Crypto '95 Final Program

Sponsored by the
International Association for Cryptologic Research

Social Program

Registration, 4-8pm, Sunday, August 27, 1995
Evening events are as follows:
Sunday, August 27, 7-10pm, Cocktail party (Anacapa Hall)
Monday, August 28, 7-10pm, Dinner reception (Anacapa Hall)
Tuesday, August 29, 7-10pm, Rump Session (Buchanan Hall, Room 1910)
Wednesday, August 30, 6-9pm, Beach Barbecue (Goleta Beach Park)

Technical Program

SUNDAY August 27, 1995

Registration, 4:00 - 8:00

MONDAY August 28, 1995

Welcome, 8:30 - 8:45

Session 1: MAC and Hash. Chair: Ernest Brickell

MDx-MAC and Building Fast MACs from Hash Functions, 8:45 - 9:05
Bart Preneel, Paul C. van Oorschot
XOR MACs: New Methods for Message Authentication using Finite Pseudorandom Functions, 9:10 - 9:30
Mihir Bellare, Roch Guerin, Phillip Rogaway
Bucket Hashing and its Application to Fast Message Authentication, 9:35 - 9:55
Phillip Rogaway
Coffee Break, 10:00 - 10:35

Session 2: Number Theory I. Chair: Andrew Odlyzko

Fast Key Exchange with Elliptic Curve Systems, 10:40 - 11:00
Richard Schroeppel, Hilarie Orman, Sean O'Malley, Oliver Spatscheck
Fast Server-Aided RSA Signatures Secure Against Active Attacks, 11:05 - 11:25
Philippe Béguin, Jean-Jacques Quisquater
Security and Performance of Server-Aided RSA Computation Protocols, 11:30 - 11:50
Chae Hoon Lim, Pil Joong Lee
Lunch, 12:00 - 1:00

Session 3: Oblivious Transfer, Chair: Moni Naor

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver, 1:30 - 1:50
Shai Halevi
Precomputing Oblivious Transfer, 1:55 - 2:15
Donald Beaver
Committed Oblivious Transfer and Secure Multiparty Computation, 2:20 - 2:40
Claude Crépeau, Jeroen van de Graaf, Alain Tapp
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols, 2:45 - 3:05
Dominic Mayers
Coffee Break, 3:10 - 3:30

Session 4: Cryptanalysis I, Chair: Serge Vaudenay

How to Break Shamir's Asymmetric Basis, 3:35 - 3:55
Thorsten Theobald
On the Security of the Gollmann Cascades, 4:00 - 4:20
Sang-Joon Park, Sang-Jin Lee, Seung-Cheol Goh
Improving the Search Algorithm for the Best Linear Expression, 4:25 - 4:45
Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm, 4:50 - 5:10
Burton S. Kaliski Jr., Yiqun Lisa Yin

TUESDAY August 29, 1995

Session 5: Key Escrow, Chair: Kevin McCurley

Simple Method for Generating and Sharing Pseudo-Random Functions, 8:30 - 8:50
Silvio Micali, Ray Sidney
A Key Escrow System with Warrant Bounds, 8:55 - 9:15
Arjen K. Lenstra, Peter Winkler, Yacov Yacobi
Fair Cryptosystems Revisited, 9:20 - 9:40
Joe Kilian, Tom Leighton
Escrow Encryption Systems Visited: Attacks, Analysis and Designs, 9:45 - 10:05
Yair Frankel, Moti Yung
Coffee Break, 10:10 - 10:35

Session 6: Protocols, Chair: Josef Pieprzyk

Robustness Principles for Public Key Protocols, 10:40 - 11:00
Ross Anderson, Roger Needham

Session 7: Invited Lecture, Chair: Ross Anderson

Invited Lecture: Ways of Losing Information, 11:05 - 11:55
Robert Morris, Sr.
Lunch, 12:00-1:00
Free afternoon

Rump Session, Chair: Whit Diffie, 7:00 - 11:00


WEDNESDAY August 30, 1995

Session 8: Cryptanalysis II, Chair: Alan Sherman

Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt '88, 8:30 - 8:50
Jacques Patarin
Cryptanalysis Based on 2-Adic Rational Approximation, 8:55 - 9:15
Andrew Klapper, Mark Goresky
A Key-schedule Weakness in SAFER K-64, 9:20 - 9:40
Lars R. Knudsen
Cryptanalysis of the Immunized LL Public Key Systems, 9:45 - 10:05
Yair Frankel, Moti Yung
Coffee Break, 10:10 - 10:35

Session 9: Zero Knowledge, Chair: Jean-Jacques Quisquater

Secure Signature Schemes based on Interactive Protocols, 10:40 - 11:00
Ronald Cramer, Ivan Dåmgard
Improved Efficient Arguments, 11:05 - 11:25
Joe Kilian
Honest Verifier vs. Dishonest Verifier in Public Coin Zero-Knowledge Proofs, 11:30 - 11:50
Ivan Dåmgard, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson
Lunch, 12:00 - 1:00

Session 10: Secret Sharing I, Chair: Susan Langford

Proactive Secret Sharing or How to Cope With Perpetual Leakage, 1:30 - 1:50
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Secret Sharing with Public Reconstruction, 1:55 - 2:15
Amos Beimel, Benny Chor
On General Perfect Secret Sharing Schemes, 2:20 - 2:40
G. R. Blakley, G. A. Kabatianski
Coffee Break, 2:45 - 3:05

Session 11: IACR Distinguished Lecture, Chair: Scott Vanstone

Cryptography - Myths and Legends, 3:10 - 3:55
Adi Shamir
IACR Business Meeting, 4:00 - 5:30
Beach barbecue, 6:00 - 9:00

THURSDAY August 31, 1995

Session 12: Number Theory II, Chair: Willi Meier

NFS with Four Large Primes: An Explosive Experiment, 8:30 - 8:50
Bruce Dodson, Arjen K. Lenstra
Some Remarks on Lucas-based Cryptosystems, 8:55 - 9:15
Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra

Session 13: Secret Sharing II, Chair: Hugo Krawczyk

Threshold DSS Signatures Without a Trusted Party, 9:20 - 9:40
Susan K. Langford
t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes, 9:45 - 10:05
Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata
Coffee Break, 10:10 - 10:35

Session 14: Everything Else, Chair: Kazuo Ohta

Quantum Cryptoanalysis of Hidden Linear Functions, 10:40 - 11:00
Dan Boneh, Richard J. Lipton
An Efficient Divisible Electronic Cash Scheme, 11:05 - 11:25
Tatsuaki Okamoto
Collusion-Secure Fingerprinting for Digital Data, 11:30 - 11:50
Dan Boneh, James Shaw
Lunch, 12:00-1:00

Crypto '95 main page

IACR home page