Presentation Materials

Note: Each presentation material is provided by individual author for research
     purpose only. Note that every material is copyrighted by the author.

Monday December 6, 2004

Session 1 : Block Ciphers Feng Bao

Session 2 : Public Key Encryption Josef Pieprzyk

Invited Talk I Josef Pieprzyk

Session 3 : Number Theory and Algebra Kazue Sako

Session 4 : Secure Computation Rosario Gennaro

Tuesday December 7, 2004

Session 5 : Hash Functions David Pointcheval

Session 6 : Key Management Kouichi Sakurai

Wednesday December 8, 2004

Session 7 : Identification Bart Preneel

Session 8 : XL-algorithms Atsuko Miyaji

Session 9 : Digital Signatures Atsuko Miyaji

Session 10 : Public Key Cryptanalysis Rei Safavi-Naini

Invited Talk II Jin Dong Gong

Thursday December 9, 2004

Session 11 : Symmetric Key Cryptanalysis Dong Hoon Lee

Session 12 : Protocols Serge Vaudenay

 Rump Session

T1. How to Hack the Microsoft Research Conference Management Tool (MSRCMT)     Raphael C.-W. Phan & Huo-Chong Ling

T2. Time memory tradeoff attacks on streamciphers, revisited     Jin Hong & Palash Sarkar

T3. Improved Key Management for Fiat-Tassa Dynamic Traitor Tracing Scheme   Tzong-Chen Wu, Yen-Ching Lin, & Ming-Chin Lee          

A1. Information Theory Workshop 2005 (ITW 05 Japan)   Junji Shitaka

A2. An update on the standards for efficient cryptography group(SECG)   William Lattin         

A3. A Call for Stream Ciphers by ECRYPT   Bart Preneel          

A4. Announcements regarding Crypto 05   Tomas Sander          

A5. Another announcement   Moti Yung         

A6. International Conference on Cryptology in Malaysia (Mycrypt 2005)   Ed Dawson, Serge Vaudenay & Raphael C.-W. Phan

A7. Call for Participation to PKC 2005   Jean Monnerat    


INTERMISSION      

T4. Improved Related-Key Attacks on DESX and DESX+    Raphael C.-W. Phan & Adi Shamir       

T5. Certified E-mail for Contracts of Changeable Values   Kenji Imamoto & Kouichi SAKURAI     

T6. Specification of a quantum computer for factoring    Noboru Kunihiro   

T7. Security Analysis of a 2/3-rate Double Length Compression Fcn in Black-Box Model   Wonil Lee, Mridul Nandi, Kouichi Sakurai & Sangjin Lee

T8. Secure Distributed Human Computation    Craig Gentry, Zulfikar Ramzan & Stuart Stubblebine

T9. A Surprise Talk