______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter Vol. 16, No. 2, Summer 1999. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * Crypto '99 * 1999 Elections Announcement and Nominations * Eurocrypt '99 Rump Session * Treasurer's Report for 1998 * Minutes of the BoD Meeting at Crypto '98 * Bridge Tournament Deals * Announcements + New Reports in the Theory of Cryptography Library + FSE 2000 * New Books * Calendar of Events in Cryptology * IACR Contact Information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the third electronic issue of the IACR Newsletter! This issue contains information about the upcoming Crypto '99 conference, the upcoming IACR elections, and a mix of further items about IACR's activities. Under Bridge Tournament Deals, we bring a real-world problem in secure randomness generation to the attention of IACR's cryptographers. Poor random generators have apparently been in use to generate bridge tournament deals and have led to dissatisfaction about computer-generated deals. Cryptography and bridge certainly share common ways of thinking, which is apparent by large number of people interested in both! For information about upcoming workshops and confereneces, check the Calendar section or www.iacr.org/events! If you have not received the IACR Newsletter by Email and would like to recive it in the future, then check out your Email address in the IACR member list that has been mailed in February 1999. IACR can only provide you with accurate information if you contribute your input. Please send in announcements of workshops, conferences, calls for papers, or any other item of interest to IACR members. The address for all submissions to the Newsletter and Calendar is newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in October. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ Crypto '99 ______________________________________________________________________________ Crypto '99 will take place at UC Santa Barbara on August 15-19, 1999. Registration and program information can be found at http://www.iacr.org/conferences/c99/ ______________________________________________________________________________ 1999 Elections Announcement and Nominations ______________________________________________________________________________ IACR Nominations Committee (see www.iacr.org/bod.html for addresses): Eli Biham Matt Franklin (Chair) Peter Landrock (Returning Officer) Positions for this Election: Post 3 Directors Term January2000 - December 2002 Incumbent Gilles Brassard, Ueli Maurer, Bart Preneel Nominators must be members of the IACR, and Nominees must be regular members of the IACR. Candidates may submit a statement of up to 50 words in length which will be included on the election ballot form. Nominations must be faxed or mailed to be received no later than SEPTEMBER 15, 1999. No email or hand delivery will be accepted! Candidates' Statements must be emailed or faxed or mailed to be received no later than SEPTEMBER 20, 1999. No hand delivery will be accepted! All correspondence must be directed to: Matt Franklin Xerox PARC email: franklin@parc.xerox.com 3333 Coyote Hill Road Phone: 650-812-4228 Palo Alto, CA 94306, USA Fax: 650-812-4471 Nominations and Statements will be acknowledged within three (3) working days of receipt (before the deadlines). It is the responsibility of the candidates to ensure that Nominations and Statements are received! Ballots will be mailed by OCTOBER 1, 1999. Ballots must be mailed to be received by the Returning Officer in the official envelopes by NOVEMBER 15, 1999. This information and a nomination form for printing is available online from http://www.iacr.org/elections/99/nominate.html Postscript: http://www.iacr.org/elections/99/nominate.ps PDF: http://www.iacr.org/elections/99/nominate.pdf LaTeX http://www.iacr.org/elections/99/nominate.tex ______________________________________________________________________________ Eurocrypt '99 Rump Session ______________________________________________________________________________ Chair: Ross Anderson * 7.30: Opening Remarks * 7.35: Adi Shamir, Factoring large numbers with the TWINKLE device (see also the [1]associated paper) * 7.45: David Naccache, Practical tricks and attacks * 7.55: Niels Möller, [2]LSH - a free/open source implementation of the SSH v2 protocols * 8.05: Jean-Sebastien Coron, Differential power analysis for elliptic curve cryptosystems * 8.15: Wolfgang Killmann, Cryptanalysis of the Jakubowski-Venkatesan chain and sum primitive * 8.35 - 8.50: break * 8.50: Helena Handschuh, A Universal Encryption Standard * 9.00: Matthew Kwan, Bitslice DES with a reduced gate count * 9.10: Elannia Kresnicker & Jonathan Stiebel, Cryptanalysis of full 32 round Skipjack * 9.20: Ivan Damgaard, Matthias Fitzi, Martin Hirt & Ueli Maurer, A problem with a mixed adversary protocol from Crypto 98 and its solution * 9.30: Claus Peter Schnorr & Markus Jakobsson, Security in the random oracle and generic model * 9.40: Shai Halevi & Silvio Micali, Two observations regarding RSA-based signatures and VPRFs * 9.45: Keith Martin, [3]New Journal Announcement * 9.46 - 10.00: break * 10.00: Grodon Agnew, Fun with crypto - or how I almost failed my own crypto exam * 10.10: Moti Yung, Tomas Sander and Andrew Young, Cryptocomputing: manipulating encrypted data over secure (log-depth circuit) functions * 10.20: LJ Garcia-Villalba, A Fister-Sabater, 2^k-Distant functions: pseudorandom sequence generators with identical cryptographic properties * 10.30: Simon Agon, On explicit formulas for r-th roots in Galois fields * 10.40: Ivan Damgaard, Concurrent zero-knowledge is easy in practice * 10.50: Martin Hendrych, Quantum cryptography demonstration * 11.00: adjourn References 1. http://jya.com/twinkle.eps 2. http://www.lysator.liu.se/~nisse/archive/ 3. http://www.esat.kuleuven.ac.be/~rijmen/crap/ 4. http://www.iacr.org/index.html 5. http://www.iacr.org/conferences/index.html 6. http://www.iacr.org/copyright.html ______________________________________________________________________________ Treasurer's Report for Calendar Year 1998 ______________________________________________________________________________ The IACR is financially healthy with slowly growing cash reserves that are consistent with our growing membership and conference attendance. Both Crypto 98 and Eurocrypt 98 returned a small surplus. Eurocrypt 98 had a total income of $205,000. Of that amount, a total of $53,000 was returned to the IACR ($29,000 in IACR dues, a $10,000 allocation for the Secretariat and a surplus of $14,000). The remainder of the funds covered the expenses of the conference. Crypto 98 had a total income of $226,000 (not including income for on-campus lodging). Of that amount a total of $62,000 was returned to the IACR ($28,000 in IACR dues, a $10,000 allocation for the Secretariat and a surplus of $24,000). The remainder of the funds covered the expenses of the conference. In 1998 the IACR had 1049 members (918 regular, 131 student) and the membership fee was $72 ($36 student). (For 1999 the membership fees are $80 regular, $40 student). Of the $72 membership fee, $49 (68%) is for the cost of the Journal of Cryptography; $10 (14%) is allocated for the Secretariat; and the remainder is used for miscellaneous expenses such as mailings and the web page. As of December 31 1998, the IACR had $150,000 held in certificates of deposit and approximately $170,000 held in the main IACR and Crypto checking accounts. Of those amounts about $100,000 is already designated for specific expenditures in 1999 (such as the Journal), leaving about $220,000 as the true surplus. Jimmy Upton IACR Treasurer June 1, 1999 ______________________________________________________________________________ Minutes of the BoD Meeting at Crypto '98 ______________________________________________________________________________ Board of Directors Meeting CRYPTO '98 Santa Barbara 23 August 1998 The President, Kevin McCurley, called the meeting to order at 10:05AM. Present: McCurley, Berson, Cachin, Diffie, Feigenbaum, Hruby, Imai, Klapper, Matsumoto, Maurer, Okamoto, Pfitzmann, Preneel, Upton, Van Oorschot, Tavares. Also Present: Miki Swick, IACR Secretariat 1. Welcome and Identification of proxies Kevin welcomed the members present. Proxies: Tom for Gilles Brassard Kevin for Don Beaver Bart for Peter Landrock Jimmy for Andy Clark 2. Agenda The agenda as distributed was approved. 3. Minutes from the last meeting Motion: (Berson/Preneel) Move to aprove the minutes. Carried(11/0) 4. CRYPTO '98 Status Report(Klapper) Andrew reported that the new secretariat was doing a wonderful job and it has been a big success. As of last Tuesday, 500 persons had registered. He was expecting a surplus of $13,000, not including funds set aside for the secretariat($20K). There will be no group photo this year and there will be lots of students. Kevin enquired about stipends. Andrew replied that he was offering room, board, registration, and travel for speakers. For others he offered a similar package, but omitted the travel stipend. It was asked if the stipend was too generous? Andrew replied that to date the requests were not excessive. In response to other questions, he said there were no tax implications and no evidence of abuse of the process. 5. Review of Reports a) Membership Secretary report(delayed) b) Financial report(Upton) Jimmy said that the IRS document had been filed, and $50K had been moved into a Certificate of Deposit to earn more interest. Motion(Jimmy/Paul) Motion to increase annual dues from $72 to $80 for regular members and from $36 to $40 for student members. Carried(11/0). Jimmy said that this increase will enable the IACR to cover the costs of the Secretariat. Kevin observed that the Membership Secretary is a member of the Board and he had asked Andy to serve in this role. However, Miki Swick is not a member of the Board. Tom Berson noted that on some boards people like Miki Swick are members of the board. It was also noted that the IACR contract for the Secretariat was with UCSB. Bart Preneel offered the view that the Secretariat should provide services for Eurocrypt. Jimmy Upton reminded the Board that Andrew Klapper said that UCSB was doing a wonderful job. (Miki Swick left the room) Motion:(Berson/Upton) Move that the Board invite Miki Swick as manager to be Member Secretary(13/0/1 abs.) Carried. (Micki returned to the room) Kevin explained the role of Membership Secretary to Miki and she asked for time to consider the offer. [Note: Miki subsequently declined the offer to accept a position on the board.] Return to Item 5(a) V.P. Report from Andy Clark(Jimmy) Alert condition: CD-ROM to come Database contains list of IACR membership and has been sent to Sally Vito(IACR Secretariat) Miki said that she was learning a lot and that things were better since they were more closely involved. This was beneficial especially to new conference attendees. It was propoposed that an attendee list be published at the start of the conference and an addendum be published at the end. Kevin suggested that we consider automated electronic registration. Miki wondered if it was O.K to videotape social events. Kevin asked what it would cost to videotape talks at Crypto and what would UCSB charge for this service. 5(d) Journal Editor's report Joan Feigenbaum's term as Editor is coming to the end, and Joan is willing to stand for another term. The matter of backlogs for the Journal was raised and Joan said the real backlog was one year. Kevin said our backlog seemed to be higher than others(cf. AMS notices), but it was not out of line. Kevin said that Springer is providing access to an electronic version of the Journal. It was felt that the IACR should have the author index. Joan said it may be available on Springer's LINK service and she will ask Sabrina Paris at Springer. Kevin aked if Joan would send it to him by email. Paul said the information is available in the "Handbook"(Handbook of Applied Cryptography). Andrew Klapper pointed out that at the recent IEEE Information Theory Conference a set of CD-ROMs of all IT Transactions was distributed to all attendees. Joan said that she had written guidelines for referees and wondered how to proceed. It was suggested that referees should be listed in the back of the Journal of Cryptology. Kevin thanked Joan for doing a wonderful job. 12. Eurocrypt 2000 Status(Preneel) Moved Forward Jimmy said that that the budget seems to be O.K. It was asked who sponsors student attendees and was there a rate for academics. Kevin asked if the meeting room was big enough? The reply was that the room could hold 550 and that Eurocrypt had not grown recently. 5(c) Asiacrypt incorporation report(Bylaws and Asiacrypt: Berson) Tom said there were a number of unresolved questions: Question 1: Should there be a third Board Meeting? There should be a Business Meeting at Asiacrypt. Okamoto suggested that there should be two Board meetings per year and the Board should vote on where to hold the meetings. Jimmy observed that the Bylaws should say that there should be at least one meeting per year(could be electronic or paper). It was observed that such changes would require a change in the bylaws. Kevin added that the Bylays should not specify the conferences where Board meetings are held. It could simply state that the IACR sponsors three confereces per year. Question 2(Berson) Does the IACR need a third Board meeting. No. The Bylaws call for at least one board meeting per year. Birgit volunteered to revise the Bylaws. Question 3(Berson) Should there be a General Assembly at Asiacrypt? Yes. This raises the matter of a quorum. Jimmy noted that we can count proxy votes to get a quorum. Paul added that the wording in the Bylaws is not ambiguous. We should change the wording to count proxies. Diffie commented that there are some proxies that may be very, very, useful. The Bylaws count proxies as present. Kevin reminded the Board that the Bylaws change for this election. The Board will vote by email. 6. Report on Newsletter Status(Kevin) The new format is electronic. Kevin called Fritz Bauspiess about he Newsletter and informed the Board that Fritz has resigned as Editor. Christian has agreed to be the Newsletter Editor. Kevin then invited Christian to speak. Christian said that paper is out of date and the Newsletter should go electronic. He will make use of the IACR Website. There will be email updates two or three times per year. The content will include: IACR reports, conference reports, rump session, slides from distinguished lectures, submissions, bookreviews, etc. Don Beaver raised the isue of access. Will there be open access? Christian replied that there would be no access control. Kevin said there would be editorial control and the Newsletter would provide value to members. He also observed that the webpage would be in the U.S. and subject to U.S. government regulations. Joan added that the Journal may have a problem with source code. Christian addressed the problem of who will receive the electronc newsletter. He noted that most members have email. Jimmy said that we should provide a service for those with problems. Birgit suggested that we should send a paper version to those who requested it. Motion(Diffie/Maurer): Move to approve the appointment of Christian as Newsletter Editor. Carried(16 for/0 against). 8. Asiacrypt steering committee(ASC) report(Hideki) 1. ASC unanimously accepts accepts the BoD recommendation 2. Future Asiacrypt conferences: 1999 Singapore, Nov. 14-18, "in cooperation with" 2000 sponsored by IACR 2001 There are two proposals: * Taiwan * Australia The proposal for ASIACRYPT 2000 was circulated at the meeting. Kevin raised the matter of the budget for ASIACRYPT 2000. He said there was an approval process for the budget for IACR conferences. Tatsuaki will send the proposed budget to Jimmy. It was asked if there was sufficient hotel space available. The answer was yes. Kevin asked what was the size of the meeting room. The answer was there was seating for 1000. The organizers estimated a breakeven budget for 250 registrants. The estimated registration fee if 300 attend is approximately $180,which excludes the proceedings. The cost of the banquet will be covered by sponsors. The cost to attendees should be less than the cost of Eurocrypt. Kevin asked the organizers to clear the Registration form with the Board. Miki said that the Secretariat has the IACR database and they send out the registration material for all the IACR conferences. Kevin said he wanted registrations to be handled in a uniform manner. Motion: Approve the ASIACRYPT 2000 proposal(15 for/0 against) It was pointed out that the proposal is separate from the appointment of Program Chairs. It was also pointed out that the General Chair Guidelines need updating to take into account the creation of the Secretariat. 9. IACR 1998 Elections(Preneel/Maurer) Material will also include revision to Bylaws. 10. EUROCRYPT '99(Hruby) To be held May 2-6,1999 in Prague. Hruby made a presentation to the Board on the progress to date. There was a problem with the registration form that needed to be sorted out. 11. CRYPTO '99 Status(Beaver) The dates are August 15-19, 1999. The General Chair will decide whether or not to have a group photo. It was asked if there would be videotaping of the presentations. This will be decided later. 12. EUROCRYPT 2000 Status (Moved forward in Agenda) 13. EUROCRYPT 2001 Kevin was aware of a pre-proposal and this item was tabled. 14. CRYPTO 2000 planning Candidates for the Program Chair and General chair were nominated and discussed. A slate of candidates was approved. Mihir Bellare will be the Program Chair and Matt Franklin will be the General Chair. 15. CD-ROM of past Proceedings Kevin said that they were very close to production. The material had been scanned and there will be keyword index(from the OCR). It is necessary to compress the material as there are 16,400 pages(1275 papers). The CD-ROM should be available at the end of the year. Springer will mail the CD-ROM to those who paid for it. Bart said that we should thank Kevin for his efforts to create the CD-ROM. 16 Copyright of Proceedings Authors at IACR papers have copyright, except for EUROCRYPT '96. The copyright form has been mailed to authors by the Program Committee. Kevin said the plan was to formalize the copyright agreement with Springer for 2001. Joan added that the copyright form should be the same for the Journal and the Proceedings. Diffie said that they were two distinct things, involving three or four entities. We should empower "the employee". The goals should be free dissemination of scientific material and that the copyright should revert to the authors and/or the IACR. Kevin said that he will finalize the form by the end of September. Motion: To request Kevin to prepare the form by the end of September (Stafford/Jimmy)(12 for/ 0 against). 17. Other business Tatsuaki asked about the policy of electronic submission for future conferences. He said that we do not have the infrastructure. He was referred to Hugo on this matter. Ueli will take responsibility for the Program Chair Guidelines. He supported the view that the Program Chair should "approve" the Program Commttee. Tom commented that the Board meetings caused him some distress. There is no strategic direction and no time to plan. We also waste the time of the members of the Board. Kevin answered that he and Andy had met to discuss this and had some proposals, e.g., to email the distribution of reports. 18. Draft Agenda for Business Meeting A list of items was drawn up that Kevin would address at the Business Meeting. 19. Action Items Kevin made a list of the action items. There followed an informal discussion and brainstorming on a variety of strategic issues for the IACR. The meeting adjourned at 5:10PM Stafford Tavares Secretary of the IACR _____________________________________________________________________________ Bridge Tournament Deals ______________________________________________________________________________ Bridge tournaments have been using computer-generated deals for many years. The deals are printed on sheets of paper, carried to the tournament site in sealed envelopes, and read by humans who hand-sort the physical cards. Unfortunately, there is a growing dissatisfaction with the process, partly because (a) the hand-generation algorithm is secret, and (b) sets of deals have been observed to recur. A search for better methods is being coordinated by The Bridge World Magazine. I think the problem may interest some of IACR's members, so I'd like to act as a "synapse" between the two communities. Jeff Rubens has given us permission to reprint his recent editorial, which is attached below. It includes an email address (dealing@bridgeworld.com) for getting included in their discussions. Matt Franklin franklin@parc.xerox.com ______________________________________________________________________________ Reprinted from The Bridge World Magazine, Editorial, May 1999: Humans: Unite! Computers are messing up our tournaments, and that must stop. In a previous Editorial, we complained about the laxity that more than once allowed the reuse of sets of machine-produced deals to wreak havoc on an American event. This affliction is worldwide: Repeat sessions turned up in a major Australian championship and in the 1997 World Junior Teams. And the reported sightings are only the ones we know about. Obviously, administrators are not coping with this problem and need help. Let's see that they get it. We propose, will help to organize, and will act as a clearinghouse for a worldwide effort to produce a standard deal-generating procedure. If implemented with care, checked thoroughly, and adopted everywhere, such a method would have many significant advantages over the current approach, including: (1) Avoiding the unrecoverable disaster of players' recognizing the reappearance of an old set of deals. (2) Facilitating the distribution of information. Organizers of multi-site events using duplicated boards could distribute the information needed to create the deals cheaply and quickly, reducing expenses and minimizing some security problems. (3) Producing instantaneity. Enthusiasts everywhere could play the deals from a major event, such as a world or national championship, soon after (or even, with appropriate security at the tournament site, simultaneously with) the participants, then compare their results with the stars'. This capability could open a new avenue for increasing the popularity of bridge. (4) Keystroking reduction. Less typing would be needed for the publication of deals on the Internet and in books that record the proceedings of major events. (5) Eliminating accusations of rigging. Sponsors of events featuring duplicated boards at multiple sites are sometimes accused of editing the deal sets, perhaps of "giving ample opportunities to both North-South and East-West." Such manipulating, which changes the nature of the game, is the organizational equivalent of prearranged secret signals between partners; both behaviors should engender severe, permanent penalties. It is extremely difficult either to sustain or to defend such a charge. A good way to handle the situation is to make fixing as close to impossible as we can, eliminating both the act and the charges. To stimulate thought about and action on the problem, we've put some preliminary discussion and a sample outline into a sidebar (see "A Three-Minute Algorithm"). If you want to participate in the creation, evaluation and testing of a standard dealing algorithm and programs that implement it, send an e-mail to dealing@bridgeworld.com that includes in its body your name, postal address, and e-mail address. After allowing time for signups, we will send the list of e-mail addresses to all participants, anticipate discussion and sharing of ideas among interested parties, and keep track of any results that arrive later at the "dealing" e-mail address. _________________________________________________________________ "A Three-Minute Algorithm" The first task in developing or comparing algorithms is to establish the relative importance of potential objectives, so as to be able to judge tradeoffs among different possibilities. This is our list: 1. Highest importance: Capability of convincing the public both that the dealing is mathematically correct and that everything is on the up-and-up. 2. High importance: Simple involvement in each job of a very long "seed" number that avoids reruns. 3. Fairly high importance: Ease of understanding and use, hence accessibility to "home" programmers with only moderate effort. 4. Medium importance: High difficulty of cryptanalysis from observed partial output. 5. Low importance: Machine efficiency. (Any reasonable program is going to run much faster than needed and take up less space than available, even on somewhat outdated personal computers.) Having done that, the next time we were stuck waiting for an egg-timer to trigger our further activities, we considered what algorithm might meet the criteria. Here is what we produced before the egg was ready to eat: (a) Establish a bank of a moderate number (six, say) of easy-to-program pseudorandom number generators (linear congruential, perhaps). (b) When ready to generate a set of deals, create a long seed number whose inputs are the date, the standard time at a fixed location (Greenwich, England?), the international calling code for the home country of creation, and many digits from each of at least three people (of whom at least one is local and at least one is not, the latter presumably communicating by telephone or by e-mail--a distant contributor may send digits unencrypted and need verify only that the set was created immediately after his portion was sent, making prearrangement impossible without his participation). (c) Use subsets of the seed's digits to initialize the number generators. Whenever a pseudorandom value is needed, use output from the first generator to create an integer that points at one of the others, then use the indicated generator to create a value in the interval from zero to less than one. (d) Use a number derived from (c) to determine how many of the deals first produced (or how many pseudorandom numbers) to discard. Then, for each deal, use 39 outputs from (c) to distribute one of the remaining cards to the appropriate players, by thinking of the unit interval first as broken into fifty-seconds, then into fifty-firsts, etc. We anticipate that a collective effort based on longer periods of thought (perhaps by programmers who prefer their eggs hard-boiled), whether using our general approach or not, will produce a satisfactory universal standard. ______________________________________________________________________________ Announcements ______________________________________________________________________________ New Reports in the Theory of Cryptography Library =========================================================================== The library is located at http://philby.ucsd.edu/cryptolib.html. LIST OF NEW PAPERS (March -- June 15, 1999) 99-08: J. Camenisch and I. Damgaard, Verifiable Encryption and Applications to Group Signatures and Signature Sharing, March 1999. 99-09: S. Hada and T. Tanaka, On the Existence of 3-Round Zero-Knowledge Protocols, March 1999. 99-10: S. Hada and T. Tanaka, A Relationship between One-Wayness and Correlation Intractability, March 1999. 99-11: V. Shoup, Practical Threshold Signatures, April 1999. 99-12: V. Shoup, On Formal Models for Secure Key Exchange, April 1999. 99-13: R. Gennaro, S. Halevi and T. Rabin, Secure Hash-and-Sign Signatures without the Random Oracle, April 1999. FAST SOFTWARE ENCRYPTION WORKSHOP 2000 (FSE2000) ================================================ 10-12 April 2000, New York, New York, USA CALL FOR PAPERS Fast Software Encryption is a six-year-old workshop on symmetric cryptography. Since the first workshop-held at Cambridge University in December 1993-it has grown considerably; the most recent conference, held in Rome in March 1999, had 170 people. As the U.S. government's Advanced Encryption Standard (AES) reaches a conclusion, interest in symmetric cryptography has grown considerably. In 2000, FSE is coming to the United States for the first time, to the Hilton New York and Towers, and will be held in conjunction with the 3rd AES Candidate Conference (same location, 13-14 April 2000). Instructions for Authors ------------------------ Interested parties are invited to submit original unpublished papers on the design and analysis of symmetric encryption algorithms and hash functions. In particular, we encourage submissions containing analyses of the AES. It is strongly preferred that submissions be processed in LaTeX according to http://www.springer.de/comp/lncs/authors.html, since this will be a mandatory requirement for the final papers. The paper must not exceed 15 pages in length. The LaTeX files are to be sent electronically, together with the email and physical addresses of the sender. If papers are submitted in paper form, 12 copies are required. The papers must not be submitted simultaneously to other workshops or conferences with proceedings. Preproceedings will be available at the meeting and the final proceedings will be published in the Springer-Verlag Lecture Notes in Computer Science series. Under a separate announcement, NIST will invite people to submit papers on the AES candidates to the 3rd AES Candidate Conference (AES3). Authors should submit their paper to either AES3 or FSE2000, not to both. Papers on AES candidates submitted to FSE2000 and rejected will (with the authors' permission) automatically be submitted to AES3; submitting your paper to FSE2000 does not forfeit your ability to present at AES3. Addresses for submission: Bruce Schneier, Counterpane Systems schneier@counterpane.com 101 E. Minnehaha Pkwy., Minneapolis, MN 55419, USA Important Dates --------------- Paper submission: December 31, 1999 Notification of acceptance: March 1, 2000 Final copy for preproceedings: March 24, 2000 The workshop: April 10-12, 2000 Final copy for the proceedings: May 1, 2000 Program Committee ----------------- Bruce Schneier (Chair, Counterpane) Ross Anderson (Cambridge) Eli Biham (Technion) Cunsheng Ding (Singapore) Dieter Gollmann (Microsoft) Lars Knudsen (Bergen) James Massey (Denmark) Mitsuru Matsui (Mitsubishi) Bart Preneel (K.U.Leuven) Serge Vaudenay (ENS) ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology. We are looking for reviewers! The Twofish Encryption Algorithm Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson: The Twofish Encryption Algorithm. John Wiley & Sons, 1999. $49.95, ISBN 0-471-35381-7. This book is the specification, justification, and initial cryptanalysis of Twofish. It expands on the work done for NIST as part of the AES submission process, and includes source code in C. Please send your new book announcements to the newsletter editor at newsletter(at)iacr.org ______________________________________________________________________________ IACR Calender of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members. If you want to have an event listed here, please send email to webmaster(at)iacr.org . 1999 * [1]Mathematics of Public-Key Cryptography, June 13-17, 1999, Fields Institute in Toronto, Canada. * [2]IEEE Information Theory and Networking Workshop, June 27 - July 1, 1999, Metsovo, Greece. * [3]CrypTEC '99, July 5-8, 1999, Hong Kong, China. * [4]Workshop on Selected Areas in Cryptography (SAC '99), August 9-10, 1999, Queen's University, Kingston, Canada. * [5]Workshop on Cryptographic Hardware and Embedded Systems (CHES), August 12-13, 1999, Worcester, Massachusetts, USA. * [6]Crypto '99, August 15-19, 1999, Santa Barbara, California, USA. * [7]8th USENIX Security Symposium, August 23-26, 1999, JW Marriott Hotel, Washington, D.C., USA. * [8]Second Workshop on Security in Communication Networks (SCN '99), September 16-17, 1999, Amalfi, Italy. * [9]CMS'99, Communications and Multimedia Security, September 20-21, 1999, Leuven, Belgium. * [10]Workshop on Information Hiding, September 29-October 1, 1999, Dresden, Germany. * [11]FOCS '99, October 17-19, 1999, New York City, NY. * [12]3rd Workshop on Elliptic Curve Cryptography (ECC '99), November 1-3, 1999, University of Waterloo, Waterloo, Canada. * [13]6th ACM Conference on Computer and Communications Security (ACM CCS '99), November 1-4, 1999, Singapore. * [14]Information Security Workshop (ISW '99), November 6-7, 1999, Kuala Lumpur, Malaysia. * [15]ICICS '99, 2nd International Conference on Information and Communication Security, November 9-11, 1999, Sydney, Australia. * [16]Asiacrypt '99, November 15-18, 1999, Singapore. * [17]CQRE [Secure], November 30-December 2, 1999, Duesseldorf, Germany. * [18]Seventh IMA International Conference on Cryptography and Coding, December 20-22, 1999, Royal Agricultural College, Cirencester, UK. 2000 * [19]PKC2000, International Workshop on Practice and Theory in Public Key Cryptography, January 18-20, 2000, Melbourne, Australia * [20]Financial Cryptography '00, February 21-24, 2000, Anguilla, BWI. * [21]Network and Distributed Systems Security Symposium (NDSS 2000), February 2-4, 2000, San Diego, California, USA. * [22]Fast Software Encryption Workshop (FSE2000), April 10-12, 2000, New York, USA. * [23]Eurocrypt '2000, May 14-18, Bruges/Brugge, Belgium. * Crypto '2000, August 20-24, 2000, Santa Barbara, California, USA. References 1. http://fields.utoronto.ca/publickey.html 2. http://www.cs.purdue.edu/homes/spa/itw99.html 3. http://www.cs.cityu.edu.hk/~cryptec/cryptec.htm 4. http://www.engr.mun.ca/~sac99/ 5. http://ece.wpi.edu/Research/crypt/ches/ 6. http://www.iacr.org/conferences/c99/index.html 7. http://www.usenix.org/events/sec99/ 8. http://www.unisa.it/SCN99/ 9. http://www.esat.kuleuven.ac.be/cosic/cms99/ 10. http://www.inf.tu-dresden.de/ihw99/ 11. http://www.cs.washington.edu/FOCS99/ 12. http://www.cacr.math.uwaterloo.ca/conferences/1999/ecc99/ecc99-announce.html 13. http://www.isi.edu/ccs99/ 14. http://www.musm.edu.my/BusIT/isw99/ 15. http://icics99.cit.nepean.uws.edu.au/ 16. http://www.comp.nus.edu.sg/~asia99 17. http://www.secunet.de/forum/cqre.html 18. http://www.ima.org.uk/mathematics/conferences.htm 19. http://www.pscit.monash.edu.au/pkc2k/ 20. http://fc00.ai/ 21. http://www.isoc.org/ndss2000/ 22. http://www.iacr.org/events/pages/fse2000.txt 23. http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/ ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (1999) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. Officers Kevin S. McCurley Andrew J. Clark President Vice President 6721 Tannahill Drive P.O. Box 743 San Jose, CA 95120 Brighton USA East Sussex Phone: (408) 927-1838 BN1 5HS Email: [president(at)iacr.org] United Kingdom Phone: +44 1273 270752 Fax: +44 1273 276558 Email: [vicepresident(at)iacr.org] Josh Benaloh Jimmy Upton Secretary Treasurer Microsoft Research Uptronics Incorporated One Microsoft Way 298 S. Sunnyvale Ave, Suite 211 Redmond, WA 98052 Sunnyvale, CA 94086-6245 USA USA Phone: (425) 703-3871 Phone: (408) 774-6202 Fax: (425) 936-7329 Fax: (408) 774-6201 Email: [secretary(at)iacr.org] Email: [treasurer(at)iacr.org] Directors Don Beaver Thomas Berson Crypto '99 General Chair Anagram Labs Certco Inc. P.O. Box 791 55 Broad Street, 22nd Floor Palo Alto CA, 94301 New York, NY 10004 USA USA Phone: (415) 324-0100 Phone: (212) 709-8900 Email: [berson(at)anagram.com] Fax: (212) 709-6754 Email: crypto99(at)iacr.org Eli Biham Gilles Brassard Computer Science Department Département IRO Technion Université de Montréal Haifa 32000 C.P. 6128, succursale centre-ville Israel Montréal, Québec H3C 3J7 Email: [biham(at)cs.technion.ac.il] Canada Voice: +972-4-8294308 Email: [brassard(at)iro.umontreal.ca] Fax: +972-4-8221128 Christian Cachin Whitfield Diffie IACR Newsletter Editor MTV01-40 IBM Zurich Research Laboratory Sun Microsystems Säumerstrasse 4 2550 Garcia Avenue CH-8803 Rüschlikon Mountain View, CA 94043 Switzerland USA Email: [cachin(at)acm.org] Email: Phone: +41-1-724-8989 [whitfield.diffie(at)eng.sun.com] Fax: +41-1-724-8953 Joan Feigenbaum Matt Franklin Editor-in-Chief, Journal of Cryptology Crypto '2000 General Chair AT&T Labs Research Xerox PARC Room C203 3333 Coyote Hill Road 180 Park Avenue Palo Alto, CA 94304 Florham Park, NJ 07932-0971 (W) 650-812-4228 USA (fax) 650-812-4471 Email: [jf(at)research.att.com] Email: crypto2000(at)iacr.org [jofc(at)iacr.org] Phone: +1 973 360-8442 Fax: +1 973 360-8178 Jaroslav Hruby Peter Landrock Eurocrypt '99 General Chair Mathematics Institute GCUCMP Praha Aarhus University PO Box 21/OST Ny Munkegade 170 34 Prague 7 8000 Aarhus C Czech Republic Denmark Email: [eurocrypt99(at)iacr.org] Email: Phone: 420 2 6143 5524 [landrock(at)cryptomathic.aau.dk] Fax: 420 2 324450 Tsutomu Matsumoto Ueli Maurer Div. of Electrical and Computer Eng. Department of Computer Science Yokohama National University ETH Zürich 156 Tokiwadai, Hodogaya-ku CH-8092 Zürich Yokohama, 240, Japan Switzerland Tel: +81-45-335-1451 (Ext. 2898, 2904) Email: [maurer(at)inf.ethz.ch] Fax: +81-45-338-1157 Email: tsutomu(at)mlab.dnj.ynu.ac.jp Tel-1: +41-1-632 7420 Tel-2: +41-1-632 7371 Fax : ++41-1-632 1172 Bart Preneel Tatsuaki Okamoto Department of Electrical Engineering NTT Labs Katholieke Universiteit Leuven 1-1 Kikarinooka Kardinaal Mercierlaan 94 Yokosuka-Shi 239 B-3001 Heverlee Japan Belgium USA Email: Phone: 81-468-59-2511 [bart.preneel(at)esat.kuleuven.ac.be] Fax: 91-468-59-3858 Phone: +32 16 32 11 48 Email: [okamoto(at)sucaba.isl.ntt.jp] Fax: +32 16 32 19 86 Paul C. Van Oorschot Joos Vandewalle Entrust Technologies Eurocrypt '2000 General Chair 750 Heron Road, Suite E08 Electrical Engineering Department Ottawa, Ontario (ESAT) K1V 1A7 Katholieke Universiteit Leuven Canada Kard. Mercierlaan 94 Email: [paulv(at)entrust.com] B-3001 Heverlee Belgium Fax: 32/16/32.19.70 Phone: 32/16/32.10.52 email : Joos.Vandewalle(at)esat.kuleuven.ac.be ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For calls for papers, please submit a one page ASCII version. Send your contributions to newsletter(at)iacr.org Deadline for submissions to the next newsletter issue is Sepetember 30, 1999. However, many items will be posted on the website as soon as possible. The IACR Newsletter is copyright (c) 1999, International Association for Cryptologic Research. ______________________________________________________________________________ End of IACR Newsletter, Vol. 16, no. 2, Summer 1999. ______________________________________________________________________________