Crypto '99 will take place on August 15-19, 1999, at the University of California, Santa Barbara.
The schedule below is subject to change (but with low probability). The final schedule will be handed out at registration.
This schedule covers the main conference. It does not provide details for Early Arrival, Late Departure, or IEEE P1363. But see links below.
Lectures and refreshment breaks will be at Campbell Hall.
Note that breakfasts and lunches in the De La Guerra dining hall are covered as part of the residence hall package. Participants who are residing off-campus may purchase breakfast or lunch at the entry to the dining hall. (Some early arrival and late departure meals will be in the De La Guerra Annex.)
Also see further information regarding:
August, 1999 | ||||||
Su | Mo | Tu | We | Th | Fr | Sa |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
Saturday, August 14, 1999 | ||
Early Arrival | ||
Sunday, August 15, 1999 | ||
Sun 9:45-5:00 | Board of Directors Meeting | UCEN State St. Rm. |
Sun 5:00-8:00 | Conference Registration | Anacapa Formal Lounge |
Sun 5:30-10:00 | Evening Reception | Anacapa Lawn |
Monday, August 16, 1999 | ||
Mon 7:00-8:15 | Breakfast | De La Guerra |
Mon 8:30-8:40 | Opening Remarks | Don Beaver |
Mon 8:40-9:55 | Public Key Cryptanalysis I | Chair: Bart Preneel |
On the Security of RSA Padding | Jean-Sébastien Coron, David Naccache, Julien P. Stern | |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization | Aviad Kipnis, Adi Shamir | |
The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications | Phong Nguyen, Jacques Stern | |
Mon 9:55-10:20 | Morning Break | |
Mo 10:20-11:20 | Invited Lecture | |
Information-Theoretic Cryptography | Ueli Maurer | |
Mo 11:20-12:10 | Secure Communication and Computation | Chair: Moti Yung |
Information Theoretically Secure Communication in the Limited Storage Space Model | Yonatan Aumann, Michael O. Rabin | |
The All-Or-Nothing Nature of Two-Party Secure Computation | Amos Beimel, Tal Malkin, Silvio Micali | |
Mon 12:15-1:30 | Lunch | De La Guerra |
Mon 2:00-3:40 | Distributed Cryptography | Chair: Kazuo Ohta |
Adaptive Security for Threshold Cryptosystems | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawzcyk, Tal Rabin | |
Two Party RSA Key Generation | Niv Gilboa | |
Robust Distributed Multiplication without Interaction | Masayuki Abe | |
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting | Berry Schoenmakers | |
Mon 3:40-4:05 | Afternoon Break | |
Mon 4:05-5:20 | Secret-Key Cryptography | Chair: Andrew Klapper |
Truncated Differentials and Skipjack | Lars R. Knudsen, M.J.B. Robshaw, David Wagner | |
Fast Correlation Attacks based on Turbo Code Techniques | Thomas Johansson, Fredrik Jönsson | |
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality | Subhamoy Maitra, Palash Sarkar | |
Mon 7:00-10:00 | Dinner | Anacapa Lawn |
Tuesday, August 17, 1999 | ||
Tue 7:00-8:15 | Breakfast | De La Guerra |
Tue 8:30-10:10 | Message Authentication Codes | Chair: Xuejia Lai |
UMAC: Fast and Secure Message Authentication | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway | |
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions | Mark Etzel, Sarvar Patel, Zulfikar Ramzan | |
Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions | Jee Hea An, Mihir Bellare | |
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier | Mihir Bellare, Oded Goldreich, Hugo Krawczyk | |
Tue 10:10-10:35 | Morning Break | |
Tue 10:35-12:15 | Public-Key Cryptanalysis II | Chair: Arjen Lenstra |
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 | Phong Nguyen | |
Weakness in Quaternion Signatures | Don Coppersmith | |
Cryptanalysis of "2R" Schemes | Ye Ding-Feng, Lam Kwok-Yan, Dai Zong-Duo | |
Factoring N =3D p^r q for Large r | Dan Boneh, Glenn Durfee, Nick Howgrave-Graham | |
Tue 12:15-1:30 | Lunch | De La Guerra |
Tue afternoon | Open | (free buses to downtown S.B.) |
Tue 2:00-6:00 | IEEE P1363 info meeting | Anacapa Formal Lounge |
Tue 7:00-12:00 | Rump Session | Corwin Plaza |
Wednesday, August 18, 1999 | ||
Wed 7:00-8:15 | Breakfast | De La Guerra |
Wed 8:30-9:45 | Traitor Tracing | Chair: Daniel Bleichenbacher |
An Efficient Public Key Traitor Tracing Scheme | Dan Boneh, Matthew Franklin | |
Dynamic Traitor Tracing | Amos Fiat, Tamir Tassa | |
Efficient Methods for Integrating Traceability and Broadcast Encryption | Eli Gafni, Jessica Staddon, Yiqun Lisa Yin | |
Wed 9:45-10:10 | Morning Break | |
We 10:10-11:10 | Invited Lecture | |
The Evolution of Public-Key Cryptography | Martin Hellman | |
We 11:10-12:00 | Differential Power Analysis | Chair: Andrew Odlyzko |
Differential Power Analysis | Paul Kocher, Joshua Jaffe, Benjamin Jun | |
Towards Sound Approaches to Counteract Power-Analysis Attacks | Suresh Chari, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi | |
Wed 12:15-1:30 | Lunch | De La Guerra |
Wed 2:00-3:15 | Signature Schemes | Chair: Daniel Simon |
Separability and Efficiency for Generic Group Signature Schemes | Jan Camenisch, Markus Michels | |
A Forward-Secure Digital Signature Scheme | Mihir Bellare, Sara K. Miner | |
Abuse-free Optimistic Contract Signing | Juan A. Garay, Markus Jakobsson, Philip MacKenzie | |
Wed 3:15-3:40 | Afternoon Break | |
Wed 3:40-4:30 | Zero Knowledge | Chair: Jean-Jacques Quisquater |
Can Statistical Zero Knowledge be made Non-Interactive? or On the Relationship of SZK and NISZK | Oded Goldreich, Amit Sahai, Salil Vadhan | |
On Concurrent Zero-Knowledge with Pre-Processing | Giovanni Di Crescenzo, Rafail Ostrovsky | |
Wed 4:30-5:30 | IACR Business Meeting | Campbell Hall (same as talks) |
Wed 6:00-9:00 | Beach Barbeque | Goleta Beach |
Wed 8:00-10:30 | Krypto Klatsch '99 | Anacapa Formal Lounge |
Thursday, August 19, 1999 | ||
Thu 7:00-8:15 | Breakfast | De La Guerra |
Thu 8:30-9:45 | Asymmetric Encryption | Chair: Serge Vaudenay |
On the Security Properties of OAEP as an All-or-nothing Transform | Victor Boyko | |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization | Mihir Bellare, Amit Sahai | |
Secure Integration of Asymmetric and Symmetric Encryption Schemes | Eiichiro Fujisaki, Tatsuaki Okamoto | |
Thu 9:45-10:10 | Electronic Cash | Chair: Serge Vaudenay |
Auditable, Anonymous Electronic Cash | Tomas Sander, Amnon Ta-Shma | |
Th 10:10-10:35 | Morning Break | |
Th 10:35-12:15 | Protocols and Broadcasting | Chair: Phillip Rogaway |
Oblivious Transfer with Adaptive Queries | Moni Naor, Benny Pinkas | |
Compressing Cryptographic Resources | Niv Gilboa, Yuval Ishai | |
Coding constructions for blacklisting problems without computational assumptions | Ravi Kumar, Sridhar Rajagopalan, Amit Sahai | |
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes | Radha Poovendran, John S. Baras | |
Thu 12:15-1:30 | Lunch | De La Guerra |
Thu 1:30 | END OF CONFERENCE | |
Friday, August 20, 1999 | ||
Late Departure | ||
Fri 8:30-5:00 | IEEE P1363 meeting | UCEN State St. Rm. |