RUMP SESSION       |
||
Warsaw, May 6, 2003 |
7:00 | Cryptanalysis of Augot and Finiasz Cryptosystem of Eurocrypt 2003 | |
Jean-Sebastien Coron, Gemplus, France | ||
7:07 | Cryptanalysis of the General Approach of the Polynomial-Reconstruction Based Public Key System | |
Moti Yung, Columbia University, joint work with Aggelas Kiayias | ||
7:12 | Cryptanalysis of the Alleged SecurID Hash Function | |
Alex Biryukov, joint work with Joseph Lano, Bart Preneel | ||
7:17 | On the Lenstra-Verheul Guidelines for Selecting Key Sizes | |
Alain P. Hiltgen, Switzerland | ||
7:20 | A Linear Distinguishing Attack on Scream | |
Alexander Maximov, joint work with Thomas Johansson | ||
7:25 | Cryptoanalysis of the Solitaire cipher | |
Marina Pudovkina, MPEI, Russia | ||
7:30 | (1) Chemical Combinatorial Attacks; and (2) PKZIP RSA | |
David Naccache, Gemplus | ||
7:34 | Twirl Twiddles Too | |
Arjen Lenstra, joint work with Hughs, Leyland, Dodson |
7:38 | Lower Bounds on the Efficiency of Encryption and Digital Signature Schemes |
Rosario Gennaro, IBM, USA, joint work with Yael Gertner, Jonathan Katz | |
7:43 | How to Fool an Unbounded Adversary with a Short Key Even Better |
Adam Smith, USA | |
7:48 | Public Key with Single Key per User with Escrow-Encryption and Non-Escrow Sining |
Moti Young, Columbia University, joint work with Lee | |
7:53 | Sequential Aggregate Signatures from Trapdoor Homomorphic Permutations |
Hovav Shacham, Stanford | |
7:58 | Parallel Signcryptionfrom any trapdoor permutation |
Yevgeniy Dodis, USA, joint work with Michael Freedman, Shabsi Walfish | |
8:03 | Subgroup Signatures and Constant Size Ring Signatures |
Yevgeniy Dodis, USA, joint work with Aggelos Kiayias, Antonio Nicolosi, Victor Shoup |
8:08 | New European Schemes for Signature, Integrity, and Encryption |
Bart Preneel, Belgium | |
8:13 | 2nd International Security in Storage Workshop |
James Hughs | |
8:15 | IEEE Security in Strage Standard Group |
James Hughs | |
8:17 | RusCrypto |
Antony Lebedev, LANCrypto, Moscow | |
8:19 | Asiacrypt 2003 |
Chi-Sung Laih, Taiwan |
8:40 | Secure Multiplication of Shared Secrets in the Exponent |
Rosario Gennaro, IBM, USA joint work with Mario Di Raimondo, U. of Catania, Italy | |
8:45 | Graphs in cryptography, proposal for new optics |
Kamil Kulesza, Polish Academy of Science, joint work with Zbigniew Kotulski | |
8:50 | Geometry of Compact Manifolds in Cryptography |
Laszlo Csimras, Hungary | |
8:55 | On the Power of Quantum Memory |
Renato Renner, joint work with Robert Konig, Ueli Maurer | |
9:00 | Cryptography, CS, and Quantum Computing Research Program Testing |
Steve Meyer, USA | |
9:05 | Honey, I shrunk the Bank Notes |
Marc Joye, France, joint work with David Naccache |
9:11 | On the Additive Differential Probability of Exclusive-Or |
Johan Wallen, Finland, joint work with Philippe Dumas, Helger Lipmaa | |
9:14 | The unicity distance of GI stream ciphers |
Marina Pudovkina, MPEI Russia | |
9:19 | Rabbit: A New High-Performance Stream Cipher |
Ove Scavenius, Cryptico, Denmark, joint work with Martin Boesgaard, Mette Vesterager, Tomas Pedersen, Jesper Christiansen | |
9:24 | On Designing Fast Ciphers Based on Data-Dependent Operation |
Nick A. Moldovyan | |
9:29 | Now that FAGCI is dismissed, what follows? |
Anatoly Lebedev, LANCrypto, Russia |