Date
|
||
Sunday, November 30, 2003 |
||
16:30-18:00 | Registration | |
18:00-20:30 | Reception | |
Monday, December 1, 2003 |
||
08:45-09:00 | Opening Ceremony | Che-Ho Wei |
Session 1: Public key
Cryptography I |
Phong Q. Nguyen |
|
09:00-09:25 | Chosen-Ciphertext
Security without Redundancy Duong Hieu
Phan, David Pointcheval
|
|
09:25-09:50 |
Some
RSA-based Encryption Schemes with Tight Security Reduction
Kaoru Kurosawa, Tsuyoshi Takagi
|
|
09:50-10:15 | A Simple
Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and
its Applications Emmanuel
Bresson, Dario Catalano, David Pointcheval
|
|
10:15-10:40 | Coffee
Break |
|
Session 2: Number Theory I |
Kwangjo Kim |
|
10:40-11:05 | Factoring
estimates for a 1024-bit RSA modulus Arjen
Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James
Hughes, Paul Leyland
|
|
11:05-11:30 | Index
Calculus Attack for Hyperelliptic Curves of Small Genus Nicolas
Thériault
|
|
11:30-12:30 | Distinguished
Lecture
by
Don Coppersmith Title: Solving low degree polynomials |
Bart Preneel |
12:30-14:00 | Lunch |
|
Session 3: Efficient Implementations |
Arjen K. Lenstra |
|
14:00-14:25 | Parallelizing
Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar
Mishra, Palash Sarkar
|
|
14:25-14:50 | Tate
pairing implementation for hyperelliptic curves y2
= xp - x + d Iwan Duursma,
Hyang-Sook Lee
|
|
14:50-15:15 | The AGM-X0(N)
Heegner point lifting algorithm and elliptic curve point counting David R. Kohel
|
|
15:15-15:45 | Coffee
Break |
|
Session 4: Key Management and
Protocols |
Pil Joong Lee |
|
15:45-16:10 | Key
Management Schemes for Stateless Receivers Based on Time Varying
Heterogeneous Logical Key Hierarchy Miodrag J.
Mihaljević
|
|
16:10-16:35 | Leakage-Resilient
Authenticated Key Establishment Protocols SeongHan
Shin, Kazukuni Kobara, Hideki Imai
|
|
16:35-17:00 | Untraceable
Fair Network Payment Protocols with Off-line TTP Chih-Hung Wang
|
|
Tuesday, December 2, 2003 |
||
Session 5: Hash Functions |
Eiji Okamoto |
|
09:00-09:25 | Incremental
Multiset Hash Functions and Their Application to Memory Integrity
Checking Dwaine
Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward
Suh
|
|
09:25-09:50 | New
Parallel Domain Extenders for UOWHF Wonil Lee,
Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi
|
|
09:50-10:15 | Cryptanalysis
of 3-pass HAVAL Bart Van
Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle
|
|
10:15-10:40 | Coffee
Break |
|
Invited Talk I |
Chin Chen Chang |
|
10:40-11:40 | Adi Shamir Cryptography: State of the Science |
|
11:40-13:30 | Lunch |
|
13:30 | Free afternoon (Visition
National Palace Museum) |
|
18:30-20:00 |
Light
Dinner(Rump Session) |
|
19:30-22:30 | Rump Session | Tzong Chen Wu |
Wednesday, December 3, 2003 |
||
Session 6: Group Signatures |
Reihaneh Safavi-Naini |
|
09:00-09:25 | Efficient
Group Signatures without Trapdoors Giuseppe
Ateniese, Breno de Medeiros
|
|
09:25-09:50 | Accumulating
Composites and Improved Group Signing Gene Tsudik,
Shouhuai Xu
|
|
09:50-10:15 | Almost
uniform density of power residues and the provable security of ESIGN Tatsuaki
Okamoto, Jacques Stern
|
|
10:15-10:40 | Coffee
Break |
|
Session 7: Number Theory II |
Arjen K. Lenstra |
|
10:40-11:05 | Rotations
and Translations of Number Field Sieve Polynomials Jason E. Gower
|
|
11:05-11:30 | On Class
Group Computations Using the Number Field Sieve Mark L.
Bauer, Safuat Hamdy
|
|
Invited Talk II |
Chi Sung Laih |
|
11:30-12:30 | Hong-Sen
Yan The Secret and Beauty of Ancient Chinese Locks |
|
12:30-14:00 | Lunch | |
Session 8: Block Ciphers |
Shiuh Pyng Shieh |
|
14:00-14:25 | A
Traceable Block Cipher Olivier
Billet, Henri Gilbert
|
|
14:25-14:50 | A New
Attack Against Khazad Frédéric
Muller
|
|
Session 9: Broadcast and Multicast |
Josef Pieprzyk |
|
14:50-15:15 | An
Efficient Public Key Trace and Revoke Scheme Secure against Adaptive
Chosen Ciphertext Attack Chong Hee
Kim, Yong Ho Hwang, Pil Joong Lee
|
|
15:15-15:40 | Sequential
Key Derivation Patterns for Broadcast Encryption and Key
Predistribution Schemes Nuttapong
Attrapadung, Kazukuni Kobara, Hideki Imai
|
|
15:40-16:10 | Coffee
Break |
|
Session 10: Foundations and Complexity
Theory |
Dieter Gollmann |
|
16:10-16:35 | Boneh et
al.'s k-Element Aggregate Extraction Assumption Is Equivalent to The
Diffie-Hellman Assumption Jean-Sebastien
Coron, David Naccache
|
|
16:35-17:00 | On
Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa
|
|
17:00-17:25 | Verifiable
Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa
|
|
17:25-17:50 | IACR members meeting |
|
18:30-21:30 | Banquet |
|
Thursday, December 4, 2003 |
||
Session 11: Public Key Cryptography II |
Masayuki Abe |
|
09:00-09:25 | Generalized
Powering Functions and their Application to Digital Signatures Hisayoshi
Sato, Tsuyoshi Takagi, Satoru Tezuka , Kazuo Takaragi
|
|
09:25-09:50 | Certificateless
Public Key Cryptography Sattam S.
Al-Riyami, Kenneth G. Paterson
|
|
09:50-10:15 | A Complete
and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Kaoru
Kurosawa , Katja Schmidt-Samoa, Tsuyoshi Takagi
|
|
10:15-10:40 | The
Insecurity of Esign in Practical Implementations Pierre-Alain
Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
|
|
10:40-11:05 | Coffee
Break |
|
Session 12: Digital Signature |
Chin Laung Lei |
|
11:05-11:30 | Efficient
One-time Proxy Signatures Huaxiong
Wang, Josef Pieprzyk
|
|
11:30-11:55 | Universal
Designated-Verifier Signatures Ron
Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
|
|
11:55-13:30 | Lunch |
|
13:30 | Adjourn |