Preliminary Schedule, Crypto '96 All sessions are in Lotte Lehmann Auditorium, except as noted. All breakfasts and lunches are in De La Guerra Dining Commons. Entry to the dining hall for breakfast is 7:00 - 8:00; lunch 12:00 - 1:00. Sunday, August 18, 1996 8:00 - 5:00 Excursion to Channel Islands National Marine Sanctuary Transportation to Sea Landing leaves outside Anacapa Hall at 7:30. 4:00 - 8:00 Registration Anacapa Hall 6:30 - 10:00 Reception Anacapa Lawn ---------------------------------------------------------- Monday, August 19, 1996 8:00 Registration outside Lotte Lehmann Auditorium 8:30 - 8:45 Welcome Session 1: Hashing and Authentication I Bart Preneel, Chair 8:45 - 9:05 Keying Hash Functions for Message Authentication Mihir Bellare, Univ. California at San Diego, USA Ran Canetti, MIT, USA Hugo Krawczyk, IBM, USA 9:10 - 9:30 Universal Hashing and Multiple Authentication M. Atici, Univ. Nebraska at Lincoln, USA Douglas Stinson, Univ. Nebraska at Lincoln, USA 9:35 - 9:55 Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings Tor Helleseth, University of Bergen, Norway Thomas Johansson, Lund University, Sweden 10:00 - 10:25 Break Session 2: New Systems Tsutomu Matsumoto, Chair 10:30 - 10:50 Asymmetric Cryptography with a Hidden Monomial Jacques Patarin, CP8 TRANSAC, France 10:55 - 11:15 Anonymous Communication and Anonymous Cash Daniel Simon, Microsoft, USA Session 3: Invited Lecture Neal Koblitz, Chair 11:20 - 12:12 (Invited) Export Controls: Past, Present, and Future Andy Clark, Independent consultant 12:15 - 1:00 Lunch Session 4: Cryptanalysis I: Asymmetric Systems Matt Blaze, Chair 1:40 - 2:00 Weaknesses in Some Threshold Cryptosystems Susan Langford, Atalla Corp., USA 2:05 - 2:15 Hidden Collisions on DSS Serge Vaudenay, Ecole Normal Sup\'erieure, France 2:20 - 2:40 The Dark Side of 'Black-Box' Cryptography, or: Why Should We Trust Capstone? Adam Young, Columbia Univ., USA Moti Yung, IBM, USA 2:45 - 3:05 Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems Paul Kocher, Stanford, USA 3:10 - 3:35 Break Session 5: Hard Bits Andy Klapper, Chair 3:40 - 4:00 All Bits in $ax+b$ mod $p$ Are Hard Mats N\"aslund, Royal Insitute of Technology, Sweden 4:05 - 4:25 Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes Dan Boneh, Princeton Univ., USA Ramarathnam Venkatesan, Bellcore, USA Session 6: Invited Lecture Neal Koblitz, Chair 4:30 - 5:20 (Invited) [title to be announced] Cliff Stoll 7:00 - 10:00 Reception De La Guerra Lawn ---------------------------------------------------------- Tuesday, August 20, 1996 Session 7: Signatures Peter Landrock, Chair 8:30 - 8:50 Security of $2^t$-Root Identification and Signatures Claus P. Schnorr, Univ. Frankfurt, Germany 8:55 - 9:15 Robust and Efficient Sharing of RSA Functions Rosario Gennaro, MIT, USA Stanis{\l}aw Jarecki, MIT, USA Hugo Krawczyk, IBM, USA Tal Rabin, MIT, USA 9:20 - 9:40 New Generation of Secure and Practical RSA-Based Signatures Ronald Cramer, CWI, The Netherlands Ivan Damg{\aa}rd, Aarhus Univ., Denmark 9:45 - 10:10 Break Session 8: Zero Knowledge Mihir Bellare, Chair 10:15 - 10:35 Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers Markus Jakobsson, Univ. California at San Diego, USA Moti Yung, IBM, USA 10:40 - 11:00 Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing Shai Halevi, MIT, USA Silvio Micali, MIT, USA Session 9: Invited Lecture Josh Benaloh, Chair 11:05 - 11:55 (Invited) Relation of Theory to Practice in Cryptography [exact title to be announced] Ron Rivest, MIT, USA 12:00 - 1:00 Lunch Free afternoon 2:00 - 4:00 'Family Crypto' led by Michael Fellows Location to be announced 7:00 - 11:00 Rump Session Stuart Haber, Chair Corwin Pavillion in the University Center ---------------------------------------------------------- Wednesday, August 21, 1996 Session 10: Cryptanalysis II: Symmetric Systems Rainer Rueppel, Chair 9:00 - 9:20 Improved Differential Attacks on RC5 Lars Knudsen, Katholieke Univ. Leuven, Belgium Willi Meier, HTL, Switzerland 9:25 - 9:45 Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Paul van Oorschot, Bell-Northern Research, Canada Michael Wiener, Bell-Northern Research, Canada 9:50 - 10:15 Break Session 11: More on Symmetric Systems Lars Knudsen, Chair 10:20 - 10:40 Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey, Counterpane Systems, USA Bruce Schneier, Counterpane Systems, USA David Wagner, Univ. California at Berkeley, USA 10:45 - 11:05 How to Protect DES Against Exhaustive Key Search Joe Kilian, NEC Research Institute, USA Phillip Rogaway, Univ. California at Davis, USA Session 12: Invited Lecture Joan Feigenbaum, Chair 11:10 - 12:00 (Invited) Cryptographic applications in electronic commerce Ernest Brickell 12:00 - 1:00 Lunch Session 13: Diffie-Hellman Oracle Johannes Buchmann, Chair 1:30 - 1:50 Diffie-Hellman Oracles Ueli Maurer, ETH Z\"urich, Switzerland Stefan Wolf, ETH Z\"urich, Switzerland 1:55 - 2:15 Algorithms for Black-Box Fields and Their Application to Cryptography Dan Boneh, Princeton Univ., USA Richard Lipton, Princeton Univ., USA Session 14: Hashing and Authentication II Paul van Oorschot, Chair 2:20 - 2:40 Fast Hashing on the Pentium Antoon Bosselaers, Katholieke Univ. Leuven, Belgium Ren\'e Govaerts, Katholieke Univ. Leuven, Belgium Joos Vandewalle, Katholieke Univ. Leuven, Belgium 2:45 - 3:05 On Fast and Provably Secure Message Authentication Based on Universal Hashing Victor Shoup, Bellcore, USA 3:10 - 3:35 Break Session 15: Invited Lecture Joan Feigenbaum, Chair 3:40 - 4:30 (Invited) Cryptology, Technology, and Politics Whit Diffie 4:30 - 5:15 IACR Business Meeting 6:00 - 9:00 Beach barbecue Goleta Beach ---------------------------------------------------------- THURSDAY August 22, 1996 Session 16: Quantum Crypto Gilles Brassard, Chair 9:00 - 9:25 Quantum Cryptography over Underground Optical Fibers R. J. Hughes, Los Alamos National Labs, USA G. G. Luther, Los Alamos National Labs, USA G. L. Morgan, Los Alamos National Labs, USA C. G. Peterson, Los Alamos National Labs, USA C. Simmons, Los Alamos National Labs, USA 9:30 - 9:55 Quantum Key Distribution and String Oblivious Transfer in Noisy Channels Dominic Mayers, Univ. de Montr\'eal, Canada Session 17: Stream Ciphers Jacques Stern, Chair 10:00 - 10:20 Linear Complexity of Periodic Sequences: A General Theory James Massey, Swiss Federal Institute of Technology, Switzerland Shirlei Serconek, Univ. Federal de Goias, Brazil 10:25 - 10:45 Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations Paul Camion, INRIA, France Anne Canteaut, INRIA, France 10:50 - 11:15 Break Session 18: Secret Sharing Josh Benaloh, Chair 11:20 - 11:40 Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution Carlo Blundo, Univ. di Salerno, Italy Luiz Frota Mattos, CEPESC/SAE, Brazil Douglas Stinson, Univ. Nebraska at Lincoln, USA 11:45 - 12:05 New Results on Visual Cryptography Stefan Droste, Univ. Dortmund, Germany 12:10 - 1:00 Lunch Adjourn