Crypto 99 Preliminary Schedule

Crypto '99 will take place on August 15-19, 1999, at the University of California, Santa Barbara.

This schedule is PRELIMINARY and is subject to change!

Currently, only the (tentative) presentation schedule is provided. The schedule of events will be included later.

August, 1999
Su Mo Tu We Th Fr Sa
8 9 10 11 12 13 14
15 16 17 18 19 20 21

Saturday, August 14, 1999
  Early Arrival (no events)  
Sunday, August 15, 1999
  Arrival and Registration  
Monday, August 16, 1999
Mon 8:30-8:40 Opening Remarks Don Beaver
Mon 8:40-9:55 Public Key Cryptanalysis I  
  On the Security of RSA Padding Jean-Sébastien Coron, David Naccache, Julien P. Stern
  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization Aviad Kipnis, Adi Shamir
  The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications Phong Nguyen, Jacques Stern
Mon 10:20-11:20 Invited Lecture  
  Information-Theoretic Cryptography Ueli Maurer
Mon 11:20-12:10 Secure Communication and Computation  
  Information Theoretically Secure Communication in the Limited Storage Space Model Yonatan Aumann, Michael O. Rabin
  The All-Or-Nothing Nature of Two-Party Secure Computation Amos Beimel, Tal Malkin, Silvio Micali
Mon 2:00-3:40 Distributed Cryptography  
  Adaptive Security for Threshold Cryptosystems Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawzcyk, Tal Rabin
  Two Party RSA Key Generation Niv Gilboa
  Robust Distributed Multiplication without Interaction Masayuki Abe
  A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting Berry Schoenmakers
Mon 4:05-5:20 Secret-Key Cryptography  
  Truncated Differentials and Skipjack Lars R. Knudsen, M.J.B. Robshaw, David Wagner
  Fast Correlation Attacks based on Turbo Code Techniques Thomas Johansson, Fredrik Jönsson
  Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality Subhamoy Maitra, Palash Sarkar
Tuesday, August 17, 1999
Tue 8:30-10:10 Message Authentication Codes  
  UMAC: Fast and Secure Message Authentication John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
  Square Hash: Fast Message Authentication via Optimized Universal Hash Functions Mark Etzel, Sarvar Patel, Zulfikar Ramzan
  Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions Jee Hea An, Mihir Bellare
  Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier Mihir Bellare, Oded Goldreich, Hugo Krawczyk
Tue 10:35-12:15
Public-Key Cryptanalysis II
 
  Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 Phong Nguyen
  Weakness in Quaternion Signatures Don Coppersmith
  Cryptanalysis of "2R" Schemes Ye Ding-Feng, Lam Kwok-Yan, Dai Zong-Duo
  Factoring N =3D p^r q for Large r Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
Tue afternoon Open  
Tue evening Rump Session  
Wednesday, August 18, 1999
Wed 8:30-9:45 Traitor Tracing  
  An Efficient Public Key Traitor Tracing Scheme Dan Boneh, Matthew Franklin
  Dynamic Traitor Tracing Amos Fiat, Tamir Tassa
  Efficient Methods for Integrating Traceability and Broadcast Encryption Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
Wed 9:45-10:45 Invited Lecture  
  The Evolution of Public-Key Cryptography Martin Hellman
Wed 11:10-12:00 Differential Power Analysis  
  Differential Power Analysis Paul Kocher, Joshua Jaffe, Benjamin Jun
  Towards Sound Approaches to Counteract Power-Analysis Attacks Suresh Chari, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi
Wed 2:00-3:15 Signature Schemes  
  Separability and Efficiency for Generic Group Signature Schemes Jan Camenisch, Markus Michels
  A Forward-Secure Digital Signature Scheme Mihir Bellare, Sara K. Miner
  Abuse-free Optimistic Contract Signing Juan A. Garay, Markus Jakobsson, Philip MacKenzie
Wed 3:40-4:30 Zero Knowledge  
  Can Statistical Zero Knowledge be made Non-Interactive? or On the Relationship of SZK and NISZK Oded Goldreich, Amit Sahai, Salil Vadhan
  On Concurrent Zero-Knowledge with Pre-Processing Giovanni Di Crescenzo, Rafail Ostrovsky
Wed 4:30-5:30 IACR Business Meeting  
Thursday, August 19, 1999
Thu 8:30-9:45 Asymmetric Encryption  
  On the Security Properties of OAEP as an All-or-nothing Transform Victor Boyko
  Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization Mihir Bellare, Amit Sahai
  Secure Integration of Asymmetric and Symmetric Encryption Schemes Eiichiro Fujisaki, Tatsuaki Okamoto
Thu 9:45-10:10 Electronic Cash  
  Auditable, Anonymous Electronic Cash Tomas Sander, Amnon Ta-Shma
Thu 10:35-12:15 Protocols and Broadcasting  
  Oblivious Transfer with Adaptive Queries Moni Naor, Benny Pinkas
  Compressing Cryptographic Resources Niv Gilboa, Yuval Ishai
  Coding constructions for blacklisting problems without computational assumptions Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
  An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes Radha Poovendran, John S. Baras
Friday, August 20, 1999
  Late Departure (no events)  




































crypto99@iacr.org