number of stipends are available to participants from non-ECRYPT institutions to participate in the workshop. Requests for stipends should be sent to cca+smp2004(at)zurich.ibm.com before September 10, 2004. ** SASC - The State of the Art of Stream Ciphers Special Workshop to be hosted by the ECRYPT Network of Excellence SASC - The State of the Art of Stream Ciphers October 14-15, 2004 Brugge, Belgium Call for Participation http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html The cryptographic community is well served by a variety of efficient and trusted block ciphers. Yet there remains only a limited selection of trusted, non-proprietary, and royalty-free stream ciphers. SASC is a special workshop that aims to provide a more complete understanding of the current state of stream cipher design and analysis. Sponsored by the ECRYPT Network of Excellence (http://www.ecrypt.eu.org) SASC will consider the current state of stream cipher knowledge. In particular it is hoped to expose new and existing stream cipher proposals, cryptanalytic tools, and design criteria to the wider attention of the cryptographic community. As a workshop and forum for the exchange of ideas and proposals, active participation at SASC is encouraged. Attendees are invited to submit papers on all aspects of stream ciphers including, but not limited to the following: * stream cipher analysis, * stream cipher implementation, * stream cipher deployment, * stream cipher building blocks, and * new stream cipher proposals (accompanied by appropriate security claims and analysis). We also encourage submissions that question or comment upon: * the need for, and desirability of, trusted stream ciphers, and * the requirements of industry. To avoid submissions to SASC from conflicting with submissions to forthcoming conferences with proceedings, SASC will have no formal proceedings though there will be a workshop record. Subject to the approval of the submitter, new algorithms proposed at SASC will be included in the ECRYPT Stream Cipher Lounge. Details of the program committee, submission procedures, and workshop logistics will become available via http://www.isg.rhul.ac.uk/research/projects/ecrypt/stvl.html. Important Dates Submission Dealine: September 3, 2004 Notification and Program Confirmation: September 24, 2004 Workshop: October 14-15, 2004 ** Workshop on Provable Security WORKSHOP ON PROVABLE SECURITY Announcement and Call for Contributions November 3-5, 2004, INRIA, Versailles, Paris. http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Pro vable_Security.html The European Union has funded a Network of Excellence in Cryptology, bringing together the leading research groups in cryptography in the European Union, and associated states. This Network, named eCrypt, will be hosting a series of workshops over the coming years and one of the first of these will be on the topic of provable security. This workshop is organized by the Aztec Vitual Lab of the Ecrypt Network of Excellence in cooperation with ENS, INRIA and the University of Bristol. SCOPE This workshop will consist of a number of invited talks plus some contributed talks. It will concentrate on all aspects of provable security, including recent new advances and aspects of future developments. The workshop is timed to occur just before the meeting in Luminy in November, and we hope that participants at Luminy would also attend this workshop. The aim of this workshop is to bring together researchers and practitioners from from academia and industry who are working on provable security of cryptographic protocols, in order to engage in a discussion about common goals and important research problems in the overlap of the areas. Topics include, but are not limited to: * Encryption schemes * Signature schemes * Key agreement protocols * Authentication mechanisms * Foundational and definitional work * Proof techniques FORMAT The workshop will consist of invited keynote presentations and contributed presentations. There will be no proceedings, but a handout with abstracts will be provided to all participants. KEYNOTE SPEAKERS Ronald Cramer, Leiden University Alex Dent, Royal Holloway College, University of London Shai Halevi, IBM, TJ Watson Research Center Tatsuaki Okamoto, NTT Research Laboratories David Pointcheval, ENS Paris Moti Yung, Columbia University CONTRIBUTIONS We invite others to contribute talks by sending a two paragraph abstract of what you wish to talk about to [2]Nigel Smart. Talks will be selected on the basis of trying to create a balanced program covering all aspects of provable security. Whilst every effort will be made to accomodate all people wishing to talk there are only a limited number of slots available. If you simply wish to attend this workshop then further details will be made available in the coming months on this web site All submissions must be received before or on August 1st, 2004, and notification of acceptance will be sent by August 30th, 2004. PROGRAM COMMITTEE Jan Camenisch, IBM (Switzerland) Dario Catalano, ENS Paris (France) Ronald Cramer, Leiden University (Netherlands) Phong Nguyen, ENS Paris (France) Nicolas Sendrier, INRIA (France) Nigel Smart, Uni Bristol (UK) STIPENDS A limited number of stipends are available to participants from non-ECRYPT institutions to participate in the workshop. Requests for stipends should be sent to dario.catalano (at) ens.fr before September 10, 2004. ** Compsec 2004: building business security - New rules; New threats: Game on... First Announcement - Compsec 2004: building business security - New rules; New threats: Game on... 14-15 October 2004 Queen Elizabeth II Conference Centre, London, UK Now in its 21st year, Compsec 2004 investigates the current status of the industry from a user's perspective. A specialised programme of talks by leading practitioners, distinguished researchers and thinkers and major suppliers offers a practical guide to action on current and upcoming threats. Compsec 2004 addresses the political and practical contexts of information security, as well as analysing leading-edge technical issues. Conference highlights include: - Governance - Emerging threats - What business wants from suppliers - Building a business case for infosecurity investment - Trends in corporate cyber crime - Hardware-based security Expert speakers include: - Gene Spafford, Purdue University - Stuart Brocklehurst, SVP Payments Development Visa - Jean Pierre Mean, European Bank for Reconstruction and Development - Brian Collins, Cranfield University - Bill Cheswick, Lumeta - David Aucsmith, Microsoft - Paul Woods, UBS - Robin Mansell, LSE - David Naccache, Gemplus - Ross Anderson, University of Cambridge To register at the early bird rate go to: www.compsec2004.com/register.htm or contact the Conference Secretariat at compsec2004@elsevier.com To receive regular e-mail updates on Compsec 2004 go to: http://www.compsec2004.com/reply.htm Further information can be found at www.compsec2004.com ______________________________________________________________________________ New Reports in the Cryptology ePrint Archive ______________________________________________________________________________ (The list contains reports posted since the last newsletter issue appeared.) 2004/143 ( PS PS.GZ PDF ) Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash Nicolas T. Courtois 2004/142 ( PDF ) A New Signcryption Scheme and its Threshold Protocol Yiliang Han and Guangming Wu and Xiaoyuan Yang 2004/141 ( PS PS.GZ PDF ) Elastic AES Debra L. Cook and Moti Yung and Angelos D. Keromytis 2004/140 ( PDF ) Hardware Implementation of the 64-bit MISTY1 Block Cipher Paris Kitsos 2004/139 ( PS PS.GZ PDF ) New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran and Amit Sahai 2004/138 ( PS PS.GZ PDF ) How to Disembed a Program? Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval 2004/137 ( PDF ) New GF(2n) Parallel Multiplier Using Redundant Representation Haining Fan 2004/136 ( PDF ) A Protocol for Countering Online Dictionary Attacks Vipul Goyal and Virendra Kumar and Mayank Singh 2004/135 ( PDF ) More Efficient Server Assisted One Time Signatures Vipul Goyal 2004/134 ( PDF ) Secure and Efficient Masking of AES - A Mission Impossible? Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller 2004/133 ( PS PS.GZ PDF ) Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik 2004/132 ( PS PS.GZ PDF ) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography R. Granger, D. Page and M. Stam 2004/131 ( PS PS.GZ PDF ) A New ID-based Signature with Batch Verification Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon 2004/130 ( PS PS.GZ PDF ) Private Inference Control David Woodruff and Jessica Staddon 2004/129 ( PS PS.GZ PDF ) Generalizing Kedlaya's order counting based on Miura Theory Joe Suzuki 2004/128 ( PS PS.GZ PDF ) Elastic Block Ciphers Debra L. Cook and Moti Yung and Angelos D. Keromytis 2004/127 ( PS PS.GZ PDF ) DDH-based Group Key Agreement for Mobile Computing Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won 2004/126 ( PS PS.GZ ) Two Software Normal Basis Multiplication Algorithms for GF(2n) Haining Fan and Yiqi Dai 2004/125 ( PS PS.GZ PDF ) EME*: extending EME to handle arbitrary-length messages with associated data Shai Halevi 2004/124 ( PS PS.GZ ) Universally Composable DKG with Linear Number of Exponentiations Douglas Wikström 2004/123 ( PS PS.GZ PDF ) On security of XTR public key cryptosystems against Side Channel Attacks Dong-Guk Han and Jongin Lim and Kouichi Sakurai 2004/122 ( PS PS.GZ PDF ) A New Two-Party Identity-Based Authenticated Key Agreement Noel McCullagh and Paulo S. L. M. Barreto 2004/121 ( PS PS.GZ PDF ) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings Tsz Hon Yuen and Victor K. Wei 2004/120 ( PS PS.GZ PDF ) One-Way IND-CNA Key Setup - a Step Towards Provably Secure Symmetric Encryption Bartosz Zoltak 2004/119 ( PS PS.GZ PDF ) Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography Masayuki Abe and Serge Fehr 2004/118 ( PS PS.GZ PDF ) Fast addition on non-hyperelliptic genus $3$ curves Stéphane Flon and Roger Oyono and Christophe Ritzenthaler 2004/117 ( PS PS.GZ PDF ) Efficient and Forward-Secure Identity-Based Signcryption Noel McCullagh and Paulo S. L. M. Barreto 2004/116 ( PS PS.GZ PDF ) On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions Ran Canetti and Eyal Kushilevitz and Yehuda Lindell 2004/115 ( PS PS.GZ PDF ) Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won 2004/114 ( PS PS.GZ ) Improved Identity-Based Signcryption Liqun Chen and John Malone-Lee 2004/113 ( PS PS.GZ PDF ) On the Security and Composability of the One Time Pad Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade 2004/112 ( PDF ) Relation between XL algorithm and Groebner Bases Algorithms M. Sugita and M. Kawazoe and H. Imai 2004/111 ( PS PS.GZ PDF ) The Vulnerability of SSL to Chosen Plaintext Attack Gregory V. Bard 2004/110 ( PDF ) Designing Against the `Overdefined System of Equations' Attack Carlisle Adams 2004/109 ( PDF ) Concealing Complex Policies with Hidden Credentials Robert Bradshaw and Jason Holt and Kent Seamons 2004/108 ( PS PS.GZ PDF ) Two Improved Partially Blind Signature Schemes from Bilinear Pairings Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow 2004/107 ( PS PS.GZ PDF ) Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic Bertrand BYRAMJEE and Sylvain DUQUESNE 2004/106 ( PDF ) Capacity and Examples of Template Protecting Biometric Authentication Systems P. Tuyls and J. Goseling 2004/105 ( PS PS.GZ PDF ) Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti 2004/104 ( PS PS.GZ PDF ) A Trapdoor-free and Efficient Group Signature Scheme from Bilinear Pairings Lan Nguyen 2004/103 ( PS PS.GZ PDF ) Cryptanalysis of SFlash v3 Jintai Ding and Dieter Schmidt 2004/102 ( PS PS.GZ PDF ) The Exact Security of an Identity Based Signature and its Applications Benoît Libert and Jean-Jacques Quisquater 2004/101 ( PS PS.GZ PDF ) Provably Secure Masking of AES Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel 2004/100 ( PDF ) The Sorcerers Apprentice Guide to Fault Attacks Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan 2004/099 ( PS PS.GZ ) Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro and Hugo Krawczyk and Tal Rabin 2004/098 ( PS PS.GZ PDF ) Attacking a Public Key Cryptosystem Based on Tree Replacement María Isabel González Vasco and David Pérez García 2004/097 ( PDF ) How To Re-initialize a Hash Chain Vipul Goyal 2004/096 ( -- withdrawn -- ) On the Ambiguity of Concurrent Signatures Yi Mu and Fangguo Zhang and Willy Susilo 2004/095 ( PS PS.GZ PDF ) GNFS Factoring Statistics of RSA-100, 110, ..., 150 Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda 2004/094 ( PS PS.GZ PDF ) Block Ciphers and Stream Ciphers: The State of the Art Alex Biryukov 2004/093 ( PS PS.GZ PDF ) A Provably Secure Nyberg-Rueppel Signature Variant with Applications Giuseppe Ateniese and Breno de Medeiros 2004/092 ( PS PS.GZ PDF ) A New Stream Cipher HC-256 Hongjun Wu 2004/091 ( PDF ) Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun and Maithili Narasimha and Gene Tsudik 2004/090 ( PS PS.GZ PDF ) Provably Secure Authenticated Tree Based Group Key Agreement Protocol Ratna Dutta and Rana Barua and and Palash Sarkar 2004/089 ( PS PS.GZ PDF ) Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance Mahalingam Ramkumar and Nasir Memon 2004/088 ( -- withdrawn -- ) Efficient Batch Verification of Signature Schemes based on Bilinear Maps Noel McCullagh 2004/087 ( PS PS.GZ PDF ) Using primitive subgroups to do more with fewer bits K. Rubin and A. Silverberg 2004/086 ( PDF ) Fuzzy Identity Based Encryption Amit Sahai and Brent R. Waters 2004/085 ( PDF ) The CS2 Block Cipher Tom St Denis 2004/084 ( PDF ) Evaluating elliptic curve based KEMs in the light of pairings David Galindo and Sebastia Martin and Jorge L. Villar 2004/083 ( PDF ) Scan Based Side Channel Attack on Data Encryption Standard Bo Yang and Kaijie Wu and Ramesh Karri 2004/082 ( PS PS.GZ ) Secure Asynchronous Reactive Systems Michael Backes and Birgit Pfitzmann and Michael Waidner 2004/081 ( PDF ) Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers Philip Hawkes and Gregory G. Rose 2004/080 ( PDF ) HENKOS STREAM CIPHER Marius Oliver Gheorghita and Dominic Bucerzan 2004/079 ( PS PS.GZ PDF ) Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng and Luminita Vasiu and Richard Comley 2004/078 ( PS PS.GZ PDF ) Analysis of the WinZip encryption method Tadayoshi Kohno 2004/077 ( PS PS.GZ PDF ) Foundations of Group Signatures: The Case of Dynamic Groups Mihir Bellare and Haixia Shi and Chong Zhang 2004/076 ( PS PS.GZ PDF ) Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders Aggelos Kiayias and Moti Yung 2004/075 ( PDF ) An Hybrid Mode of Operation Alexis W. Machado ______________________________________________________________________________ Open Positions in Cryptology ______________________________________________________________________________ IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at [1]http://www.iacr.org/jobs/ and also included in the [2]IACR Newsletter that is sent to members three times per year. To advertise your job opportunities, please send a description of no more than 150 words in plain ASCII text by email to jobs(at)iacr.org. This should include an URL and further contact information. No attachments or word documents, please! (Submissions in other formats than text will not be posted.) As this is intended to be a service to the members of IACR, it is free for all members. We ask that commercial enterprises who want to advertise their openings identify at least one of their employees who is a member of IACR. (IACR does not know corporate membership.) Please contact the membership secretariat to [3]become a member of IACR. On top of that, IACR accepts donations and is always looking for sponsors for its conferences. _________________________________________________________________ ROYAL HOLLOWAY, UNIVERSITY OF LONDON, U.K. Royal Holloway is seeking to appoint a Professor of Information Security to its Information Security Group. The Information Security Group is one of the largest academic security groups in the world and undertakes teaching, research and commercial activities in Information Security. Candidates should have an outstanding record of achievement and leadership in some area of Information Security. The successful candidate is expected to undertake a full role within the Information Security Group. Further information about the Information Security Group is available at http://www.isg.rhul.ac.uk. Informal enquiries can be made to Professor Fred Piper (+44 (0) 1784 443098) f.piper@rhul.ac.uk or Professor Chris Mitchell (+44 (0) 1784 443423) c.mitchell@rhul.ac.uk . Further information about the position is available at http://www.rhul.ac.uk/Personnel/ads/isg589.html (14-Jun-04) _________________________________________________________________ Saarland University, Saarbruecken http://www.uni-saarland.de/mediadb/organisation/Verwaltung/Referate/Ref2 /Personal/Stellenangebote/2004/Mai_2004/U17.pdf SAARLAND UNIVERSITY, SAARBRUECKEN, GERMANY. The Department of Mathematics and Computer Sciences invites applications for three tenured Associate Professor (C3) positions. We seek outstanding applicants in the following areas of Computer Science: Networking, Distributed Systems, Database Systems, Computer Architecture, Operating Systems, Security, Complexity Theory, Vision/Robotics or Hybrid Systems. Saarland University has one of Germany's leading computer science departments, with close ties to Germany's only Max-Planck Institute for Computer Science (MPI) and the German Center for Artificial Intelligence (DFKI), all located on campus. A DFG graduate school (Graduiertenkolleg) promotes young scientific talents; the DFG AVACS project researches verification and analysis of complex systems. Commitment and cooperation are welcome. Saarbrücken is located at the heart of Europe, near to Paris, Heidelberg and Cologne and close to Germany's borders to France and Luxembourg, strongly influenced by French savoir-vivre. A substantial number of new companies and jobs have been created in recent years, facilitated by Saarland University's Start-up Center and the new Science Park. Entrepreneurial activities by students and faculty members are expressively encouraged and supported. Additional information may be found on the website http://www.cs.uni-sb.de/?lang=en Applicants should hold a Ph.D. in Computer Science or in a closely related field. Courses at the M.Sc. and Ph.D. level are predominantly taught in English. Saarland University is strongly involved in gender balance activities and wishes to increase the share of female scientific staff. For candidates with equal qualification, preference will be given to female candidates. Applicants should submit a letter of application, official transcripts, CV, a list of publications in chronological order as well as three copies of their three most important publications to the chair of the faculty of mathematics and computer science, Prof. Dr. Jörg Eschmeier, Saarland University, Postfach 151150, 66041 Saarbruecken, Germany. Also send PDF copies of your material to sekr.fakultaet6@mx.uni-saarland.de . (xx-Xxx-04) _________________________________________________________________ University of Bristol We are currently looking for three new people..... Lecturers in Computer Science (ref. 10284) Department of Computer Science Working in the Department of Computer Science, you will have a proven research record or show excellent research promise. You will be expected to contribute to the research of the department, to teach undergraduate courses and to supervise PhD students and postdoctoral workers. We have a lively research culture with current interests in Digital Media, Cryptography and Security, Languages and Architecture, Machine Learning, Mobile and Wearable Computing, Quantum Computing, System Design and Verification. We have extensive links with the computer, communications, microelectronics, and media industries. These are well represented in the Bristol region, providing many opportunities for collaborative research and teaching, secondments and new ventures. Grade : Lecturer Grade A - Lecturer Grade B Salary : £22,954 - £34,838 Contact for informal enquiries : Professor D May dave@cs.bris.ac.uk Tel. 0117 954 5134 Timescale of appointment : Contract : Permanent Closing date for applications : 9.00 am on 11 June 2004 For further details and applications procedure see http://www.bris.ac.uk/boris/jobs/ads?ID=22033 (23-May-04) ______________________________________________________________________________ IACR Calendar of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please [1]fill out this form or send email to webmaster(at)iacr.org . (The current condition for being listed here is that the description of an event must contain the substring "crypt" anywhere.) 2004 * [2]2004 IEEE CEC Special Session on Evolutionary Computation in Cryptology and Computer Security (IEEE CEC 2004), June 20-23, Portland, USA. * [3]1st European PKI Workshop. Research and Applications (EuroPKI'04), June 25-26, Samos Island, Greece. * [4]International Conference on Dependable Systems and Networks (DSN-2004), June 28-July 1, Florence, Italy. * [5]Fourth Central European Conference on Cryptology (WartaCrypt'04), July 1-3, Bedlewo, Poland. * [6]Issues of Provable Security and Efficiency in Cryptographic Constructions, July 1-9, Barcelona, Spain. * [7]Cryptographic Algorithms and their Uses, July 5-6, Gold Coast, Australia. * [8]Polynomial-Based Cryptography, July 7-12, Melbourne, Australia. * [9]PORTIA Workshop on Sensitive Data in Medical, Financial, and Content-Distribution Systems, July 8-9, Stanford (CA), USA. * [10]The 9th Australasian Conference on Information Security and Privacy (ACISP04), July 13-15, Sydney, Australia. * [11]23rd Symposium on Principles of Distributed Computing (PODC 2004), July 25-28, St. John's, Newfoundland, Canada. * [12]The First Conference on Email and Anti-Spam (CEAS), July 30-August 1, Mountain View, CA, USA. * [13]1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), August 5-6, Heidelberg, Germany. * [14]11th Annual Workshop on Selected Areas in Cryptography (SAC 2004), August 9-10, Waterloo, Canada. * [15]13th USENIX Security Symposium, August 9-13, San Diego, CA, USA. * [16]Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), August 11-13, Cambridge (Boston), USA. * [17]Crypto 2004, August 15-19, Santa Barbara, California, USA. * [18]The 5th International Workshop on Information Security Applications (WISA2004), August 23-25, Ramada Plaza, Jeju Island, Korea. * [19]International Conference on E-Business and Telecommunication Networks (ICETE'04), August 25-28, Setúbal, Portugal. * [20]First International Conference on Trust and Privacy in Digital Business (Trustbus '04), September 1-3, Zaragoza, Spain. * [21]Fourth Conference on Security in Communication Networks '04 (SCN04), September, 8-10, Amalfi, Italy. * [22]9th European Symposium on Research in Computer Security (ESORICS 2004), September 13-15, Sophia Antipolis, France. * [23]Reunion Española sobre Criptologia y Seguridad de la Informacion (RECSI2004), 15-17 September, Madrid, Spain. * [24]8th Workshop on Elliptic Curve Cryptography (ECC 2004), September 20-22, Bochum, Germany. * [25]The International Conference of Computer Safety, Reliability and Security (SAFECOMP 2004), September 21-24, Potsdam, Germany. * [26]7th Information Security Conference (ISC'04), September 27-29, Palo Alto, CA, USA. * [27]ACM Workshop on Wireless Security (WiSe 2004), October 1, Philadelphia, PA, USA. * [28]The Third International Workshop for Applied PKI (IWAP2004), October 3-5, Fukuoka, JAPAN. * [29]Workshop on Secure Multiparty Protocols (SMP 2004), October 7-8, 2004, Amsterdam, Netherlands. * [30]State of the Art of Stream Ciphers (SASC), October 14-15, Brugge, Belgium. * [31]11th ACM Conference on Computer and Communications Security (CCS 2004), October 25-29, Washington, DC, USA. * [32]The Fourth ACM Workshop on Digital Rights Management (DRM 2004), October 25, Washington, DC, USA. * [33]Sixth International Conference on Information and Communications Security (ICICS'04), October 27-29, Malaga, Spain. * [34]2nd ACM Workshop on Formal Methods in Security Engineering (FMSE '04), October 29, Washington DC, USA. * [35]Workshop on Provable Security, November 3-5, Paris, France. * [36]RSA Conference 2004 Europe (RSA-04), November 3-5, Barcelona, Spain. * [37]The 7th Annual International Conference on Information Security and Cryptology (ICISC 2004), December 2-3, Seoul, Korea. * [38]Asiacrypt 2004, December 5-9, Jeju Island, Korea. * [39]National conference on Discrete Mathematics and its Applications (dma 2004), December 9-11, India. * [40]5th International Conference on Cryptology in India (INDOCRYPT 2004), December 20-22, Chennai (Madras), India. * [41]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. 2005 * [42]International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005), January 23-26, Les Diablerets, Switzerland. * [43]Theory of Cryptography Conference (TCC '05), February 10-12, Cambridge, MA, USA. * [44]RSA Conference 2005, Cryptographers' Track (CT-RSA '05), February 14-18, San Francisco, USA. * [45]Financial Cryptography and Data Security (FC'05), February 28-March 3, Roseau, The Commonwealth Of Dominica. * [46]International Workshop on Coding and Cryptography (WCC'2005), March 14-18, Bergen, Norway. * [47]2nd International Conference on Security in Pervasive Computing (SPC 05), April 6-8, Boppard, Germany. * [48]4th Annual PKI R&D Workshop (PKI05), April 19-21, Gaithersburg MD, USA. * [49]2005 IEEE Symposium on Security and Privacy (IEEE S&P 2005), May 8-11, Berkeley, USA. * [50]Third International Workshop on Security in Information Systems (WOSIS 2005), May 24-25, Miami, USA. * [51]The 20th IFIP International Information Security Conference (SEC2005), May 30-June 1, Chiba, Japan. * [52]Eurocrypt 2005, May 22-26, Aarhus, Denmark. * [53]Crypto 2005, August 14-18, Santa Barbara, California, USA. * [54]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. * [55]Asiacrypt 2005, (December), Madras, India. 2006 * [56]2006 IEEE Symposium on Security and Privacy (IEEE S&P 2006), May 21-26, Berkeley, USA. * [57]Eurocrypt 2006, (May), St. Petersburg, Russia. * [58]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. 2007 * [59]2007 IEEE Symposium on Security and Privacy (IEEE S&P 2007), May 20-23, Berkeley, USA. 2008 * [60]2008 IEEE Symposium on Security and Privacy (IEEE S&P 2008), May 18-21, Berkeley, USA. Past events are [61]archived here. _________________________________________________________________ Journal Calls for Papers * Journal of Indian Statistical Association Journal of Indian Statistical Association (JISA) is planning to bring out a special issue in Dec 2004 that will include original work on Cryptology having its primary content: Statistics, Probability or Combinatorics. The editor of this special issue is Professor Bimal Roy, Indian Statistical Institute, Calcutta, India. The postscript/PDF version of the papers (typed using Latex) is to be submitted electronically to Prof. Bimal Roy (bimal@isical.ac.in) by May 31, 2004. The review reports will be available by August 31, 2004. For other information of this journal and the special issue please contact Prof. M. B. Rajarshi (mbraj@stat.unipune.ernet.in). _________________________________________________________________ Other Calendars * [62]Cipher's calendar (security & privacy) * [63]ACM SIGACT Theory Calendar (theory of computation) * [64]Calendar from UCL Crypto Group (crypto, security) * [65]Calendar from Cambridge University (security) * [66]ACM Calendar of Events * [67]IEEE Calendar/TAG _________________________________________________________________ [ [68]IACR home page ] [69]© IACR References 1. http://www.iacr.org/events/submit.html 2. http://www.cs.unr.edu/~sushil/cec/ 3. http://www.aegean.gr/EuroPKI2004 4. http://www.dsn.org/dsn2004.html 5. http://wartacrypt.im.pwr.wroc.pl/ 6. http://www-ma4.upc.es/mak/coursegen.html 7. http://www.isrc.qut.edu.au/events/eracom2004/ 8. http://www.it.deakin.edu.au/cryptography2004/ 9. http://crypto.stanford.edu/portia/workshops/2004_7.html 10. http://www.ics.mq.edu.au/~acisp04 11. http://www.podc.org/podc2004/ 12. http://www.ceas.cc/ 13. http://www.netlab.nec.de/esas/esas2004.html 14. http://www.vlsi.uwaterloo.ca/~sac04 15. http://www.usenix.org/events/sec04/ 16. http://www.chesworkshop.org/ches2004/ 17. http://www.iacr.org/conferences/crypto2004/ 18. http://dasan.sejong.ac.kr/~wisa04/ 19. http://www.icete.org/ 20. http://www-ifs.uni-regensburg.de/trustbus04/ 21. http://www.dia.unisa.it/conferences/SCN04/ 22. http://esorics04.eurecom.fr/ 23. http://www.uc3m.es/recsi 24. http://www.cacr.math.uwaterloo.ca/conferences/2004/ecc2004/announcement.html 25. http://www.safecomp.org/ 26. http://isc04.uncc.edu/ 27. http://www.ece.cmu.edu/~adrian/wise2004/ 28. http://itslab.csce.kyushu-u.ac.jp/iwap04/ 29. http://www.zurich.ibm.com/~cca/smp2004/ 30. http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html 31. http://www.acm.org/sigs/sigsac/ccs/CCS2004/ 32. http://mollie.engr.uconn.edu/DRM2004/ 33. http://icics04.lcc.uma.es/ 34. http://www.zurich.ibm.com/~mbc/FMSE04 35. http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Provable_Security.html 36. http://2004.rsaconference.com/europe/c4p/default.aspx 37. http://www.kiisc.or.kr/html/Call%20for%20papers.pdf 38. http://www.iacr.org/conferences/asiacrypt2004/ 39. http://www.amrita.edu/dma2004 40. http://www-rocq.inria.fr/codes/indocrypt2004/ 41. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 42. http://www.iacr.org/workshops/pkc2005/ 43. http://www.cs.ucsd.edu/users/mihir/tcc/tcc05/ 44. http://www.rsasecurity.com/rsalabs/node.asp?id=2015 45. http://www.ifca.ai/fc05/ 46. http://www.selmer.uib.no/WCC.html 47. http://www.spc-conf.org/ 48. http://middleware.internet2.edu/pki05/ 49. http://www.ieee-security.org/TC/SP-Index.html 50. http://www.iceis.org/workshops/wosis/wosis2005-cfp.html 51. http://www.sec2005.org/pre-cfp.html 52. http://www.iacr.org/conferences/eurocrypt2005/ 53. http://www.iacr.org/conferences/crypto2005/ 54. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 55. http://www.iacr.org/conferences/asiacrypt2005/ 56. http://www.ieee-security.org/TC/SP-Index.html 57. http://www.iacr.org/conferences/eurocrypt2006/ 58. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 59. http://www.ieee-security.org/TC/SP-Index.html 60. http://www.ieee-security.org/TC/SP-Index.html 61. http://www.iacr.org/events/archive.html 62. http://www.cs.utah.edu/flux/cipher/cipher-hypercalendar.html 63. http://www.cs.vt.edu/~theoryc/ 64. http://www.dice.ucl.ac.be/crypto/call_for_papers.html 65. http://www.cl.cam.ac.uk/users/bc201/security/conf.html 66. http://www.acm.org/events/ 67. http://www.ieee.org/conferences/tag/ 68. http://www.iacr.org/index.html 69. http://www.iacr.org/copyright.html ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (2004) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. The numbers in parentheses give the terms of service in calendar years. The terms of service for conference chairs expire at the end of the calendar year of the conference. Officers Andrew J. Clark Bart Preneel President (2002-2004) Vice President (2002-2004) P.O. Box 743 Department of Electrical Brighton Engineering East Sussex Katholieke Universiteit Leuven BN1 5HS Kasteelpark Arenberg 10 United Kingdom B-3001 Heverlee Tel: +44 1273 270752 BELGIUM Fax: +44 1273 276558 Tel: +32 16 32 11 48 Email: president(at)iacr.org Fax: +32 16 32 19 86 Email: vicepresident(at)iacr.org Josh Benaloh Susan Langford Secretary (2002-2004) Treasurer (2002-2004) Microsoft Research 1275 Poplar Ave #101 One Microsoft Way Sunnyvale, CA 94086 Redmond, WA 98052 USA USA Tel: +1 408 732 4305 Tel: +1 425 703 3871 Email: treasurer(at)iacr.org Fax: +1 425 936 7329 Email: secretary(at)iacr.org Directors Thomas Berson Eli Biham Director (2004-2006) Director (2002-2004) Anagram Labs Computer Science Department P.O. Box 791 Technion Palo Alto CA, 94301 Haifa 32000 USA Israel Tel: +1 650 324 0100 Tel: +972 4 8294308 Email: berson(at)anagram.com Fax: +972 4 8294308 Email: biham(at)cs.technion.ac.il Christian Cachin Jan Camenisch Editor, IACR Newsletter (2002-2004) Eurocrypt 2004 General Chair IBM Zurich Research Laboratory IBM Zurich Research Laboratory Säumerstrasse 4 Säumerstrasse 4 CH-8803 Rüschlikon CH-8803 Rüschlikon Switzerland Switzerland Tel: +41 1 724 8989 Tel: +41 1 724 8279 Fax: +41 1 724 8953 Fax: +41 1 724 8953 Email: newsletter(at)iacr.org Email: jca(at)zurich.ibm.com Ivan Damgård Ed Dawson Eurocrypt 2005 General Chair Director (2003-2005) Department of Computer Science Director, Information Security University of Aarhus Research Centre IT-parken, Aabogade 34 Queensland University of DK-8200 Aarhus N Technology Denmark GPO Box 2434 Tel: +45 8942 5780 Brisbane, Qld 4001 Fax: +45 8942 5601 AUSTRALIA Email: ivan(at)daimi.au.dk Tel: +61 7 3864 1919 Fax: +61 7 3221 2384 Email: e.dawson(at)qut.edu.au Stuart Haber James Hughes Crypto 2005 General Chair Crypto 2004 General Chair HP Labs Storage Technology Corp. 5 Vaughn Drive 7600 Boone Avenue North Princeton Junction, NJ 08540 Brooklyn Park, MN USA USA Tel: +1 609 514 0681 Tel: +1 763 424 1676 Email: stuart.haber(at)hp.com Fax: +1 763 424 1776 Email: james_hughes(at)stortek.com Kwangjo Kim Lars Knudsen Asiacrypt 2004 General Chair Director (2004-2006) School of Engineering Technical University of Denmark Information and Communications Dept. of Mathematics Univ. Building 303 58-4 Hwaam-dong Yusong-ku DK-2800 Lyngby Taejon, 305-348 DENMARK KOREA Tel: +45 4525 3048 Tel: +82 42 866 6118 Fax: +45 4588 1399 Fax: +82 42 866 6154 Email: knudsen(at)mat.dtu.dk Email: kkj(at)icu.ac.kr Arjen K. Lenstra Tsutomu Matsumoto Director (2004-2006) Director (2002-2004) Lucent Technologies, Room 2T-504 Graduate School of Environment and 600 Mountain Avenue Information Sciences P.O.Box 636 Yokohama National University Murray Hill, NJ 07974-0636 79-7 Tokiwadai, Hodogaya, Yokohama USA 240-8501, Japan Tel: +1 908 582 8323 Tel: +81-45-339-4133 Fax: +1 973 543 5094 Fax: +81-45-339-4338 Email: akl(at)lucent.com Email: tsutomu(at)mlab.jks.ynu.ac.jp Ueli Maurer Kevin S. McCurley Editor-in-Chief, Journal of Director (2002-2004) Cryptology (2002-2005) 6721 Tannahill Drive Department of Computer Science San Jose, CA 95120 ETH Zürich USA CH-8092 Zürich Tel: +1 408 927 1838 Switzerland Email: see here Tel: +41 1 632 7420 Fax: +41 1 632 1172 Email: maurer(at)inf.ethz.ch or jofc(at)iacr.org C.Pandu Rangan Jean-Jacques Quisquater Asiacrypt 2005 General Chair Director (2003-2005) Department of Computer Science and Université catholique de Louvain Engineering Microelectronic laboratory Indian Institute of Technology, Place du Levant, 3 Madras 1348 Louvain-la-Neuve Chennai - 600 036 BELGIUM India Tel: +32 10 47 25 41 Tel: +91 44 2257 8336 Fax: +32 10 47 25 98 Fax: +91 44 2257 8352 Email: jjq(at)dice.ucl.ac.be Email: rangan(at)iitm.ernet.in Rebecca Wright Director (2003-2005) Department of Computer Science Stevens Institute of Technology Castle Point on Hudson Hoboken, NJ 07030 USA Tel: +1 201 216-5328 Fax: +1 201 216-8249 Email: rwright(at)cs.stevens-tech.edu ------------------------------------------------------------------------ Other People Working for IACR Hilarie Orman Archivist Email: archive(at)iacr.org ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year (usually in February, June, and October) and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org . Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter(at)iacr.org The next issue Deadline for submissions to the next newsletter issue is October 1st, 2004. However, many items will be posted on the website as soon as possible. ______________________________________________________________________________ End of IACR Newsletter, Vol. 21, No. 2, Summer 2004. ______________________________________________________________________________