______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter The newsletter of the International Association for Cryptologic Research. Vol. 20, No. 2, Summer 2003. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * 2003 Elections announcement * IACR Fellows * Whit Diffie to hold 2004 IACR Distinguished Lecture * Eurocrypt 2004: call for papers * Announcements + Cryptologia paper competition + Cryptologia subscription offer * New books * New reports in the Cryptology ePrint Archive * Open positions * Calendar of events in cryptology * IACR contact information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the 15th electronic issue of the IACR Newsletter! Shortly before the summer is over, the "Summer" 2003 issue of the IACR Newsletter finally appears. I'd like to apologize for the delay in producing it -- not only the European summer heat wave slowed it down. Whit Diffie has been appointed to hold the IACR Distinguished Lecture for 2004. I'm pleased that he will come to Eurocrypt 2004 in Interlaken for giving his lecture. As one of the organizers of Eurocrypt 2004, it is a special honor for me that his talk will be part of the program. Please send your contributions to the Newsletter to newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in October-November 2003. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor P.S. If you have not received the IACR Newsletter by email and would like to receive it in the future, then please make sure that the IACR membership directory contains your current email address. A printed copy of the membership list is mailed yearly to all members. ______________________________________________________________________________ IACR 2003 Elections: Announcement and Nominations ______________________________________________________________________________ The election committee consists of: James Hughes (chair) Bart Preneel Rebecca Wright (returning officer) Positions to be filled at this election: POSITION TERM CURRENTLY HELD BY Director Jan 1 2004 - Dec 31 2006 Thomas Berson Director Jan 1 2004 - Dec 31 2006 Yvo Desmedt Director Jan 1 2004 - Dec 31 2006 Lars Knudsen Nominators and nominees must be regular members of IACR. Any IACR member can nominate another regular member and all nominations must be made in writing to the election chairperson. Please download and fill in the nomination form. 1. http://www.iacr.org/elections/2003/nom_form.pdf 2. http://www.iacr.org/elections/2003/nom_form.doc Nominations forms must be received by mail or fax by September 12, 2003 at the address below. Receipt will be acknowledged by email within two working days (before the deadline). It is the responsibility of the candidates to ensure the nominations and statements are received! If you have any questions please contact the election chairperson. Election Chair James Hughes Storage Technology Corporation 7600 Boone Ave No. Minneapolis, MN, 55428 USA Fax: +1 612 677 3007 Email: James_Hughes@StorageTek.com Ballots will be mailed by October 1, 2001. Ballots must be mailed to be received by the Returning Officer in the official envelopes by NOVEMBER 15, 2003. ______________________________________________________________________________ IACR Fellows ______________________________________________________________________________ Nominations and endorsements of IACR-Fellow candidates are due on December 31, 2003. Fellows are expected to be 'model citizens' of the cryptologic community. Most of them will have demonstrated sustained and significant accomplishment in both technical work and service to the community, but a very small number may be chosen for unique and crucial accomplishment in only one of the two. Complete descriptions of the Fellows Program and of the nomination and endorsement procedures can be found at http://www.iacr.org/fellows/. ______________________________________________________________________________ Whit Diffie to hold 2004 IACR Distinguished Lecture ______________________________________________________________________________ Whit Diffie has been appointed 2004 IACR Distinguished Lecturer. The lecture will be given at Eurocrypt 2004. We look forward to his presentation. ______________________________________________________________________________ Call for Papers, Eurocrypt 2004, May 2-6, 2004, Interlaken, Switzerland ______________________________________________________________________________ General Information Original papers on all technical aspects of cryptology are solicited for submission to Eurocrypt 2004, the 23rd Annual Eurocrypt Conference. Eurocrypt 2004 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IBM Zurich Research Laboratory. Instructions for Authors Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with proceedings. The paper must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be at most 12 pages including title page and abstract, but excluding the bibliography and clearly marked appendices, and at most 25 pages in total, using at least 11-point font and reasonable margins. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be submitted electronically. A detailed description of the electronic submission procedure will be available by September 15, 2003 at http://www.zurich.ibm.com/eurocrypt2004. Submissions must conform to this procedure and be received by November 3, 2003, 23:59 UTC to be considered. Late submissions and non-electronic submissions will not be considered. Authors unable to submit electronically should contact the conference chairs at the address below by October 1, 2003. Notification of acceptance or rejection will be sent to authors by January 26, 2004. Authors of accepted papers must guarantee that their paper will be presented at the conference. Conference Proceedings Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on March 1, 2004. Submission: November 3, 2003; Acceptance: January 26, 2004; Camera Ready: March 1, 2004 Program Committee Alex Biryukov (Katholieke Universiteit Leuven) John Black (University of Colorado at Boulder) Christian Cachin (IBM Research) Jan Camenisch (IBM Research) Jean-Sebastien Coron (Gemplus Card International) Claude Crépeau (McGill University) Ivan Damgård (Aarhus University) Juan Garay (Bell Labs - Lucent Technologies) Rosario Gennaro (IBM Research) Alain Hiltgen (UBS) Thomas Johansson (Lund University) Antoine Joux (DCSSI Crypto Lab) Joe Kilian (NEC Laboratories America) Arjen Lenstra (Citibank & Techn. Univ. Eindhoven) Yehuda Lindell (IBM Research) Anna Lysyanskaya (Brown University) Tsutomu Matsumoto (Yokohama National Univ.) Daniele Micciancio (UC San Diego) Omer Reingold (AT&T Research and IAS) Vincent Rijmen (Cryptomathic and IAIK) Phillip Rogaway (UC Davis & Chiang Mai Univ.) Igor Shparlinski (Macquarie University) Edlyn Teske (University of Waterloo) Rebecca Wright (Stevens Institute of Technology) Program and General Chairs Christian Cachin and Jan Camenisch IBM Research Säumerstrasse 4 CH-8803 Rüschlikon Switzerland email: eurocrypt2004@zurich.ibm.com Stipends A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to eurocrypt2004@zurich.ibm.com before April 1, 2004. ______________________________________________________________________________ Announcements ______________________________________________________________________________ ** Cryptologia paper competition To: newsletter@iacr.org IACR Newsletter Editor From: Brian-Winkel@usma.edu Brian Winkel, Editor of Cryptologia Cryptologia is a unique scholarly journal devoted to all aspects of cryptology. This refereed quarterly began in 1977. Areas covered include security, history, codes and ciphers, mathematics, military science, espionage, cipher devices, literature, and ancient languages. Cryptologia features an exceptional cryptologic book review section. This quarterly, 96 page journal, is available for $48.00 US in the United States and $60.00 US outside the United States. Complete information can be found at the journal's web site: http://www.dean.usma.edu/math/pubs/cryptologia/ . We are pleased to announce two undergraduate paper competitions, each with a $300 cash prize and publication in Cryptologia, a refereed journal. Both the Annual Undergraduate Paper Competition in Cryptology and the Annual Greg Mellen Memorial Cryptology Scholarship Prize are sponsored by the journal Cryptologia to encourage the study of all aspects of cryptology in the undergraduate curricula. The topic may be in any area of cryptology -- technical, historical, and literary subjects. Papers must be no more than 20 typewritten pages in length, double spaced and fully referenced. Four copies must be submitted. Authors should keep one copy. Papers are to be original works that have not been published previously. Closing date for both papers is 31 December for the year of entry. The winner(s) will be announced on 1 April with publication of the winning paper in a later issue of CRYPTOLOGIA. Papers will be judged by the editors of Cryptologia. Inquiries, submissions, and subscription information: Cryptologia, Department of Mathematical Sciences, United States Military Academy, West Point NY 10996 USA; Cryptologia @usma.edu. Or check Cryptologia's website: http://www.dean.usma.edu/math/pubs/cryptologia/ . Brian Winkel, Editor Professor of Mathematical Sciences United States Military Academy West Point NY 10996 USA 845-938-3200 Brian-Winkel@usma.edu http://www.dean.usma.edu/math/people/winkel/ *** Cryptologia subscription offer To: newsletter@iacr.org IACR Newsletter Editor From: Brian-Winkel@usma.edu Brian Winkel, Editor of Cryptologia We would like to addend our announcement for your members to offer ANY IACR member FOR A NEW SUBSCRIBER ONLY an offer of half-price on their new one-year subscription. This means an IACR member in the US can send a check for $24.00 (instead of the usual $48.00) while an IACR membere outside the US can send us a check for $30.00 (instead of the usual $60.00) and get their FIRST YEAR subscription at HALF PRICE. Make check payable to Cryptologia and send it to Cryptologia, Dept of Math Sci, US Military Academy, West Point NY 10996 USA. IACR members should identify themselves as such when they subscribe. Brian Winkel, Editor Professor of Mathematical Sciences United States Military Academy West Point NY 10996 USA 845-938-3200 Brian-Winkel@usma.edu http://www.dean.usma.edu/math/people/winkel/ ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology, and occasionally reviews one. Coding Theory and Cryptology edited by Harald Niederreiter (National University of Singapore) Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Vol. 1 The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security. Contents: Extremal Problems of Coding Theory (A Barg); Analysis and Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson); Quantum Error-Correcting Codes (K Feng); Public Key Infrastructures (D Gollmann); Computational Methods in Public Key Cryptology (A K Lenstra); Detecting and Revoking Compromised Keys (T Matsumoto); Algebraic Function Fields Over Finite Fields (H Niederreiter); Authentication Schemes (D Y Pei); Exponential Sums in Coding Theory, Cryptology and Algorithms (I E Shparlinski); Distributed Authorization: Principles and Practice (V Varadharajan); Introduction to Algebraic Geometry Codes (C P Xing). Readership: Graduate students and researchers in number theory, discrete mathematics, coding theory, cryptology and IT security. 460pp Pub. date: Dec 2002 981-238-132-5 US$58 £39 981-238-450-2(pbk) US$28 £19 The information is also available on our website: http://www.wspc.com/books/mathematics/5078.html ______________________________________________________________________________ New Reports in the Cryptology ePrint Archive ______________________________________________________________________________ (The list contains reports posted since the last newsletter issue appeared.) 2003/182 ( PS PS.GZ PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, and Jonathan Katz 2003/181 ( PS PS.GZ PDF ) On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai 2003/180 ( PS PS.GZ ) Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra and Palash Sarkar 2003/179 ( PS PS.GZ PDF ) VMPC one-way function Bartosz Zoltak 2003/178 ( PDF ) Constructing Optimistic Fair Exchange Protocols from Committed Signatures Huafei Zhu 2003/177 ( PS PS.GZ PDF ) Building Secure Cryptographic Transforms, or How to Encrypt and MAC Tadayoshi Kohno and Adriana Palacio and John Black 2003/176 ( PS PS.GZ PDF ) Patterson-Wiedemann Construction Revisited S. Gangopadhyay and P. H. Keskar and S. Maitra 2003/175 ( PS PS.GZ PDF ) Double-Speed Safe Prime Generation David Naccache 2003/174 ( PS PS.GZ PDF ) Relaxing Chosen-Ciphertext Security Ran Canetti and Hugo Krawczyk and Jesper Nielsen 2003/173 ( PS PS.GZ ) Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph Palash Sarkar 2003/172 ( PS PS.GZ PDF ) NAEP: Provable Security in the Presence of Decryption Failures Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte 2003/171 ( PS PS.GZ PDF ) Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz and Moti Yung 2003/170 ( PS PS.GZ PDF ) HARPS: HAshed Random Preloaded Subset Key Distribution Mahalingam Ramkumar and Nasir Memon 2003/169 ( PS PS.GZ PDF ) Properties of the Transformation Semigroup of the Solitaire Stream Cipher Boris Pogorelov and Marina Pudovkina 2003/168 ( PS PS.GZ ) Robust discretization, with an application to graphical passwords Jean-Camille Birget and Dawei Hong and Nasir Memon 2003/167 ( PDF ) Identity-based Chameleon Hash and Applications Giuseppe Ateniese and Breno de Medeiros 2003/166 ( PS PS.GZ PDF ) A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves Igor Semaev 2003/165 ( PDF ) Commitment Capacity of Discrete Memoryless Channels Andreas Winter, Anderson C. A. Nascimento, Hideki Imai 2003/164 ( PS PS.GZ PDF ) Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 2003/163 ( PS PS.GZ PDF ) Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography Xavier Boyen 2003/162 ( PS PS.GZ PDF ) Cryptanalysis of the Alleged SecurID Hash Function Alex Biryukov and Joseph Lano and Bart Preneel 2003/161 ( PS PS.GZ PDF ) Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology Ueli Maurer and Renato Renner and Clemens Holenstein 2003/160 ( PDF ) Tame Transformation Signatures Jiun-Ming Chen and Bo-Yin Yang 2003/159 ( PS PS.GZ PDF ) An efficient variant of the RSA cryptosystem Cesar Alison Monteiro Paixão 2003/158 ( PS PS.GZ ) Study of Domain Extension of UOWHF and Its Optimality Mridul Nandi 2003/157 ( PS PS.GZ ) Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa and Tsuyoshi Takagi 2003/156 ( PS PS.GZ ) Efficient Proven Secure Public Key Steganography Tri Van Le 2003/155 ( PDF ) A Formal Proof of Zhu's Signature Scheme huafei zhu 2003/154 ( PS PS.GZ ) ManTiCore: Encryption with Joint Cipher-State Authentication Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson 2003/153 ( PDF ) Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG 2003/152 ( PDF ) Optimal Statistical Power Analysis Eric Brier and Christophe Clavier and Francis Olivier 2003/151 ( PDF ) Secret sharing schemes on sparse homogeneous access structures with rank three Jaume Martí-Farré and Carles Padró 2003/150 ( PS PS.GZ PDF ) On the random-oracle methodology as applied to length-restricted signature schemes Ran Canetti and Oded Goldreich and Shai Halevi 2003/149 ( -- withdrawn -- ) Forward-Secure Hierarchical ID-Based Cryptography Danfeng Yao and Anna Lysyanskaya 2003/148 ( PS PS.GZ PDF ) A Tweakable Enciphering Mode Shai Halevi and Phillip Rogaway 2003/147 ( PS PS.GZ PDF ) A Parallelizable Enciphering Mode Shai Halevi and Phillip Rogaway 2003/146 ( PS PS.GZ PDF ) Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Yevgeniy Dodis and Leonid Reyzin 2003/145 ( PS PS.GZ ) Symmetric Authentication Within a Simulatable Cryptographic Library Michael Backes and Birgit Pfitzmann and Michael Waidner 2003/144 ( PS PS.GZ PDF ) ID-based tripartite key agreement with signatures Divya Nalla 2003/143 ( PS PS.GZ PDF ) Elliptic curves suitable for pairing based cryptography Friederike Brezing and Annegret Weng 2003/142 ( PS PS.GZ ) A New Tree based Domain Extension of UOWHF Mridul Nandi 2003/141 ( PS PS.GZ PDF ) General Composition and Universal Composability in Secure Multi-Party Computation Yehuda Lindell 2003/140 ( PS PS.GZ PDF ) Trading-Off Type-Inference Memory Complexity Against Communication Konstantin Hypp\"onen and David Naccache and Elena Trichina and Alexei Tchoulkine 2003/139 ( PDF ) On the Randomness of the Editing Generator Enjian Bai and Guozhen Xiao 2003/138 ( PS PS.GZ ) Permutation graphs, fast forward permutations, and Boaz Tsaban 2003/137 ( PS PS.GZ ) Bernoulli numbers and the probability of a birthday surprise Boaz Tsaban 2003/136 ( PS PS.GZ ) Efficient linear feedback shift registers with maximal period Boaz Tsaban and Uzi Vishne 2003/135 ( PS PS.GZ PDF ) Collision Attack on Reduced-Round Camellia Wen-Ling Wu and Deng-Guo Feng 2003/134 ( -- withdrawn -- ) Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions Sugata Gangopadhyay and Subhamoy Maitra 2003/133 ( PS PS.GZ PDF ) Minimum Distance between Bent and 1-resilient Boolean Functions Soumen Maity and Subhamoy Maitra 2003/132 ( PS PS.GZ ) Guaranteeing the diversity of number generators Adi Shamir and Boaz Tsaban 2003/131 ( PS PS.GZ PDF ) Homomorphic public-key systems based on subgroup membership problems Kristian Gjøsteen 2003/130 ( PS PS.GZ PDF ) On the Pseudorandomness of KASUMI Type Permutations Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa 2003/129 ( PS PS.GZ PDF ) Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo 2003/128 ( PS PS.GZ ) Weak Fields for ECC Alfred Menezes and Edlyn Teske and Annegret Weng 2003/127 ( PDF ) Using Information Theory Approach to Randomness Testing B. Ya. Ryabko and V.A. Monarev 2003/126 ( PS PS.GZ PDF ) Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson 2003/125 ( PS PS.GZ PDF ) Algebraic Attacks on Combiners with Memory and Several Outputs Nicolas T. Courtois 2003/124 ( PS PS.GZ ) A General Correlation Theorem Kishan Chand Gupta and Palash Sarkar 2003/123 ( PS PS.GZ PDF ) Assessing security of some group based cryptosystems Vladimir Shpilrain 2003/122 ( PDF ) Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols Kyungah Shim 2003/121 ( PS PS.GZ ) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol Michael Backes and Birgit Pfitzmann 2003/120 ( PS PS.GZ PDF ) Physically Observable Cryptography Silvio Micali and Leonid Reyzin 2003/119 ( PS PS.GZ PDF ) How Secure Are FPGAs in Cryptographic Applications? Thomas Wollinger and Christof Paar 2003/118 ( PS PS.GZ ) Visual Crypto Displays Enabling Secure Communications Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk 2003/117 ( PDF ) An identity-based ring signature scheme from bilinear pairings Chih-Yin Lin and Tzong-Chen Wu 2003/116 ( PS PS.GZ PDF ) A New ID-based Group Signature Scheme from Bilinear Pairings Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim 2003/115 ( PDF ) Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols Kyungah Shim 2003/114 ( PS PS.GZ ) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions Michael Backes 2003/113 ( PS PS.GZ PDF ) Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings Hung-Min Sun and Bin-Tsan Hsieh 2003/112 ( PS PS.GZ ) Accumulating Composites and Improved Group Signing Gene Tsudik and Shouhuai Xu 2003/111 ( PDF ) Further Cryptanalysis of some Proxy Signature Schemes Jiqiang Lv and Jingwei Liu and Xinmei Wang 2003/110 ( PDF ) Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key Yukio Itakura and Shigeo Tsujii 2003/109 ( PS PS.GZ PDF ) Crytanalysis of SAFER++ Alex Biryukov and Christophe De Canni\`ere and Gustaf Dellkrantz 2003/108 ( PS PS.GZ ) Novel Cyclic and Algebraic Properties of AES Tri Van Le 2003/107 ( PS PS.GZ PDF ) Fujisaki-Okamoto IND-CCA hybrid encryption revisited David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar 2003/106 ( PS PS.GZ PDF ) High-speed encryption and authentication: A patent-free solution for 10 Gbps network devices Tadayoshi Kohno and John Viega and Doug Whiting 2003/105 ( PS PS.GZ ) On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa 2003/104 ( PS PS.GZ PDF ) New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin 2003/103 ( PS PS.GZ PDF ) Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols Zhongliang Chen 2003/102 ( PDF ) Length-Based Attacks for Certain Group Based Encryption Rewriting Systems J. Hughes, and A. Tannenbaum 2003/101 ( -- withdrawn -- ) Cryptanalysis of HFE Ilia Toli 2003/100 ( PS PS.GZ PDF ) Bounded-Concurrent Secure Two-Party Computation Without Set-Up Assumptions Yehuda Lindell 2003/099 ( PS PS.GZ PDF ) Algorithms in Braid Groups Matthew J. Campagna 2003/098 ( PDF ) Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klima and Tomas Rosa 2003/097 ( PS PS.GZ PDF ) Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves Jan Pelzl and Thomas Wollinger and Christof Paar 2003/096 ( PS PS.GZ PDF ) Secure Proxy Signature Schemes for Delegation of Signing Rights Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi 2003/095 ( PS PS.GZ PDF ) Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Yevgeniy Dodis and Nelly Fazio 2003/094 ( PS PS.GZ PDF ) Trace Zero Subvariety for Cryptosystems Tanja Lange 2003/093 ( PS PS.GZ PDF ) More Efficient Provably Secure Steganography Leonid Reyzin and Scott Russell 2003/092 ( PS PS.GZ PDF ) Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol Muxiang Zhang 2003/091 ( PS PS.GZ ) Sequential Aggregate Signatures from Trapdoor Homomorphic Permutations Hovav Shacham 2003/090 ( PDF ) A Structured Multisignature Scheme from the Gap Diffie-Hellman Group Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang 2003/089 ( PS PS.GZ PDF ) Efficient Public Key Generation for Multivariate Cryptosystems Christopher Wolf 2003/088 ( PDF ) Elliptic Curve Point Multiplication A.G.Rostovtsev and E.B.Makhovenko 2003/087 ( PS PS.GZ PDF ) A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack huafei zhu 2003/086 ( PS PS.GZ PDF ) On the Selection of Pairing-Friendly Groups Paulo S. L. M. Barreto and Ben Lynn and Michael Scott 2003/085 ( PS PS.GZ ) A defect of the implementation schemes of the TTM cryptosystem Jintai Ding, Dieter Schmidt 2003/084 ( PS PS.GZ ) Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem Jintai Ding, Timonthy Hodges 2003/083 ( PS PS.GZ PDF ) A Forward-Secure Public-Key Encryption Scheme Ran Canetti and Shai Halevi and Jonathan Katz 2003/082 ( PS PS.GZ PDF ) Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata and Kaoru Kurosawa 2003/081 ( PDF ) Primitive Specification for SOBER-128 Philip Hawkes and Greg Rose 2003/080 ( PS PS.GZ PDF ) Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård and Jens Groth 2003/079 ( PS PS.GZ PDF ) Fast arithmetic on Jacobians of Picard curves Stéphane Flon and Roger Oyono 2003/078 ( PS PS.GZ PDF ) Relation between simulator-based and comparison-based definitions of semantic security Yodai Watanabe and Junji Shikata 2003/077 ( PS PS.GZ PDF ) An Un-Instantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem Mihir Bellare and Alexandra Boldyreva and Adriana Palacio 2003/076 ( PS PS.GZ PDF ) Goldbachs Conjecture on ECDSA Protocols N. Vijayarangan, Nitin Agarwal, S. Kasilingam 2003/075 ( PS PS.GZ ) Almost Security of Cryptographic Boolean Functions Kaoru Kurosawa 2003/074 ( PDF ) Divisible Voting Scheme Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata 2003/073 ( PDF ) A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures Sunder Lal and Amit K Awasthi 2003/072 ( PDF ) Proxy Blind Signature Scheme Sunder Lal and Amit K Awasthi 2003/071 ( PS PS.GZ PDF ) How to Protect Against a Militant Spammer Markus Jakobsson and John Linn and Joy Algesheimer 2003/070 ( PS PS.GZ PDF ) A Critique of CCM P. Rogaway and D. Wagner 2003/069 ( PS PS.GZ PDF ) A Conventional Authenticated-Encryption Mode M. Bellare and P. Rogaway and D. Wagner 2003/068 ( PS PS.GZ PDF ) On the Security of Some Proxy Signature Schemes Hung-Min Sun and Bin-Tsan Hsieh 2003/067 ( PS PS.GZ PDF ) Forking Lemmas in the Ring Signatures' Scenario Javier Herranz and Germ\'an S\'aez 2003/066 ( PS PS.GZ PDF ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K.C.Reddy 2003/065 ( PS PS.GZ PDF ) Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare and Tadayoshi Kohno 2003/064 ( PS PS.GZ PDF ) On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod 2003/063 ( PS PS.GZ PDF ) Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt 2003/062 ( PS PS.GZ ) An n-party Key Agreement Scheme using Bilinear Map Rana Barua and Ratna Dutta and Palash Sarkar 2003/061 ( PDF ) Hidden Polynomial Cryptosystems Ilia Toli 2003/060 ( PS PS.GZ PDF ) Isomorphism Classes of Picard Curves over Finite Fields Jong Won Lee 2003/059 ( -- withdrawn -- ) A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack Huafei Zhu and Bao Feng and Robert H. Deng 2003/058 ( PS PS.GZ PDF ) An Elliptic Curve Trapdoor System Edlyn Teske 2003/057 ( PS PS.GZ ) Secure Multiplication of Shared Secrets in the Exponent Mario Di Raimondo and Rosario Gennaro 2003/056 ( PS PS.GZ PDF ) Computing of Trust in Distributed Networks Huafei Zhu and Bao Feng and Robert H. Deng 2003/055 ( PDF ) A New Approach to Prevent Blackmailing in E-Cash Xiaofeng Chen and Fangguo Zhang and Yumin Wang 2003/054 ( PS PS.GZ PDF ) ID based Cryptosystems with Pairing on Elliptic Curve Ryuichi SAKAI and Masao KASAHARA 2003/053 ( PS PS.GZ ) Tate-pairing implementations for tripartite key agreement Iwan Duursma and Hyang-Sook Lee 2003/052 ( PDF ) Attacking RSA-based Sessions in SSL/TLS Vlastimil Klima and Ondrej Pokorny and Tomas Rosa 2003/051 ( PS PS.GZ ) How to Predict the Output of a Hardware Random Number Generator Markus Dichtl 2003/050 ( PS PS.GZ PDF ) Concealment and its Applications to Authenticated Encryption Yevgeniy Dodis and Jee Hea An 2003/049 ( PS PS.GZ PDF ) Hidden Number Problem in Small Subgroups Igor Shparlinski and Arne Winterhof 2003/048 ( PS PS.GZ PDF ) Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera 2003/047 ( PS PS.GZ PDF ) A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme Masao KASAHARA and Ryuichi SAKAI 2003/046 ( PS PS.GZ PDF ) Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers Guilin Wang, and Bo Zhu 2003/045 ( PDF ) An algorithm to obtain an RSA modulus with a large private key L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A. Queiruga Dios 2003/044 ( -- withdrawn -- ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K.C.Reddy 2003/043 ( PS PS.GZ PDF ) Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish 2003/042 ( PS PS.GZ ) Timed Fair Exchange of Standard Signatures Juan A. Garay and Carl Pomerance 2003/041 ( PS PS.GZ ) A new statistical distinguisher for the shrinking generator Jovan Dj. Golic and Renato Menicocci 2003/040 ( PS PS.GZ ) Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function Kishan Chand Gupta and Palash Sarkar 2003/039 ( PS PS.GZ PDF ) Torus-based cryptography Karl Rubin and Alice Silverberg 2003/038 ( PS PS.GZ PDF ) Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions Kazukuni Kobara and Hideki Imai 2003/037 ( PS PS.GZ PDF ) Strengthening Zero-Knowledge Protocols using Signatures Juan A. Garay and Philip MacKenzie and Ke Yang 2003/036 ( PS PS.GZ PDF ) Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem Jean-Sebastien Coron 2003/035 ( PDF ) On alternative approach for verifiable secret sharing Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk ______________________________________________________________________________ Open Positions in Cryptology ______________________________________________________________________________ IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at [1]http://www.iacr.org/jobs/ and also included in the [2]IACR Newsletter that is sent to members three times per year. To advertise your job opportunities, please send a description of no more than 150 words in plain ASCII text by email to jobs(at)iacr.org. This should include an URL and further contact information. No attachments or word documents, please! (Submissions in other formats than text will not be posted.) As this is intended to be a service to the members of IACR, it is free for all members. We ask that commercial enterprises who want to advertise their openings identify at least one of their employees who is a member of IACR. (IACR does not know corporate membership.) Please contact the membership secretariat to [3]become a member of IACR. On top of that, IACR accepts donations and is always looking for sponsors for its conferences. _________________________________________________________________ Katholieke Universiteit Leuven The research group COSIC of the Katholieke Universiteit Leuven has been founded in 1979. The group currently has 27 researchers and graduate students (from 12 nationalities) working in the area of cryptology and its applications. The group wants to hire 2 PhD students who will contribute to a new European collaborative research project in the area of privacy and identity management. Under the co-supervision of David Chaum, the students will work on innovative cryptographic techniques and solutions for identity management schemes. We are looking for strong candidates with an undergraduate degree in computer science or mathematics; successful candidates would have a good theoretical background and some understanding of security applications. We will also consider applicants at the postdoctoral level with a PhD degree relevant to the research topic. For further details see http://www.esat.kuleuven.ac.be/cosic The closing date for applications is November 1, 2003. (04-Sep-03) _________________________________________________________________ Université catholique de Louvain Université catholique de Louvain Two-year post-doctoral fellowship The UCL Crypto Group has a proposal for a two-year post-doctoral fellowship in cryptology, funded by the Région wallonne (Belgium). The UCL Crypto Group brings together people and expertise from Microelectronics, Telecomunications, Computer Science, Mathematics, and Applied Mathematics, working together for research and applications in cryptology, secure protocols and integrated interoperable security, under the direction of Prof. J.-J. Quisquater. For more details on the group's research activities, visit http://www.uclcrypto.org Candidate: - must be less than 36 - must be resident (and of nationality) of one of the following countries: Poland, Hungary, Romania, Bulgaria, Slovakia, Czech Republic, Estonia, Lettonia, Lithuania, Slovenia, Bolivia, Chile, Cuba, Haiti, Québec, Burkina Faso, Benin, Senegal, Morocco, Congo Dem. Rep., Tunisia, Lebanon, Palestine, Israel, Vietnam, China. This corresponds to countries the Région wallonne has concluded specific agreements with. - must have a Ph.D. at the date of Oct. 1st, 2003. Note that the deadline for formal submission to the Région wallonne is very tight: October 1st, 2003. Potential applicants are therefore invited to express interest very quickly by contacting Prof. Quisquater (jjq@dice.ucl.ac.be). Further information can be obtained by J.-J. Quisquater or by F. Koeune (fkoeune@dice.ucl.ac.be). (02-Sep-03) _________________________________________________________________ Department of Informatics, University of Bergen, Norway Department of Informatics, University of Bergen, Norway The Department of Informatics has a vacant professorship in cryptology. By "cryptology" we mean analysis of (in the information theoretic, the coding theoretic, and the complexity theoretic sense), and design of cryptographic systems and algorithms, including systems for confidentiality, authentication, and key management. The successful applicant must document an extensive research career in the field of cryptology. In addition to the vacant professorship, the department's coding theory and cryptology group currently comprises 3 full professors, 2 adjunct professors, 2 postdoctoral researchers, and 5 PhD fellows. The group was recently organised as the Selmer Centre, which is described at www.selmer.uib.no. The group's cryptologic research is focused on the interaction between cryptology and coding theory. It is expected that the successful applicant will extend the group's research activity in a natural and complementing way. For further information contact Tor Helleseth (torh@ii.uib.no) or Øyvind Ytrehus (oyvind@uib.no). The closing date for applications will be September 1, 2003. (17-Jul-03) _________________________________________________________________ University of Bristol Research Assistant in Computer Science : Cryptography/Quantum Computation (ref. 9316) Bristol is one of the leading research based universities in the UK located at the heart of one of Europe's largest concentrations of high-technology industry. We are an international centre of excellence in research and have expanded rapidly over the last five years. The Department intends to appoint a research assistant in Computer Science to work on the interface between Quantum Information Processing and Cryptography. In particular the research is to investigate cryptographic signature schemes which would remain secure in the presence of quantum computers. We are looking to appoint someone who has completed, or is near to completeing, a Phd in a relevant area. Successful candidates would either have a background in cryptography or quantum computation, however candidates with other relevant experience in related areas of Computer Science or Mathematics are encouraged to apply. For applications and further details see http://www.cs.bris.ac.uk/Research/Vacancies/nigel.html The closing date for applications is 01/07/03 (07-May-03) _________________________________________________________________ Norwegian University of Science and Technology - NTNU Norwegian University of Science and Technology - NTNU Centre for Quantifiable Quality of Service in Communication Systems Centre of Excellence The Centre is a Centre of Excellence under the scheme initiated by The Research Council of Norway to enable Norwegian research groups to carry on long-term, basic research at a high international standard. The Centre will deal with Quality of Service issues in heterogeneous, multilayered networks where packet switching technology is employed. The Centre will work within the following areas: multimedia signal processing, dependability, traffic and security as applied to multiparty communication. There are now vacant positions for doctoral students and postdocs. The Centre also has openings for visiting professors and scholars, and invites doctoral students from the EU to apply for a stay under the auspices of Marie Curie Training Site. For further information visit http://www.ntnu.no/Q2S (22-Apr-03) ______________________________________________________________________________ IACR Calendar of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please send email to webmaster(at)iacr.org . (The current condition for being listed here is that the description of an event must match the word "*crypt*".) 2003 * [2]Second International Workshop on Trust and Privacy in Digital Business (TrustBus'03), September 1-5, Prague, Czech Republic. * [3]Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2003, September 7-10, Cologne, Germany. * [4]International Workshop on Cryptology and Network Security (CANS03), September 24-26, Miami, Florida, USA. * [5]Workshop on "Mathematics of Cryptology", September 26-October 2, Leiden University, The Netherlands. * [6]6th Information Security Conference (ISC'03), October 1-3, Hewlett-Packard Laboratories, Bristol, UK. * [7]Fifth International Conference on Information and Communications Security (ICICS 2003), October 10-13, Huhehaote City, Inner-Mongolia, China. * [8]8th European Symposium on Research in Computer Security (ESORICS 2003), October 13-15, Gjøvik, Norway. * [9]1st MiAn International Conference on Applied Cryptography and Network Security (ACNS'03), October 16-19, Kunming, China. * [10]Third International Workshop for Asian PKI (IWAP2003), October 27-29, Kokura (Kita-Kyushu), Japan. * [11]Internation Workshop on Digital Watermarking (IWDW2003), October 20-22, Seoul, S. Korea. * [12]ACM Workshop on Digital Rights Management (DRM 2003), October 27, 2003 Washington DC, USA. * [13]10th ACM Conference on Computer and Communications Security (CCS 2003), October 27-30, Washington, DC, USA. * [14]Formal Methods in Security Engineering: From Specification to Code (FMSE 2003), October 30, 2003 Washington DC, USA. * [15]2nd Workshop on Privacy in the Electronic Society (WPES 2003), October 30, 2003 Washington DC, USA. * [16]2nd IEEE International Security in Storage Workshop (SISW 2003), October 31, Washington, DC, USA. * [17]Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 31, Fairfax, VA, USA. * [18]30th Annual Computer Security Conference and Exhibition (30th Annual), November 3-5, Washington, DC, USA. * [19]Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS '03), November 13-14, Lausanne, Switzerland. * [20]RFID Privacy Workshop at MIT (RFIDPRIV03), November 15, Cambridge, Massachusetts. * [21]The 6th Annual International Conference on Information Security and Cryptology (ICISC 2003), November 27-28, Seoul, Korea. * [22]Asiacrypt 2003, November 30-December 4, Taipei, Taiwan. * [23]Worshop on Security of Information Technologies (WSTI'03), December 8-10, Algiers, Algeria. * [24]Fourth International Conference on Cryptology in India (Indocrypt 2003), December 8-10, New Delhi, India. * [25]Special Session on Evolutionary Computation in Computer Security and Cryptology (CEC2003), December 8-12, Canberra, Australia. * [26]International Conference on "Number Theory for Secure Communications" (icnsen2k3), December 20-21, Kumbakonam, India. * [27]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. 2004 * [28]Advanced Course on Contemporary Cryptology, February 2-13, Barcelona, Spain. * [29]Fast Software Encryption (FSE 2004), February 5-7, New Delhi, India. * [30]Network and Distributed System Security Symposium (NDSS'04), February 5-7, San Diego, CA, USA. * [31]Theory of Cryptography Conference (TCC 2004), February 18-20, MIT, Cambridge, MA, USA. * [32]International Workshop on Practice and Theory in Public Key Cryptography (PKC 2004), March 1-4, Singapore. * [33]Eighth International Financial Cryptography Conference (FC '04), February 9-12, Key West, Florida, USA. * [34]RSA Conference 2004, Cryptographers' Track (CT-RSA '04), February 23-27, San Francisco, CA, USA. * [35]Eurocrypt 2004, May 2-6, Interlaken, Switzerland. * [36]2004 IEEE Symposium on Security and Privacy (IEEE S&P 2004), May 9-12, Berkeley, USA. * [37]2004 ACM Conference on Electronic Commerce, May 17-21, New York, USA. * [38]Second Conference of Applied Cryptography and Network Security (ACNS '04), June 8-11, Yellow Mountain, China. * [39]Crypto 2004, August 15-19, Santa Barbara, California, USA. * [40]International Conference on E-Business and Telecommunication Networks (ICETE'04), August 25-28, Setúbal, Portugal. * [41]Asiacrypt 2004, December 5-9, Jeju Island, Korea. * [42]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. 2005 * [43]International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005), January 23-26, Les Diablerets, Switzerland. * [44]Eurocrypt 2005, May 22-26, Aarhus, Denmark. * [45]Crypto 2005, August 14-18, Santa Barbara, California, USA. * [46]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. * [47]Asiacrypt 2005, (December), Madras, India. 2006 * [48]Eurocrypt 2006, (May), St. Petersburg, Russia. * [49]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. References 1. http://www.iacr.org/events/submit.html 2. http://www.uni-regensburg.de/Fakultaeten/WiWi/pernul/dexa03ws/ 3. http://islab.oregonstate.edu/ches/ 4. http://cs.anu.edu.au/~Chuan.Wu/conference/cans03/ 5. http://www.lc.leidenuniv.nl/lc/web/2003/20030926/info.php3?wsid=98 6. http://www.hpl.hp.com/conferences/isc03 7. http://www.cstnet.net.cn/icics2003 8. http://www.hig.no/esorics2003/ 9. http://acns2003.i2r.a-star.edu.sg/ 10. http://tcsg.csce.kyushu-u.ac.jp/iwap03/ 11. http://www.iwdw.org/ 12. http://www.acm.org/sigs/sigsac/ccs/CCS2003/drm.html 13. http://www.acm.org/sigs/sigsac/ccs/CCS2003/ 14. http://www.zurich.ibm.com/~mbc/FMSE02 15. http://seclab.dti.unimi.it/wpes2003/ 16. http://www.stortek.com/hughes/sisw2003 17. http://www.cs.gmu.edu/sasn/ 18. http://gocsi.com/ 19. http://lbd.epfl.ch/e/conferences/IICIS03/ 20. http://www.rfidprivacy.org/ 21. http://www.icisc.org/ 22. http://conf.ncku.edu.tw/ac03/ 23. http://www.epita.fr/~wsti03 24. http://www.isical.ac.in/~indocrypt/ 25. http://tracer.uc3m.es/CFP-SS-CEC2003.html 26. http://www.sastra.edu/icnsen2k3 27. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 28. http://www.crm.es/ContemporaryCryptology 29. http://www.isical.ac.in/~fse2004 30. http://www.isoc.org/isoc/conferences/ndss/04/ 31. http://www-cse.ucsd.edu/users/mihir/tcc/tcc04/ 32. http://pkc2004.lit.org.sg/ 33. http://ifca.ai/fc04/ 34. http://www.rsasecurity.com/rsalabs/cfp_ct_rsa04.html 35. http://www.zurich.ibm.com/eurocrypt2004/ 36. http://www.ieee-security.org/TC/SP-Index.html 37. http://research.microsoft.com/acmec04 38. http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/acns.htm 39. http://www.iacr.org/conferences/crypto2004/ 40. http://www.icete.org/ 41. http://www.iacr.org/conferences/asiacrypt2004/ 42. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 43. http://www.iacr.org/workshops/pkc2005/ 44. http://www.iacr.org/conferences/eurocrypt2005/ 45. http://www.iacr.org/conferences/crypto2005/ 46. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 47. http://www.iacr.org/conferences/asiacrypt2005/ 48. http://www.iacr.org/conferences/eurocrypt2006/ 49. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (2003) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. The numbers in parentheses give the terms of service in calendar years. The terms of service for conference chairs expire at the end of the calendar year of the conference. Officers Andrew J. Clark Bart Preneel President (2002-2004) Vice President (2002-2004) P.O. Box 743 Department of Electrical Brighton Engineering East Sussex Katholieke Universiteit Leuven BN1 5HS Kasteelpark Arenberg 10 United Kingdom B-3001 Heverlee Tel: +44 1273 270752 BELGIUM Fax: +44 1273 276558 Tel: +32 16 32 11 48 Email: president(at)iacr.org Fax: +32 16 32 19 86 Email: vicepresident(at)iacr.org Josh Benaloh Susan Langford Secretary (2002-2004) Treasurer (2002-2004) Microsoft Research 1275 Poplar Ave #101 One Microsoft Way Sunnyvale, CA 94086 Redmond, WA 98052 USA USA Tel: +1 408 732 4305 Tel: +1 425 703 3871 Email: treasurer(at)iacr.org Fax: +1 425 936 7329 Email: secretary(at)iacr.org Directors Don Beaver Thomas Berson Membership Secretary (2003-2005) Director (2001-2003) Seagate Anagram Labs Email: donald.beaver(at)seagate.com P.O. Box 791 Palo Alto CA, 94301 USA Tel: +1 650 324 0100 Email: berson(at)anagram.com Eli Biham Christian Cachin Director (2002-2004) Editor, IACR Newsletter (2002-2004) Computer Science Department IBM Zurich Research Laboratory Technion Säumerstrasse 4 Haifa 32000 CH-8803 Rüschlikon Israel Switzerland Tel: +972 4 8294308 Tel: +41 1 724 8989 Fax: +972 4 8294308 Fax: +41 1 724 8953 Email: biham(at)cs.technion.ac.il Email: newsletter(at)iacr.org Jan Camenisch Alan Chin-Chen Chang Eurocrypt 2004 General Chair Asiacrypt 2003 General Chair IBM Zurich Research Laboratory Department of Computer Science and Säumerstrasse 4 Information Engineering CH-8803 Rüschlikon National Chung Cheng University Switzerland 160, San-Hsing Tel: +41 1 724 8279 Min-Hsiung, Chiayi Fax: +41 1 724 8953 Taiwan 621 Email: jca(at)zurich.ibm.com Tel: +886-5-272-0411, ext. 33100, 23103 Fax: +886-4-232-77425 Email: asiacrypt2003(at)iacr.org Ed Dawson Yvo Desmedt Director (2003-2005) Director (2001-2003) Director, Information Security Department of Computer Science Research Centre Florida State University Queensland University of Technology PO Box 4530, 206 Love Building GPO Box 2434 Tallahassee, FL 32306-4530 Brisbane, Qld 4001 USA AUSTRALIA Tel: +1 850 644 9298 Tel: +61 7 3864 1919 Fax: +1 850 644 0058 Fax: +61 7 3221 2384 Email: desmedt(at)nu.cs.fsu.edu Email: e.dawson(at)qut.edu.au Jerzy Gawinecki James Hughes Eurocrypt 2003 General Chair Crypto 2004 General Chair Institute of Mathematics and Storage Technology Corp. Operations Research 7600 Boone Avenue North Military University of Technology Brooklyn Park, MN Kaliskiego Str. 2, 00-908 Warsaw USA Poland Tel: +1 763 424 1676 Tel: +48 22 6839556 Fax: +1 763 424 1776 Fax: +48 22 6839719 Email: james_hughes(at)stortek.com Email: j.gawinecki(at)imbo.wat.waw.pl or eurocrypt2003(at)iacr.org Kwangjo Kim Lars Knudsen Asiacrypt 2004 General Chair Director (2001-2003) School of Engineering Technical University of Denmark Information and Communications Dept. of Mathematics Univ. Building 303 58-4 Hwaam-dong Yusong-ku DK-2800 Lyngby Taejon, 305-348 DENMARK KOREA Tel: +45 4525 3048 Tel: +82 42 866 6118 Fax: +45 4588 1399 Fax: +82 42 866 6154 Email: knudsen(at)mat.dtu.dk Email: kkj(at)icu.ac.kr Tsutomu Matsumoto Ueli Maurer Director (2002-2004) Editor-in-Chief, Journal of Graduate School of Environment and Cryptology (2002-2005) Information Sciences Department of Computer Science Yokohama National University ETH Zürich 79-7 Tokiwadai, Hodogaya, Yokohama CH-8092 Zürich 240-8501, Japan Switzerland Tel: +81-45-339-4133 Tel: +41 1 632 7420 Fax: +81-45-339-4338 Fax: +41 1 632 1172 Email: Email: maurer(at)inf.ethz.ch or tsutomu(at)mlab.jks.ynu.ac.jp jofc(at)iacr.org Kevin S. McCurley Jean-Jacques Quisquater Director (2002-2004) Director (2003-2005) 6721 Tannahill Drive Université catholique de Louvain San Jose, CA 95120 Microelectronic laboratory USA Place du Levant, 3 Tel: +1 408 927 1838 1348 Louvain-la-Neuve Email: mccurley(at)swcp.com BELGIUM Tel: +32 10 47 25 41 Fax: +32 10 47 25 98 Email: jjq(at)dice.ucl.ac.be Greg Rose Rebecca Wright Crypto 2003 General Chair Director (2003-2005) Qualcomm Australia Department of Computer Science Level 3, 230 Victoria Road Stevens Institute of Technology Gladesville NSW 2111 Castle Point on Hudson Australia Hoboken, NJ 07030 Tel: +61 2 9817 4188 USA Fax: +61 2 9817 5199 Tel: +1 201 216-5328 Email: crypto2003(at)iacr.org Fax: +1 201 216-8249 Email: rwright(at)cs.stevens-tech.edu ------------------------------------------------------------------------ Other People Working for IACR Hilarie Orman Archivist Email: archive(at)iacr.org ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year (usually in February, June, and October) and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org . Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter(at)iacr.org The next issue Deadline for submissions to the next newsletter issue is October 31, 2003. However, many items will be posted on the website as soon as possible. ______________________________________________________________________________ End of IACR Newsletter, Vol. 20, No. 2, Summer 2003. ______________________________________________________________________________