Crypto '95 Final Program
Sponsored by the
International Association for Cryptologic Research
Social Program
- Registration, 4-8pm, Sunday, August 27, 1995
- Evening events are as follows:
- Sunday, August 27, 7-10pm, Cocktail party (Anacapa Hall)
- Monday, August 28, 7-10pm, Dinner reception (Anacapa Hall)
- Tuesday, August 29, 7-10pm, Rump Session (Buchanan Hall, Room 1910)
- Wednesday, August 30, 6-9pm, Beach Barbecue (Goleta Beach Park)
Technical Program
SUNDAY August 27, 1995
- Registration, 4:00 - 8:00
MONDAY August 28, 1995
- Welcome, 8:30 - 8:45
Session 1: MAC and Hash. Chair: Ernest Brickell
- MDx-MAC and Building Fast MACs from Hash Functions, 8:45 - 9:05
- Bart Preneel, Paul C. van Oorschot
- XOR MACs: New Methods for Message Authentication using Finite
Pseudorandom Functions, 9:10 - 9:30
- Mihir Bellare, Roch Guerin, Phillip Rogaway
- Bucket Hashing and its Application to Fast Message Authentication, 9:35 - 9:55
- Phillip Rogaway
- Coffee Break, 10:00 - 10:35
Session 2: Number Theory I. Chair: Andrew Odlyzko
- Fast Key Exchange with Elliptic Curve Systems, 10:40 - 11:00
- Richard Schroeppel, Hilarie Orman, Sean O'Malley, Oliver Spatscheck
- Fast Server-Aided RSA Signatures Secure Against Active Attacks, 11:05 - 11:25
- Philippe Béguin, Jean-Jacques Quisquater
- Security and Performance of Server-Aided RSA Computation Protocols, 11:30 - 11:50
- Chae Hoon Lim, Pil Joong Lee
- Lunch, 12:00 - 1:00
Session 3: Oblivious Transfer, Chair: Moni Naor
- Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver, 1:30 - 1:50
- Shai Halevi
- Precomputing Oblivious Transfer, 1:55 - 2:15
- Donald Beaver
- Committed Oblivious Transfer and Secure Multiparty Computation, 2:20 - 2:40
- Claude Crépeau, Jeroen van de Graaf, Alain Tapp
- On the Security of the Quantum Oblivious Transfer and Key
Distribution Protocols, 2:45 - 3:05
- Dominic Mayers
- Coffee Break, 3:10 - 3:30
Session 4: Cryptanalysis I, Chair: Serge Vaudenay
- How to Break Shamir's Asymmetric Basis, 3:35 - 3:55
- Thorsten Theobald
- On the Security of the Gollmann Cascades, 4:00 - 4:20
- Sang-Joon Park, Sang-Jin Lee, Seung-Cheol Goh
- Improving the Search Algorithm for the Best Linear Expression,
4:25 - 4:45
- Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
- On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm,
4:50 - 5:10
- Burton S. Kaliski Jr., Yiqun Lisa Yin
TUESDAY August 29, 1995
Session 5: Key Escrow, Chair: Kevin McCurley
- Simple Method for Generating and Sharing Pseudo-Random Functions, 8:30 - 8:50
- Silvio Micali, Ray Sidney
- A Key Escrow System with Warrant Bounds, 8:55 - 9:15
- Arjen K. Lenstra, Peter Winkler, Yacov Yacobi
- Fair Cryptosystems Revisited, 9:20 - 9:40
- Joe Kilian, Tom Leighton
- Escrow Encryption Systems Visited: Attacks, Analysis and Designs,
9:45 - 10:05
- Yair Frankel, Moti Yung
- Coffee Break, 10:10 - 10:35
Session 6: Protocols, Chair: Josef Pieprzyk
- Robustness Principles for Public Key Protocols, 10:40 - 11:00
- Ross Anderson, Roger Needham
Session 7: Invited Lecture, Chair: Ross Anderson
- Invited Lecture: Ways of Losing Information, 11:05 - 11:55
- Robert Morris, Sr.
- Lunch, 12:00-1:00
- Free afternoon
Rump Session, Chair: Whit Diffie, 7:00 - 11:00
WEDNESDAY August 30, 1995
Session 8: Cryptanalysis II, Chair: Alan Sherman
- Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt
'88, 8:30 - 8:50
- Jacques Patarin
- Cryptanalysis Based on 2-Adic Rational Approximation, 8:55 - 9:15
- Andrew Klapper, Mark Goresky
- A Key-schedule Weakness in SAFER K-64, 9:20 - 9:40
- Lars R. Knudsen
- Cryptanalysis of the Immunized LL Public Key Systems, 9:45 - 10:05
- Yair Frankel, Moti Yung
- Coffee Break, 10:10 - 10:35
Session 9: Zero Knowledge, Chair: Jean-Jacques Quisquater
- Secure Signature Schemes based on Interactive Protocols, 10:40 - 11:00
- Ronald Cramer, Ivan Dåmgard
- Improved Efficient Arguments, 11:05 - 11:25
- Joe Kilian
- Honest Verifier vs. Dishonest Verifier in Public Coin Zero-Knowledge
Proofs, 11:30 - 11:50
- Ivan Dåmgard, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson
- Lunch, 12:00 - 1:00
Session 10: Secret Sharing I, Chair: Susan Langford
Proactive Secret Sharing or How to Cope With Perpetual Leakage,
1:30 - 1:50
- Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
- Secret Sharing with Public Reconstruction, 1:55 - 2:15
- Amos Beimel, Benny Chor
- On General Perfect Secret Sharing Schemes, 2:20 - 2:40
- G. R. Blakley, G. A. Kabatianski
- Coffee Break, 2:45 - 3:05
Session 11: IACR Distinguished Lecture, Chair: Scott Vanstone
- Cryptography - Myths and Legends, 3:10 - 3:55
- Adi Shamir
- IACR Business Meeting, 4:00 - 5:30
- Beach barbecue, 6:00 - 9:00
THURSDAY August 31, 1995
Session 12: Number Theory II, Chair: Willi Meier
- NFS with Four Large Primes: An Explosive Experiment, 8:30 - 8:50
- Bruce Dodson, Arjen K. Lenstra
- Some Remarks on Lucas-based Cryptosystems, 8:55 - 9:15
- Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra
Session 13: Secret Sharing II, Chair: Hugo Krawczyk
- Threshold DSS Signatures Without a Trusted Party, 9:20 - 9:40
- Susan K. Langford
- t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes,
9:45 - 10:05
- Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata
- Coffee Break, 10:10 - 10:35
Session 14: Everything Else, Chair: Kazuo Ohta
- Quantum Cryptoanalysis of Hidden Linear Functions, 10:40 - 11:00
- Dan Boneh, Richard J. Lipton
- An Efficient Divisible Electronic Cash Scheme, 11:05 - 11:25
- Tatsuaki Okamoto
- Collusion-Secure Fingerprinting for Digital Data, 11:30 - 11:50
- Dan Boneh, James Shaw
- Lunch, 12:00-1:00
Crypto '95 main page
IACR home page