CRYPTO '97 Preliminary Program

(Updated July 3, 1997)

Sponsored by the
International Association for Cryptologic Research

All sessions are in Lotte Lehmann Auditorium, except as noted. All breakfasts and lunches are in De La Guerra Dining Commons. Entry to the dining hall for breakfast is 7:00-8:00; lunch 12:30-2:00 (12:20-1:30 Wednesday).

Sunday, August 17, 1997


4:00-8:00 Registration, Anacapa Hall

6:30-10:00 Reception, Anacapa Lawn

Monday, August 18, 1997


7:00-8:00 Breakfast, De La Guerra Commons

8:00- Registration, outside Lotte Lehmann Auditorium

Session 1: Complexity Theory
Chair: Moni Naor (Weizmann Institute, Israel)

8:30-8:40 Welcome

8:40-9:10 The Complexity of Computing Hard Core Predicates

Mikael Goldmann (Royal Institute of Technology, Sweden) and Mats Näslund (Royal Institute of Technology, Sweden)

9:10-9:40 Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations

Eiichiro Fujisaki (NTT Laboratories, Japan) and Tatsuaki Okamoto (NTT Laboratories, Japan)

9:40-10:10 Keeping the SZK-Verifier Honest Unconditionally

Giovanni Di Crescenzo (University of California at San Diego, USA), Tatsuaki Okamoto (NTT Laboratories, Japan), and Moti Yung (CertCo, USA)

10:10-10:30 Break

Session 2: Invited Lecture
Chair: Hugo Krawczyk (IBM T.J. Watson Research Center, USA, and Technion, Israel)

10:30-11:30 On the Foundations of Modern Cryptography

Oded Goldreich (Computer Science Department, Weizmann Institute, Israel)

Session 3: Cryptographic Primitives
Chair: Alfredo de Santis (Università di Salerno, Italy)

11:30-12:00 Plug and Play Encryption

Donald Beaver (Transarc, USA)

12:00-12:30 Deniable Encryption

Ran Canetti (IBM T.J. Watson Research Center, USA), Cynthia Dwork (IBM Almaden Research Center, USA), Moni Naor (Weizmann Institute of Science, Israel), and Rafail Ostrovsky (Bellcore, USA)

12:30-2:00 Lunch, De La Guerra Commons

Session 4: Lattice-Based Cryptography
Chair: Michael J. Wiener (Entrust Technologies, Canada)

2:00-2:30 Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem

Oded Goldreich (Computer Science Department, Weizmann Institute, Israel), Shafi Goldwasser (MIT Laboratory for Computer Science, USA), and Shai Halevi (MIT Laboratory for Computer Science, USA)

2:30-3:00 Public-Key Cryptosystems from Lattice Reduction Problems

Oded Goldreich (Computer Science Department, Weizmann Institute, Israel), Shafi Goldwasser (MIT Laboratory for Computer Science, USA), and Shai Halevi (MIT Laboratory for Computer Science, USA)

3:00-3:30 Break

Session 5: Digital Signatures
Chair: Susan Langford (Atalla Corporation, USA)

3:30-4:00 RSA-Based Undeniable Signatures

Rosario Gennaro (IBM T.J. Watson Research Center, USA), Hugo Krawczyk (IBM T.J. Watson Research Center, USA, and Technion, Israel), and Tal Rabin (IBM T.J. Watson Research Center, USA)

4:00-4:30 Security of Blind Digital Signatures

Ari Juels (RSA Laboratories, USA), Michael Luby (Digital Equipment Corporation, USA), and Rafail Ostrovsky (Bellcore, USA)

4:30-5:00 Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)

Yuliang Zheng (Monash University, Australia)

5:00-5:30 How to Sign Digital Streams

Rosario Gennaro (IBM T.J. Watson Research Center, USA) and Pankaj Rohatgi (IBM T.J. Watson Research Center, USA)

7:00-10:00 Reception (De La Guerra Lawn)

Tuesday, August 19, 1997


7:00-8:00 Breakfast, De La Guerra Commons

Session 6: Cryptanalysis of Public-Key Cryptosystems (I)
Chair: Ivan Damgård (Aarhus University, Denmark)

8:30-9:00 Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations

Phong Nguyen (Ecole Normale Supérieure, France) and Jacques Stern (Ecole Normale Supérieure, France)

9:00-9:30 Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack

Thomas A. Berson (Anagram Laboratories, USA)

9:30-10:00 A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy

Jean-François Misarsky (France Telecom, France)

10:00-10:30 Break

Session 7: Cryptanalysis of Public-Key Cryptosystems (II)
Chair: Johannes Buchmann (Techniche Hochschule Darmstadt, Germany)

10:30-11:00 On the Security of the KMOV Public Key Cryptosystem

Daniel Bleichenbacher (Bell Laboratories, USA)

11:00-11:30 A Key Recovery Attack on Discrete Log-Based Schemes Using a Prime Order Subgroup

Chae Hoon Lim (Future Systems Inc., Korea) and Pil Joong Lee (Pohang Univ. of Science & Technology, Korea)

11:30-12:00 The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems

Adam Young (Columbia University, USA) and Moti Yung (CertCo, USA)

12:00-12:30 "Pseudo-Random" Number Generation within Cryptographic Algorithms: The DSS Case

Mihir Bellare (University of California at San Diego, USA), Shafi Goldwasser (MIT Laboratory for Computer Science, USA), and Daniele Micciancio(MIT Laboratory for Computer Science, USA)

12:30-2:00 Lunch, De La Guerra Commons

Free Afternoon

Rump Session
Chair: Stuart Haber (Surety Technologies, USA)

7:00-11:00 Informal presentations to be announced
Corwin Pavilion in the University Center

Wednesday, August 20, 1997


7:00-8:00 Breakfast, De La Guerra Commons

Session 8: Information Theory
Chair: Gilles Brassard (Université de Montréal, Canada)

8:30-9:00 Unconditional Security Against Memory-Bounded Adversaries

Christian Cachin (ETH Zürich, Switzerland) and Ueli Maurer (ETH Zürich, Switzerland)

9:00-9:30 Privacy Amplification Secure Against Active Adversaries

Ueli Maurer (ETH Zürich, Switzerland) and Stefan Wolf (ETH Zürich, Switzerland)

9:30-10:00 Visual Authentication and Identification

Moni Naor (Weizmann Institute of Science, Israel) and Benny Pinkas (Weizmann Institute of Science, Israel)

10:00-10:20 Break

Session 9: Invited Lecture
Chair: Neal Koblitz (University of Washington, USA)

10:20-11:20 Quantum Information Processing: The Good, the Bad, and the Ugly

Gilles Brassard (Université de Montréal, Canada)

Session 10: Elliptic Curve Implementation
Chair: Antoon Bosselaers (Katholieke Universiteit Leuven, Belgium)

11:20-11:50 Efficient Algorithms for Elliptic Curve Cryptosystems

Jorge Guajardo (WPI, USA) and Christof Paar (WPI, USA)

11:50-12:20 An Improved Algorithm for Arithmetic on a Family of Elliptic Curves

Jerry Solinas (National Security Agency, USA)

12:20-1:30 Lunch, De La Guerra Commons

Session 11: Number-Theoretic Systems
Chair: Tatsuaki Okamoto (NTT Laboratories, Japan)

1:30-2:00 Fast RSA-Type Cryptosystems Using n-adic Expansion

Tsuyoshi Takagi (NTT Software Laboratories, Japan)

2:00-2:30 A One Way Function Based on Ideal Arithmetic in Number Fields

Johannes Buchmann (Technische Hochschule Darmstadt, Germany) and Sachar Paulus (Technische Hochschule Darmstadt, Germany)

2:30-2:50 Break

Session 12: Distributed Cryptography
Chair: Rebecca Wright (AT&T Labs, USA)

2:50-3:20 Efficient Anonymous Multicast and Reception

Shlomi Dolev (Ben-Gurion University, Israel) and Rafail Ostrovsky (Bellcore, USA)

3:20-3:50 Efficient Group Signature Schemes for Large Groups

Jan Camenisch (ETH Zürich, Switzerland) and Markus Stadler (Ubilab/UBS, Switzerland)

3:50-4:20 Efficient Generation of Shared RSA Keys

Dan Boneh (Bellcore, USA) and Matthew Franklin (AT&T Labs, USA)

4:20-4:50 Proactive RSA

Yair Frankel (CertCo, USA and Sandia National Laboratories, USA), Peter Gemmell (Sandia National Laboratories, USA), Philip D. MacKenzie (Boise State University, Idaho), and Moti Yung (CertCo, USA)

4:50-5:35 IACR Business Meeting

6:00-9:00 Beach Barbecue, Goleta Beach

Thursday, August 21, 1997


7:00-8:00 Breakfast, De La Guerra Commons

Session 13: Hash Functions
Chair: Yuliang Zheng (Monash University, Australia)

8:30-9:00 Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information

Ran Canetti (IBM T.J. Watson Research Center, USA)

9:00-9:30 Collision-Resistant Hashing: Towards Making UOWHFs Practical

Mihir Bellare (University of California at San Diego, USA) and Phillip Rogaway (University of California at Davis, USA)

9:30-10:00 Fast and Secure Hashing Based on Codes

Lars Knudsen (Katholieke Universiteit Leuven, Belgium) and Bart Preneel (Katholieke Universiteit Leuven, Belgium)

10:00-10:30 Break

Session 14: Cryptanalysis of Secret-Key Cryptosystems
Chair: Douglas Stinson (University of Nebraska, USA)

10:30-11:00 Edit Distance Correlation Attack on the Alternating Step Generator

Jovan Dj. Golic (University of Belgrade, Yugoslavia) and Renato Menicocci (Fondazione Ugo Bordini, Italy)

11:30-12:00 Differential Fault Analysis of Secret Key Cryptosystems

Eli Biham (Technion, Israel) and Adi Shamir (Weizmann Institute of Science, Israel)

12:00-12:30 Cryptanalysis of the Cellular Message Encryption Algorithm

David Wagner (University of California at Berkeley, USA), Bruce Schneier (Counterpane Systems, USA), and John Kelsey (Counterpane Systems, USA)

12:30-2:00 Lunch, De La Guerra Commons

Adjourn


The information at this site is Copyright by the International Association for Cryptologic Research.