2:00-8:00 Registration, Anacapa Lounge
5:30-6:30 Pre-Registration Reception, Anacapa Front Patio
6:30-10:00 Reception, Anacapa Lawn
7:00-8:00 Breakfast, De La Guerra Commons
8:00- Registration, outside Campbell Hall
8:30-8:40 Welcome
9:10-9:40 Statistical Zero Knowledge Protocols
to Prove Modular Polynomial Relations
Eiichiro Fujisaki (NTT Laboratories, Japan) and
Tatsuaki Okamoto (NTT Laboratories, Japan)
9:40-10:10 Keeping the SZK-Verifier Honest Unconditionally
Giovanni Di Crescenzo (University of California
at San Diego, USA), Tatsuaki Okamoto (NTT Laboratories, Japan),
and Moti Yung (CertCo, USA)
10:10-10:30 Break
12:00-12:30 Deniable Encryption
Ran Canetti (IBM T.J. Watson Research Center,
USA), Cynthia Dwork (IBM Almaden Research Center, USA), Moni Naor
(Weizmann Institute of Science, Israel), and Rafail Ostrovsky
(Bellcore, USA)
12:30-2:00 Lunch, De La Guerra Commons
2:50-3:20 Public-Key Cryptosystems from Lattice
Reduction Problems
Oded Goldreich (Computer Science Department, Weizmann
Institute, Israel), Shafi Goldwasser (MIT Laboratory for Computer
Science, USA), and Shai Halevi (MIT Laboratory for Computer Science,
USA)
3:20-3:40 Break
4:10-4:40 Security of Blind Digital Signatures
Ari Juels (RSA Laboratories, USA), Michael Luby
(Digital Equipment Corporation, USA), and Rafail Ostrovsky (Bellcore,
USA)
4:40-5:10 Digital Signcryption or How to Achieve
Cost (Signature & Encryption) << Cost (Signature) +
Cost (Encryption)
Yuliang Zheng (Monash University, Australia)
5:10-5:40 How to Sign Digital Streams
Rosario Gennaro (IBM T.J. Watson Research Center,
USA) and Pankaj Rohatgi (IBM T.J. Watson Research Center, USA)
7:00-10:00 Reception, De La Guerra Lawn
9:00-9:30 Failure of the McEliece Public-Key
Cryptosystem Under Message-Resend and Related-Message Attack
Thomas A. Berson (Anagram Laboratories, USA)
9:30-10:00 A Multiplicative Attack Using LLL
Algorithm on RSA Signatures with Redundancy
Jean-François Misarsky (France Telecom,
France)
10:00-10:30 Break
11:00-11:30 A Key Recovery Attack on Discrete
Log-Based Schemes Using a Prime Order Subgroup
Chae Hoon Lim (Future Systems Inc., Korea) and
Pil Joong Lee (Pohang Univ. of Science & Technology, Korea)
11:30-12:00 The Prevalence of Kleptographic Attacks
on Discrete-Log Based Cryptosystems
Adam Young (Columbia University, USA) and Moti
Yung (CertCo, USA)
12:00-12:30 "Pseudo-Random" Number
Generation within Cryptographic Algorithms: The DSS Case
Mihir Bellare (University of California at San
Diego, USA), Shafi Goldwasser (MIT Laboratory for Computer Science,
USA), and Daniele Micciancio(MIT Laboratory for Computer Science,
USA)
12:30-2:00 Lunch, De La Guerra Commons
Free Afternoon
8:50-9:20 Privacy Amplification Secure Against
Active Adversaries
Ueli Maurer (ETH Zürich, Switzerland) and
Stefan Wolf (ETH Zürich, Switzerland)
9:20-9:50 Visual Authentication and Identification
Moni Naor (Weizmann Institute of Science, Israel)
and Benny Pinkas (Weizmann Institute of Science, Israel)
9:50-10:10 Break
11:40-12:10 An Improved Algorithm for Arithmetic
on a Family of Elliptic Curves
Jerome A. Solinas (National Security Agency, USA)
12:10-1:30 Lunch, De La Guerra Commons
2:00-2:30 A One Way Function Based on Ideal Arithmetic
in Number Fields
Johannes Buchmann (Technische Hochschule Darmstadt,
Germany) and Sachar Paulus (Technische Hochschule Darmstadt, Germany)
2:30-2:50 Break
3:20-3:50 Efficient Group Signature Schemes for
Large Groups
Jan Camenisch (ETH Zürich, Switzerland) and
Markus Stadler (Ubilab/UBS, Switzerland)
3:50-4:20 Efficient Generation of Shared RSA
Keys
Dan Boneh (Bellcore, USA) and Matthew Franklin
(AT&T Labs, USA)
4:20-4:50 Proactive RSA
Yair Frankel (CertCo, USA and Sandia National
Laboratories, USA), Peter Gemmell (Sandia National Laboratories,
USA), Philip D. MacKenzie (Boise State University, Idaho), and Moti
Yung (CertCo, USA)
4:50-5:35 IACR Business Meeting
6:00-9:00 Beach Barbecue, Goleta Beach
8:00-10:30 Crypto Café, Anacapa Lounge
9:00-9:30 Collision-Resistant Hashing: Towards
Making UOWHFs Practical
Mihir Bellare (University of California at San
Diego, USA) and Phillip Rogaway (University of California at Davis,
USA)
9:30-10:00 Fast and Secure Hashing Based on Codes
Lars Knudsen (Katholieke Universiteit Leuven,
Belgium) and Bart Preneel (Katholieke Universiteit Leuven, Belgium)
10:00-10:30 Break
11:30-12:00 Differential Fault Analysis of Secret
Key Cryptosystems
Eli Biham (Technion, Israel) and Adi Shamir (Weizmann
Institute of Science, Israel)
12:00-12:30 Cryptanalysis of the Cellular Message
Encryption Algorithm
David Wagner (University of California at Berkeley,
USA), Bruce Schneier (Counterpane Systems, USA), and John Kelsey
(Counterpane Systems, USA)
12:30-2:00 Lunch, De La Guerra Commons
Adjourn