April 2-4, 2001 Royal
Park Hotel Nikko, Yokohama, Japan
WORKSHOP PROGRAM
Monday, April 2, 2001
8:00-
Registration
8:45-9:00
Welcome Remarks
9:00-9:25
The Saturation Attack – a Bait for Twofish
9:25-9:50
Linear Cryptanalysis of Reduced Round Serpent
Eli
Biham, Orr Dunkelman and Nathan Keller
9:50-10:15 Cryptanalysis of the Mercy Block Cipher
Scott
R. Fluhrer
10:15-10:45 Break
Session
2: Hash Functions and Boolean Functions
10:45-11:10 Producing
Collisions for PANAMA
Vincent
Rijmen, Bart Van Rompay, Bart Preneel and Joos Vandewalle
11:10-11:35 The RIPEMDL
and RIPEMDR improved
variants of MD4 are not collision free
Christophe
Debaert and Henri Gilbert
11:35-12:00 New
constructions of resilient Boolean functions with maximal nonlinearity
Yuriy
Tarannikov
12:00-13:35 Lunch
Session
3: Modes of Operations
13:35-14:00 Optimized
Self-Synchronizing Mode of Operation
Ammar
Alkassar, Alexander Geraldy, Birgit Pfitzmann and Ahmad-Reza Sadeghi
14:00-14:25
Fast Encryption and Authentication: XCBC Encryption and XECB
Authentication Modes
Virgil D. Gligor and Pompiliu
Donescu
14:25-14:50 Incremental
Unforgeable Encryption
Enrico
Buonanno, Jonathan Katz and Moti Yung
14:50-15:20 Break
Session
4: Cryptanalysis of Stream Ciphers I
15:20-15:45 ZIP Attacks
with Reduced Known Plaintext
Michael
Stay
15:45-16:10 Cryptanalysis
of the SEAL 3.0 Pseudorandom Function Family
Scott
R. Fluhrer
16:10-16:35 Cryptanalysis
of SBLH
Goce Jakimoski and
Ljupco Kocarev
16:35-17:00 A Practical
Attack on Broadcast RC4
Itsik
Mantin and Adi Shamir
Tuesday, April 3, 2001
Session
5: Cryptanalysis of Block Ciphers II
9:00-9:25
Improved SQUARE Attacks Against Reduced-Round HIEROCRYPT
Paulo S.L.M. Barreto, Vincent Rijmen,
Jorge Nakahara Jr., Bart Preneel,
Joos Vandewalle and Hae Y. Kim
9:25-9:50
Differential Cryptanalysis of Q
Eli
Biham, Vladimir Furman, Michal Misztal and Vincent Rijmen
9:50-10:15 Differential Cryptanalysis of Nimbus
Vladimir
Furman
10:15-10:45 Break
Session
6: Cryptanalysis of Stream Ciphers II
10:45-11:10 Fast
Correlation Attack Algorithm with List Decoding and an Application
Miodrag J. Mihaljevic,
Marc P.C. Fossorier and Hideki Imai
11:10-11:35 Bias in the
LEVIATHAN Stream Cipher
Paul
Crowley and Stefan Lucks
11:35-12:00 Analysis of
SSC2
Daniel
Bleichenbacher and Willi Meier
12:00-13:35 Lunch
Session
7: Pseudo-Randomness
13:35-14:00 Round
Security and Super-Pseudorandomness of MISTY type structure
Tetsu
Iwata, Tomonobu Yoshino, Tomohiro Yuasa and Kaoru Kurosawa
14:00-14:25 New Results
on the Pseudorandomness of some Blockcipher Constructions
Henri
Gilbert and Marine Minier
Session
8: FSE 2001 Special Talk
14:25-15:00 NESSIE: A
European Approach to Evaluate Cryptographic Algorithms
Bart
Preneel
15:00-15:30 Break
Session
9: Rump Talks
15:30-
To be announced. The deadline of submission: April 2 Monday 17:00
19:00-22:00
Banquet
Wednesday,
April 4, 2001
Session
10: Cryptanalysis of Block Ciphers III
9:00-9:25
Related Key Attacks on Reduced Round KASUMI
Mark Blunden and
Adrian Escott
9:25-9:50
Security of Camellia against Truncated Differential Cryptanalysis
Masayuki
Kanda and Tsutomu Matsumoto
9:50-10:15 Impossible
Differential Cryptanalysis of Zodiac
Deukjo
Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee and Jongin Lim
10:15-10:45
Break
Session
11: Design and Evaluation
10:45-11:10 The Block
Cipher SC2000
Takeshi Shimoyama,
Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka,
Kouichi Itoh, Jun Yajima, Naoya Torii and Hidema Tanaka
11:10-11:35 Flaws in
differential cryptanalysis of Skipjack
Louis
Granboulan
11:35-12:00 Efficient
Algorithms for Computing Differential Properties of Addition
Helger
Lipmaa and Shiho Moriai
Last updated in March 20, 2001