ASIACRYPT 2001 - TECHNICAL PROGRAM | |
All sessions are in the Performing Arts Complex unless otherwise noted. | |
Sunday 9 December | |
Sun 5:30-7:30 | Registration (in the Quadrangle, Somerset College) |
Sun 6:00-9:00 | Welcome Drinks and Dinner (in the Quadrangle, Somerset College) |
Monday 10 December | |
Mon 9:00-9:15 | Introductory Remarks Barry Arnison (Principal, Somerset College) |
Mon 9:15-10:30 | Session 1: Lattice Based Cryptography Chair: Yuliang Zheng |
9:15-9:40 | Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 Craig Gentry (DoCoMo Communications Laboratories, USA) Jakob Jonsson and Michael Szydlo (RSA Laboratories, USA) Jacques Stern (ENS, Paris, France) |
9:40-10:05 | On the Insecurity of a Server-Aided RSA Protocol Phong Nguyen (ENS, Paris, France) Igor Shparlinski (Macquarie University, Australia) |
10:05-10:30 | The Modular Inversion Hidden Number Problem Dan Boneh (Stanford University, USA) Shai Halevi and Nick Howgrave-Graham (IBM T.J. Watson Research Center, USA) |
10:30-11:00 | Morning Tea |
Mon 11:00-11:25 | Session 2: Human Identification Chair: Colin Boyd |
11:00-11:25 | Secure Human Identification Protocols Nicholas J. Hopper and Manuel Blum (Carnegie Mellon University, USA) |
Mon 11:25 - 12:25 | Invited Talk Chair: Colin Boyd Unbelievable Security: Matching AES security using public key systems Arjen K. Lenstra (Citibank, USA and Technische Universiteit Eindhoven, The Netherlands) |
Mon 12:25 - 2:00 | Lunch in Great Hall |
Mon 2:00-3:40 | Session 3: Practical Public Key Cryptography Chair: Kwangjo Kim |
2:00-2:25 | A Probable Prime Test with Very High Confidence for n=1 mod 4 Siguna Muller (University of Klagenfurt, Austria) |
2:25-2:50 | Computation of Discrete Logarithms in GF(2^607) Emmanuel Thome (LIX, Ecole Polytechnique, France) |
2:50-3:15 | Speeding up XTR Martijn Stam (Technische Universiteit Eindhoven, The Netherlands) Arjen K. Lenstra (Citibank, USA and Technische Universiteit Eindhoven, The Netherlands) |
3:15-3:40 | An Efficient Implementation of Braid Groups Jae Choon Cha, Ki Hyoung Ko, Sang Jin Lee (Korea Advanced Institute of Science and Technology) Jae Woo Han (National Security Research Institute, Korea) and Jung Hee Cheon (Information and Communications University, Korea) |
3:40-4:05 | Afternoon Tea |
Mon 4:05-4:55 | Session 4: Cryptography based on Coding Theory Chair: Rei Safavi-Naini |
4:05-4:30 | How to Achieve a McEliece-based Digital Signature Scheme Nicolas Courtois (INRIA and Toulon University, France) and Matthieu Finiasz (INRIA and ENS, Paris, France) and Nicolas Sendrier (INRIA, France) |
4:30-4:55 | Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg (Ohio State University, USA), Jessica Staddon (Xerox PARC, USA) and Judy Walker (University of Nebraska, USA) |
Mon 4:55-5:15 | Photo Session |
Mon 5:15-6:15 | IACR General Business Meeting |
Mon 6:15-7:15 | Dinner in Great Hall |
Mon 7:15-9:30 | Rump Session in Great Hall Chair: Bill Caelli |
Tuesday 11 December | |
Tue 9:00-10:40 | Session 5: Block Ciphers Chair: Kwok-Yan Lam |
9:00-9:25 | Security of Reduced Version of the Block Cipher Camellia against
Truncated and Impossible Differential Cryptanalysis Makoto Sugita, (NTT, Japan) Kazukuni Kobara and Hideki Imai, (The University of Tokyo, Japan) |
9:25-9:50 | Known IV-attacks on Triple Modes of Operation of Block Ciphers Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim (CIST, Korea) Okyeon Yi (ETRI, Korea) |
9:50-10:15 | Generic Attacks on Feistel Schemes Jacques Patarin (SchlumbergerSema and University of Versailles, France) |
10:15-10:40 | A Compact Rijndael Hardware Architecture with S-Box Optimization Akashi Satoh, Sumio Morioka, Kohji Takano and Seiji Munetoh (IBM Research, Japan) |
10:40-11:10 | Morning Tea |
Tue 11:10-12:25 | Session 6: Provable Security Chair: Arjen Lenstra |
11:10-11:35 | Provable Security of KASUMI and 3GPP Encryption Mode f8 Ju-Sung Kang, Sang-Uk Shin, Dowon Hong (ETRI, Korea) and Okyeon Yi (Kookmin University, Korea) |
11:35-12:00 | Efficient and Mutually Authenticated Key Exchange for Low Power Computing
Devices Duncan S. Wong and Agnes H. Chan (Northeastern University, USA) |
12:00-12:25 | Provably Authenticated Group Diffie-Hellman Key Exchange - the Dynamic Case Emmanuel Bresson, David Pointcheval (Ecole Normale Superieure, France) and Olivier Chevassut (Lawrence Berkeley National Laboratory, USA, and Universite Catholique de Louvain, Belgium) |
Tue 12:25-2:00 | Lunch in Great Hall |
Tue 2:00 | Free Afternoon (Optional Activities) Half-day excursion to Springbrook rainforest Golf Free activities at Somerset College (Swimming and Tennis) |
Tue 7:15 | Seafood smorgasbord at Concorde Hotel (Optional Extra) |
Wednesday 12 December | |
Wed 9:00-10:15 | Session 7: Threshold Cryptography Chair: Masayuki Abe |
9:00-9:25 | Fully Distributed Threshold RSA under Standard Assumptions Pierre-Alain Fouque, Jacques Stern (Ecole Normale Superieure, France) |
9:25-9:50 | Adaptive Security in the Threshold Setting: From Cryptosystems
to Signature Schemes Anna Lysyanskaya (MIT, USA) and Christopher Peikert (MIT, USA) |
9:50-10:15 | Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks Pierre-Alain Fouque and David Pointcheval (ENS, Paris, France) |
10:15-10:45 | Morning Tea |
Wed 10:45-11:35 | Session 8: Two-party Protocols Chair: Jennifer Seberry |
10:45-11:10 | Oblivious Polynomial Evaluation and Oblivious Neural Learning Yan-Cheng Chang (ROC Airforce, Taiwan) and Chi-Jen Lu (Academia Sinica, Taiwan) |
11:10-11:35 | Mutually Independent Commitments Moses Liskov, Anna Lysyanskaya, Silvio Micali, Adam Smith (MIT, USA) and Leonid Reyzin (Boston University, USA) |
Wed 11:35-12:35 | Invited Talk Chair: Jennifer Seberry Debunking the Bible Codes Brendan McKay (Australian National University) |
Wed 12:35-2:00 | Lunch in Great Hall |
Wed 2:00-2:50 | Session 9: Zero Knowledge Chair: Chi Sung Laih |
2:00-2:25 | Efficient Zero-Knowledge Authentication based on a Linear Algebra
Problem MinRank Nicolas T. Courtois (SchlumbergerSema and Toulon University and INRIA, France) |
2:25-2:50 | Responsive Round Complexity and Concurrent Zero-Knowledge Tzafrir Cohen and Erez Petrank (Technion, Israel), Joe Kilian (Yianilos Labs, USA) |
2:50-3:15 | Afternoon Tea |
Wed 3:15-4:05 | Session 10: Cryptographic Building Blocks Chair: Dingyi Pei |
3:15-3:40 | Practical Construction and Analysis of Pseudo-Random Primitives Johan Hastad, (Royal Institute of Technology, Sweden) Mats Naslund (Ericsson Research, Sweden) |
3:40-4:05 | Autocorrelation Coefficients and Correlation Immunity of Boolean Functions Yuriy Tarannikov and Peter Korolev and Anton Botev (Moscow State University, Russia) |
Wed 6:15-10:30 | Conference Dinner at Paradise Country |
Thursday 13 December | |
Thu 9:00-10:40 | Session 11: Elliptic Curve Cryptography Chair: Eiji Okamoto |
9:00-9:25 | An Extension of Kedlaya's Point Counting Algorithm of Superelliptic Curves P. Gaudry and N. Gurel (LIX, Ecole Polytechnique, France) |
9:25-9:50 | Supersingular Curves in Cryptography Steven D Galbraith, (Royal Holloway University of London, UK) |
9:50-10:15 | Short Signatures from the Weil Pairing Dan Boneh, Ben Lynn and Hovav Shacham (Stanford University, USA) |
10:15-10:40 | Self-blindable Credential Certificates from the Weil Pairing Eric Verheul (PricewaterhouseCoopers, The Netherlands) |
10:40-11:10 | Morning Tea |
Thu 11:10-12:25 | Session 12: Anonymity Chair: Josef Pieprzyk |
11:10-11:35 | How to Leak a Secret Ronald L. Rivest (MIT, USA) and Adi Shamir and Yael Tauman (Weizmann Institute, Israel) |
11:35-12:00 | Key-Privacy in Public-Key Encryption Mihir Bellare (UCSD, USA), Alexandra Boldyreva (UCSD, USA), Anand Desai (NTT, USA), and David Pointcheval (ENS-CNRS, France) |
12:00-12:25 | Provably Secure Fair Blind Signatures with Tight Revocation Masayuki Abe and Miyako Ohkubo (NTT, Japan) |
12:25-12:30 | Close of Conference |
Thu 12:30-2:30 | Lunch and Farewell Drinks - Poolside at Somerset College |