______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter Vol. 19, No. 1, Winter 2002. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * IACR 2001 election results * Ueli Maurer appointed Editor-in-Chief, Journal of Cryptology * Eurocrypt 2002 program * Announcements + Computers & Security * New reports in the Cryptology ePrint Archive * New books * Open positions * Calender of events in cryptology * IACR contact information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the 11th electronic issue of the IACR Newsletter! The IACR Newsletter is scheduled to appear three times per year, every four months, with issues in February, June, and October. I usually try hard to produce it before the end of the month, but there has been some delay last month for which I must apologize. This is the reason why the current issue appears in March only ... but perhaps I was just waiting for more input from you, readers?!? Anyway, important events for IACR have been announced on the website as usual. This includes also the results of last year's IACR election, in which four new officers and three new directors have been elected. Don't forget to register for Eurocrypt 2002 in Amsterdam, which is held April 28-May 2 and approaching fast! You are welcome to send your contributions to the Newsletter to newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in June 2002. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor P.S. If you have not received the IACR Newsletter by email and would like to receive it in the future, then please make sure that the IACR membership directory contains your current email address. A printed copy of the membership list is mailed yearly to all members. ______________________________________________________________________________ IACR 2001 Election Results ______________________________________________________________________________ The Election Committee is pleased to report the results of the 2001 Election. We thank all the candidates, whether they were successful or not, for their significant support of IACR. People such as these, who are willing to accept an office and to then give generously of their time and expertise, are vital to the smooth working of our all-volunteer community. We also thank all who voted. Those elected are: PRESIDENT Andrew Clark VICE-PRESIDENT Bart Preneel SECRETARY Josh Benaloh TREASURER Susan Langford DIRECTOR Eli Biham Tsutomu Matsumoto Kevin McCurley Their terms will expire on 31 December 2004. We declare the above information to be true and correct. --Election Committee --Witnesses Tom Berson Tracie Hlavka Yvo Desmedt Tri V. Le Rebecca Wright Boyko Mirchev The detailed results are also available on http://www.iacr.org/elections/2001/details.html ______________________________________________________________________________ Ueli Maurer appointed Editor-in-Chief of the Journal of Cryptology ______________________________________________________________________________ At the last IACR board of directors meeting, Ueli Maurer has been appointed the new editor in chief of the Journal of Cryptology. For a one-year transition period during the calendar year 2002, he shares the position with the past editor-in-chief, Joan Feigenbaum. We wish Ueli a successful term in his position, with lots of high-quality submissions and timely referee reports! ______________________________________________________________________________ Announcements ______________________________________________________________________________ ** Computers & Security - Sample Offer Computers & Security is one of the most respected journals in the IT security field. Now in its 21st year, with a new Editor-in-Chief - Dr Eugene Schultz of Purdue University, each issue includes features on specific security topics, refereed papers, a security views section by the Academic Editor - Professor E Spafford, abstracts of recent literature and more. Recent coverage has included hybrid key escrow systems, encryption in cyberspace, novel authentication methods, PKI, and legal controls of cryptography systems. We would like to offer the members of the IACR the opportunity to assess the content of the journal for themselves. If you would like to obtain a free sample copy of Computers & Security, please contact us, and a recent copy will be sent to you immediately. Matthew Smaldon Email: m.smaldon@elsevier.co.uk Fax: +44 (0) 1865 843971 Please quote Computers & Security in your request. ______________________________________________________________________________ New Reports in the Cryptology ePrint Archive ______________________________________________________________________________ 2002/030 ( PS PS.GZ ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko 2002/029 ( PS PS.GZ PDF ) Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products Joy Algesheimer and Jan Camenisch and Victor Shoup 2002/028 ( PS PS.GZ PDF ) A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack Jung Hee Cheon 2002/027 ( PS PS.GZ PDF ) Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications Jonathan Katz 2002/026 ( PS PS.GZ ) Generic Groups, Collision Resistance, and ECDSA Daniel R. L. Brown 2002/025 ( PS PS.GZ PDF ) Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking Markus Jakobsson and Ari Juels and Ron Rivest 2002/024 ( PS PS.GZ PDF ) Timed Release of Standard Digital Signatures Juan Garay and Markus Jakobsson 2002/023 ( PS PS.GZ PDF ) Almost Optimal Hash Sequence Traversal Don Coppersmith and Markus Jakobsson 2002/022 ( PS PS.GZ PDF ) From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre 2002/021 ( PS PS.GZ ) Spectral Analysis of Boolean Functions under Non-uniformity of Arguments Kanstantsin Miranovich 2002/020 ( PS PS.GZ PDF ) Cryptanalysis of stream ciphers with linear masking Don Coppersmith and Shai Halevi and Charanjit Jutla 2002/019 ( PS PS.GZ PDF ) Scream: a software-efficient stream cipher Shai Halevi and Don Coppersmith and Charanjit Jutla 2002/018 ( PS PS.GZ ) An Identity-Based Signature from Gap Diffie-Hellman Groups Jae Choon Cha and Jung Hee Cheon 2002/017 ( PS PS.GZ PDF ) The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin 2002/016 ( PDF ) Content Extraction Signatures Ron Steinfeld and Laurence Bull and Yuliang Zheng 2002/015 ( PDF ) Security proofs of cryptographic protocols Eva Jencusova 2002/014 ( PS PS.GZ PDF ) Better than BiBa: Short One-time Signatures with Fast Signing and Verifying Leonid Reyzin and Natan Reyzin 2002/013 ( PS PS.GZ PDF ) Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups Ivan Damgard and Maciej Koprowski 2002/012 ( PS PS.GZ PDF ) Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings F. Hess 2002/011 ( PS PS.GZ ) Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval and Christophe Tymen 2002/010 ( PS PS.GZ ) Cut and Paste Attacks with Java Serge Lefranc and David Naccache 2002/009 ( PS PS.GZ PDF ) Tree-based Group Key Agreement Yongdae Kim and Adrian Perrig and Gene Tsudik 2002/008 ( PS PS.GZ PDF ) Efficient Algorithms for Pairing-based Cryptosystems Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott 2002/007 ( PS PS.GZ PDF ) Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean-Pierre Seifert 2002/006 ( PDF ) The best and worst of supersingular abelian varieties in cryptology Karl Rubin and Alice Silverberg 2002/005 ( PS PS.GZ ) Cryptanalysis of Stream Cipher COS (2,128) Mode I Hongjun Wu and Feng Bao 2002/004 ( PS PS.GZ PDF ) ID-based Signatures from Pairings on Elliptic Curves Kenneth G. Paterson 2002/003 ( PS PS.GZ ) Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle 2002/002 ( PS PS.GZ PDF ) Extracting Witnesses from Proofs of Knowledge in the Random Oracle Model Jens Groth 2002/001 ( PS PS.GZ PDF ) Fractal Hash Sequence Representation and Traversal Markus Jakobsson ------------------------------------------------------------------------ 2001/113 ( PDF ) Efficient Revocation of Anonymous Group Membership Jan Camenisch and Anna Lysyanskaya 2001/112 ( PS PS.GZ PDF ) A Proposal for an ISO Standard for Public Key Encryption Victor Shoup 2001/111 ( PS PS.GZ ) An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing N.P. Smart 2001/110 ( PS PS.GZ ) RSA hybrid encryption schemes Louis Granboulan 2001/109 ( PDF ) New Notions of Soundness and Simultaneous Resettability in the Public-Key Model Yunlei ZHAO 2001/108 ( PS PS.GZ PDF ) Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer and Victor Shoup 2001/107 ( PS PS.GZ PDF ) Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell 2001/106 ( PS PS.GZ PDF ) Cryptanalysis of the COS (2,128) Stream Ciphers Steve Babbage 2001/105 ( PS PS.GZ ) Universal Arguments and their Applications Boaz Barak and Oded Goldreich 2001/104 ( PS PS.GZ ) Concurrent Zero-Knowledge With Timing, Revisited Oded Goldreich 2001/103 ( PS PS.GZ PDF ) Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems Antonio Bellezza 2001/102 ( PS PS.GZ PDF ) An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates Ivan Damg{\aa}rd and Gudmund Frandsen 2001/101 ( PDF ) Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese and Gene Tsudik 2001/100 ( PS PS.GZ ) A Short Note on Girault's Self-Certified Model Shahrokh Saeednia 2001/099 ( PS PS.GZ ) Linear Code Implies Public-Key Traitor Tracing Kaoru Kurosawa and Takuya Yoshida 2001/098 ( PS PS.GZ PDF ) Fast hashing onto elliptic curves over fields of characteristic 3 Paulo S. L. M. Barreto and Hae Yong Kim 2001/097 ( PS PS.GZ ) An Efficient MAC for Short Messages Sarvar Patel 2001/096 ( PS PS.GZ ) Constructing elliptic curves with a given number of points over a finite field Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan 2001/095 ( PS PS.GZ PDF ) Secure Vickrey Auctions without Threshold Trust Helger Lipmaa and N. Asokan and Valtteri Niemi 2001/094 ( PS PS.GZ ) Slope packings and coverings, and generic algorithms for the discrete logarithm problem M. Chateauneuf and A.C.H. Ling and D.R. Stinson 2001/093 ( PS PS.GZ PDF ) Threshold Cryptosystems Based on Factoring Jonathan Katz and Moti Yung 2001/092 ( PS PS.GZ PDF ) BDD-based Cryptanalysis of Keystream Generators Matthias Krause 2001/091 ( PS PS.GZ PDF ) Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor Ivan Damgård and Jesper B. Nielsen 2001/090 ( PS PS.GZ PDF ) Identity Based Encryption From the Weil Pairing Dan Boneh and Matthew Franklin ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology, and occasionally reviews one. ** The Design of Rijndael J. Daemen, Proton World International (PWI), Belgium; V. Rijmen, Cryptomathic NV, Leuven, Belgium The Design of Rijndael AES - The Advanced Encryption Standard Foreword by Ronald L. Rivest In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. 2002. XVII, 238 pp. Hardcover ISBN 3-540-42580-2 Please find detailed information on this title and on the Springer series "Information Security and Cryptography" at: http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42580-2. Springer-Verlag Heidelberg/Berlin http://www.springer.de orders@springer.de Tel. +49 6221 345 0 Fax +49 6221 345 217 New York http://www.springer-ny.com orders@springer-ny.com Tel./Fax 1 800 SPRINGER ** Introduction to Cryptography H. Delfs, H. Knebl, University of Applied Sciences, Nürnberg, Germany Introduction to Cryptography Principles and Applications Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. This book presents the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols, such as electronic elections and digital cash. In the second part, probability theory is applied to make basic notions precise, such as the security of cryptographic schemes. More advanced topics are also addressed, such as the bit security of one-way functions and computationally perfect pseudo random bit generators. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. 2002. XIV, 314 pp. Hardcover ISBN 3-540-42278-1 Please find detailed information on this title and on the Springer series "Information Security and Cryptography" at: http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42278-1. Springer-Verlag Heidelberg/Berlin http://www.springer.de orders@springer.de Tel. +49 6221 345 0 Fax +49 6221 345 217 New York http://www.springer-ny.com orders@springer-ny.com Tel./Fax 1 800 SPRINGER Please send your new book announcements to the newsletter editor at newsletter@iacr.org ______________________________________________________________________________ Open Positions in Cryptology ______________________________________________________________________________ IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at http://www.iacr.org/jobs/ and also included in the IACR Newsletter that is sent to members three times per year. To advertise your job opportunities, please send a description of no more than 150 words in plain ASCII text by email to jobs(at)iacr.org. This should include an URL and further contact information. No attachments or word documents, please! (Submissions in other formats than text will not be posted.) As this is intended to be a service to the members of IACR, it is free for all members. We ask that commercial enterprises who want to advertise their openings identify at least one of their employees who is a member of IACR. (IACR does not know corporate membership.) Please contact the membership secretariat to become a member of IACR. On top of that, IACR accepts donations and is always looking for sponsors for its conferences. _________________________________________________________________ Ruhr-University Bochum, Germany The Ruhr-University Bochum, Germany, has recently established an Institute for IT Security The Institute is a Center of Excellence for the theoretical and practical aspects of IT security, providing high quality research and education. At the Institute's core are three chaired professorships in IT security. The chair for Communication Security, headed by Prof. Christof Paar, in the Department of Electrical Engineering and Information Sciences has now an opening for an Assistant Professor in Applied Data Security This is a newly created Juniorprofessor position. Those positions are quite similar to US assistant professorships. The duration of the position is a maximum of six years. It will be possible to apply for associate or full professor position in the same department for candidates who build a strong research record. An ideal candidate would be interested in doing research in one of the following areas: · Efficient software algorithms for crypto algorithms · Hardware architectures for crypto algorithms · Network security, especially for embedded and ad-hoc networks · Cryptographic protocols The Institute for IT Security offers a multitude of exciting research cooperation within the University of Bochum (e.g., with the group of Prof. Hans Dobbertin or with the to-be-filled third chair), and with the many outstanding researchers at nearby universities (e.g., University of Essen). Due the exceptional funding situation of the Institute, there is an excellent research infrastructure (WRT computer equipment, staff support, office space, lecture and seminar offerings) and highly motivated and talented graduate students. Our group also offers a very pleasant and collegial atmosphere. Due to the international character of the Institute, we especially welcome applicants from outside Germany. From non-native speakers it will be expected that after a transition period of two years lectures will also be held in German. Please mail your application by April 5,2002, to: Prof. Dr.-Ing. Johann Friedrich Boehme Dean, Department of Electrical Engineering and Information Sciences Ruhr-Universitaet Bochum D 44780 Bochum Germany Should you need more information about the position, you are welcome to contact Prof. Christof Paar (cpaar@crypto.ruhr-uni-bochum.de) (13-mar-02) _________________________________________________________________ Internship Opening at NTT Multimedia Communications Laboratories > From: "Anand Desai" NTT Multimedia Communications Laboratories, Palo Alto CA, USA Internship Opening We are looking for graduate students studying cryptography and/or security and interested in spending this summer working with us in our Palo Alto labs. We have several ongoing research projects on cryptographic algorithms and protocols and on Internet and Wireless Security technologies. For more information see, http://www.nttmcl.com/sec/Info/ (04-feb-02) _________________________________________________________________ Cryptology Software Engineers Sr. level developers for S. California position. Relocation assistance available. Please contact: Greg Post Executive Recruiter LJ Kushner & Associates greg.post@ljkushner.com www.ljkushner.com 970-349-0864 (31-dec-01) _________________________________________________________________ University of Bergen, Norway Researcher position There is a vacant one-year research position at the University of Bergen (UiB), Department of Informatics, Bergen, Norway, in the area of cryptology. The position is part of the EU-project: NESSIE (New European Schemes for Signature, Integrity and Encryption), which started early 2000 and is running until the end of 2002. See www.cryptonessie.org for more information and for the results of the project so far. It is anticipated that UiB will appoint a researcher to work on this project starting January 1st, 2002 for a term of 12 months. You will be based in Bergen under the direction of Professor Lars R. Knudsen. Yearly salary is about NOK 350,000. The successful applicant must have a doctorate in informatics or mathematics or corresponding qualifications. For more information, see http://www.ii.uib.no/~larsr/position Lars R. Knudsen (10-nov-01) _________________________________________________________________ University of North Carolina at Charlotte, USA University of North Carolina at Charlotte Department of Software and Information Systems Tenure-Track Faculty Positions in INFORMATION SECURITY The Department of Software and Information Systems at UNC Charlotte has open tenure-track faculty positions. The department offers degrees at all levels including Bachelor, Masters and PhD. It is one of the 23 NSA designated Center of Academic Excellence in Information Assurance Education. Current faculty members have strong research programs, with substantial funding from both federal agencies and industrial partners. Salary for new faculty will be highly competitive. Applicants must have a Ph.D. in Computer Science, Information Technology, or a related field, and a strong commitment to teaching and research. We are especially interested in faculty whose research expertise falls into the areas of Network security, Software engineering, Security risk assessment and management, Systems security, Systems survivability, Computer assisted collaborative work, and Pervasive computing. For further details please visit www.sis.uncc.edu Application review will start in Jan 2002. Please send detailed CV together with four references, copies of scholarly publications and other support material to Dr Yuliang Zheng, Chair of Search Committee, Department of Software and Information Systems, UNC Charlotte, 9201 University City Blvd, Charlotte, NC 28223. Email: yzheng@uncc.edu, Tel: 704-687-5492. UNC Charlotte is an equal opportunity/affirmative action employer. (6-nov-01) ______________________________________________________________________________ IACR Calendar of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please send email to webmaster(at)iacr.org . 2002 * [1]Financial Cryptography '02, March 11-14, Southampton, Bermuda. * [2]Workshop on Privacy Enhancing Technologies (PET 2002), April 14-15, San Francisco, California, USA. * [3]Eurocrypt 2002, April 28-May 2, Amsterdam, Netherlands. * [4]IEEE Symposium on Security and Privacy, May 12-15, Oakland, California, USA. * [5]Yet Another Conference on Cryptography (YACC'02), June 3-7, Porquerolles Island, France. * [6]15th IEEE Computer Security Foundations Workshop, June 24-26, Cape Breton, Nova Scotia, Canada. * [7]2002 IEEE International Symposium on Information Theory, June 30-July 5, Lausanne, Switzerland. * [8]Seventh Australasian Conference on Information Security and Privacy, July 3-5, Melbourne, Australia. * [9]Foundations of Computer Security (satellite workshop of LICS at FLoC'02), July 26, Copenhagen, Denmark. * [10]Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002), August 13-15, Hotel Sofitel, San Francisco Bay, Redwood City, USA. * [11]11th USENIX Security Symposium, August 5-9, San Francisco, USA. * [12]Workshop on Selected Areas in Cryptography (SAC 2002), August 15-16, St. John's, Newfoundland, Canada. * [13]Crypto 2002, August 18-22, Santa Barbara, California, USA. * [14]3rd International Workshop on Information Security Applications (WISA2002), August 28-30, 2002, Jeju Island, Korea * [15]Workshop on Trust and Privacy in Digital Business, September 4-5, Aix en Provence, France. * [16]VII Spanish Meeting on Cryptology and Information Security, September 5-7, Asturias, Espana. * [17]6th Workshop on Elliptic Curve Cryptography (ECC 2002), September 23-25, University of Essen, Germany. * [18]International Workshop on Cryptology and Network Security (CNS02), September 26-28, San Francisco, California, USA. * [19]Information Security Conference '02, September 30-October 2, Sao Paulo, Brazil. * [20]Infrastructure Security Conference 2002 (InfraSec 2002) October 1-3, 2002, Bristol,UK. * [21]9th ACM Conference on Computer and Communications Security, November 17-21, Washington, DC, USA. * [22]2002 ACM Workshop on Digital Rights Management, November 18, Washington, DC, USA. * [23]Fifth Smart Card Research and Advanced Application Conference (CARDIS '02), November 20-22, San Jose, USA. * [24]Asiacrypt 2002, December 1-5, Queenstown, New Zealand. * [25]Fourth International Conference on Information and Communications Security (ICICS 02), December 9-12, Kent Ridge Digital Labs, Singapore. * [26]Third International Conference on Cryptology in India (Indocrypt 2002), December 15-18, Hyderabad, India. References 1. http://fc02.ai/ 2. http://www.pet2002.org/ 3. http://www.ec2002.tue.nl/ 4. http://www.ieee-security.org/TC/SP02/sp02index.html 5. http://www.univ-tln.fr/~grim/YACC/ 6. http://www.csl.sri.com/csfw/csfw15/ 7. http://isit02.epfl.ch/ 8. http://www.cm.deakin.edu.au/ACISP'02 9. http://floc02.diku.dk/FCS/ 10. http://www.chesworkshop.org/ 11. http://www.usenix.org/events/sec02/ 12. http://www.engr.mun.ca/~sac2002/ 13. http://www.iacr.org/conferences/crypto2002/ 14. http://icns.ewha.ac.kr/wisa2002 15. http://www.wi-inf.uni-essen.de/~dexa02ws/ 16. http://enol.etsiig.uniovi.es/viirecsi/ 17. http://www.exp-math.uni-essen.de/~weng/ecc2002.html 18. http://cs.anu.edu.au/~Chuan.Wu/conference/cns02_cfp.html 19. http://www.ime.usp.br/~isc2002 20. http://www.infrasec-conf.org/ 21. http://www.acm.org/sigs/sigsac/ccs/ 22. http://crypto.stanford.edu/DRM2002/ 23. http://www.usenix.org/events/cardis02/ 24. http://www.commerce.otago.ac.nz/infosci/asiacrypt/ 25. http://www.krdl.org.sg/General/conferences/icics/Homepage.html 26. http://www.isical.ac.in/~indocrypt/ ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (2002) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. Officers Andrew J. Clark Bart Preneel President Vice President P.O. Box 743 Department of Electrical Engineering Brighton Katholieke Universiteit Leuven East Sussex Kasteelpark Arenberg 10 BN1 5HS B-3001 Heverlee United Kingdom BELGIUM Tel: +44 1273 270752 Email: Fax: +44 1273 276558 [bart.preneel(at)esat.kuleuven.ac.be] Email: [president(at)iacr.org] Tel: +32 16 32 11 48 Fax: +32 16 32 19 86 Josh Benaloh Susan Langford Secretary Treasurer Microsoft Research Certicom One Microsoft Way 25801 Industrial Blvd Redmond, WA 98052 Hayward, CA 94545 USA USA Tel: +1 425 703 3871 Tel: +1 510 780 5422 Fax: +1 425 936 7329 Fax: +1 510 780 5401 Email: [secretary(at)iacr.org] Email: [treasurer(at)iacr.org] Directors Don Beaver Thomas Berson Membership Secretary Director Certco Inc. Anagram Labs 55 Broad Street, 22nd Floor P.O. Box 791 New York, NY 10004 Palo Alto CA, 94301 USA USA Tel: +1 212 709 6719 Tel: +1 650 324 0100 Fax: +1 212 709 6754 Email: [berson(at)anagram.com] Email: don.beaver(at)attbi.com Eli Biham Christian Cachin Director Editor, IACR Newsletter Computer Science Department IBM Zurich Research Laboratory Technion Säumerstrasse 4 Haifa 32000 CH-8803 Rüschlikon Israel Switzerland Email: Tel: +41 1 724 8989 [biham(at)cs.technion.ac.il] Fax: +41 1 724 8953 Tel: +972 4 8294308 Email: [cachin(at)acm.org] Fax: +972 4 8294308 Professor Chin-Chen Chang Yvo Desmedt Asiacrypt 2003 General Chair Director Department of Computer Science Florida State University PO Box 4530, 206 Love Building Tallahassee, FL 32306-4530 USA Tel: +1 850 644 9298 Fax: +1 850 644 0058 Email: desmedt(at)nu.cs.fsu.edu Joan Feigenbaum Jerzy Gawinecki Editor-in-Chief, Journal of Eurocrypt 2003 General Chair Cryptology Institute of Mathematics and Operations Department of Computer Science Research Yale University Military University of Technology P. O. Box 208285 Kaliskiego Str. 2, 00-908 Warsaw New Haven, CT 06520-8285 Poland USA Tel: (48)(22) 6839556 Email: Fax: (48)(22) 6839719 joan.feigenbaum(at)yale.edu or Email: j.gawinecki(at)imbo.wat.waw.pl [jofc(at)iacr.org] Tel: +1 203 432 6432 Fax: +1 203 432 0593 Kwangjo Kim Lars Knudsen Director Director School of Engineering Technical University of Denmark Information and Communications Dept. of Mathematics Univ. Building 303 58-4 Hwaam-dong Yusong-ku DK-2800 Lyngby Taejon, 305-348 DENMARK KOREA Tel: +45 4525 3048 Tel: +82 42 866 6118 Fax: +45 4588 1399 Fax: +82 42 866 6154 Email: knudsen(at)mat.dtu.dk Email: kkj(at)icu.ac.kr Tsutomu Matsumoto Ueli Maurer Director Director and Editor-in-Chief, Journal Graduate School of Environment of Cryptology and Information Sciences Department of Computer Science Yokohama National University ETH Zürich 79-7 Tokiwadai, Hodogaya, CH-8092 Zürich Yokohama 240-8501, Japan Switzerland Tel: +81-45-339-4133 Email: [maurer(at)inf.ethz.ch] or Fax: +81-45-339-4338 Email: [jofc(at)iacr.org] tsutomu(at)mlab.jks.ynu.ac.jp Tel: +41 1 632 7420 Fax: +41 1 632 1172 Kevin S. McCurley Greg Rose Director Crypto 2003 General Chair 6721 Tannahill Drive Qualcomm Australia San Jose, CA 95120 Level 3, 230 Victoria Road USA Gladesville NSW 2111 Tel: +1 408 927 1838 Australia Email: mccurley(at)swcp.com Phone +61 2 9817 4188 Fax +61 2 9817 5199 Email: ggr(at)qualcomm.com Berry Schoenmakers Henry Wolfe Eurocrypt 2002 General Chair Asiacrypt 2002 General Chair technische universiteit Information Science Department eindhoven School of Business /department of mathematics and University of Otago computing science P.O. Box 56 HG 9.85, P.O. Box 513 Dunedin, New Zealand 5600 MB Eindhoven, The Tel: +64 3 479 8141 Netherlands Fax: +64 3 479 8311 Tel: +31 40 247 4769 Email: hwolfe(at)commerce.otago.ac.nz Fax: +31 40 243 5810 Email: berry(at)win.tue.nl Rebecca Wright Crypto 2002 General Chair AT&T Labs Research Room A213 P.O. Box 971 180 Park Avenue Florham Park, NJ 07932-0971 USA Tel: +1 973 360 8346 Fax: +1 973 360 8970 Email: rwright(at)research.att.com ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year (in February, June, and October) and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org . Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter(at)iacr.org The Next Issue Deadline for submissions to the next newsletter issue is January 31, 2002. However, many items will be posted on the website as soon as possible. ______________________________________________________________________________ End of IACR Newsletter, Vol. 19, No. 1, Winter 2002. ______________________________________________________________________________