Crypto '99 will take place on August 15-19, 1999, at the University of California, Santa Barbara.
This schedule is PRELIMINARY and is subject to change!
Currently, only the (tentative) presentation schedule is provided. The schedule of events will be included later.
August, 1999 | ||||||
Su | Mo | Tu | We | Th | Fr | Sa |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
Saturday, August 14, 1999 | ||
Early Arrival (no events) | ||
Sunday, August 15, 1999 | ||
Arrival and Registration | ||
Monday, August 16, 1999 | ||
Mon 8:30-8:40 | Opening Remarks | Don Beaver |
Mon 8:40-9:55 | Public Key Cryptanalysis I | |
On the Security of RSA Padding | Jean-Sébastien Coron, David Naccache, Julien P. Stern | |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization | Aviad Kipnis, Adi Shamir | |
The Hardness of the Hidden Subset Sum Problem and its Cryptographic Implications | Phong Nguyen, Jacques Stern | |
Mon 10:20-11:20 | Invited Lecture | |
Information-Theoretic Cryptography | Ueli Maurer | |
Mon 11:20-12:10 | Secure Communication and Computation | |
Information Theoretically Secure Communication in the Limited Storage Space Model | Yonatan Aumann, Michael O. Rabin | |
The All-Or-Nothing Nature of Two-Party Secure Computation | Amos Beimel, Tal Malkin, Silvio Micali | |
Mon 2:00-3:40 | Distributed Cryptography | |
Adaptive Security for Threshold Cryptosystems | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawzcyk, Tal Rabin | |
Two Party RSA Key Generation | Niv Gilboa | |
Robust Distributed Multiplication without Interaction | Masayuki Abe | |
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting | Berry Schoenmakers | |
Mon 4:05-5:20 | Secret-Key Cryptography | |
Truncated Differentials and Skipjack | Lars R. Knudsen, M.J.B. Robshaw, David Wagner | |
Fast Correlation Attacks based on Turbo Code Techniques | Thomas Johansson, Fredrik Jönsson | |
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality | Subhamoy Maitra, Palash Sarkar | |
Tuesday, August 17, 1999 | ||
Tue 8:30-10:10 | Message Authentication Codes | |
UMAC: Fast and Secure Message Authentication | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway | |
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions | Mark Etzel, Sarvar Patel, Zulfikar Ramzan | |
Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions | Jee Hea An, Mihir Bellare | |
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier | Mihir Bellare, Oded Goldreich, Hugo Krawczyk | |
Tue 10:35-12:15 | Public-Key Cryptanalysis II | |
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 | Phong Nguyen | |
Weakness in Quaternion Signatures | Don Coppersmith | |
Cryptanalysis of "2R" Schemes | Ye Ding-Feng, Lam Kwok-Yan, Dai Zong-Duo | |
Factoring N =3D p^r q for Large r | Dan Boneh, Glenn Durfee, Nick Howgrave-Graham | |
Tue afternoon | Open | |
Tue evening | Rump Session | |
Wednesday, August 18, 1999 | ||
Wed 8:30-9:45 | Traitor Tracing | |
An Efficient Public Key Traitor Tracing Scheme | Dan Boneh, Matthew Franklin | |
Dynamic Traitor Tracing | Amos Fiat, Tamir Tassa | |
Efficient Methods for Integrating Traceability and Broadcast Encryption | Eli Gafni, Jessica Staddon, Yiqun Lisa Yin | |
Wed 9:45-10:45 | Invited Lecture | |
The Evolution of Public-Key Cryptography | Martin Hellman | |
Wed 11:10-12:00 | Differential Power Analysis | |
Differential Power Analysis | Paul Kocher, Joshua Jaffe, Benjamin Jun | |
Towards Sound Approaches to Counteract Power-Analysis Attacks | Suresh Chari, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi | |
Wed 2:00-3:15 | Signature Schemes | |
Separability and Efficiency for Generic Group Signature Schemes | Jan Camenisch, Markus Michels | |
A Forward-Secure Digital Signature Scheme | Mihir Bellare, Sara K. Miner | |
Abuse-free Optimistic Contract Signing | Juan A. Garay, Markus Jakobsson, Philip MacKenzie | |
Wed 3:40-4:30 | Zero Knowledge | |
Can Statistical Zero Knowledge be made Non-Interactive? or On the Relationship of SZK and NISZK | Oded Goldreich, Amit Sahai, Salil Vadhan | |
On Concurrent Zero-Knowledge with Pre-Processing | Giovanni Di Crescenzo, Rafail Ostrovsky | |
Wed 4:30-5:30 | IACR Business Meeting | |
Thursday, August 19, 1999 | ||
Thu 8:30-9:45 | Asymmetric Encryption | |
On the Security Properties of OAEP as an All-or-nothing Transform | Victor Boyko | |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization | Mihir Bellare, Amit Sahai | |
Secure Integration of Asymmetric and Symmetric Encryption Schemes | Eiichiro Fujisaki, Tatsuaki Okamoto | |
Thu 9:45-10:10 | Electronic Cash | |
Auditable, Anonymous Electronic Cash | Tomas Sander, Amnon Ta-Shma | |
Thu 10:35-12:15 | Protocols and Broadcasting | |
Oblivious Transfer with Adaptive Queries | Moni Naor, Benny Pinkas | |
Compressing Cryptographic Resources | Niv Gilboa, Yuval Ishai | |
Coding constructions for blacklisting problems without computational assumptions | Ravi Kumar, Sridhar Rajagopalan, Amit Sahai | |
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes | Radha Poovendran, John S. Baras | |
Friday, August 20, 1999 | ||
Late Departure (no events) |