______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter Vol. 16, No. 3, Fall 1999. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * Eurocrypt 2000 - Call for Papers * Crypto '99 Rump Session * 1999 Elections: Candidates * IACR Cryptology e-Print Server Announcement * Minutes of the BoD Meeting at Eurocrypt '99 * Announcements + SIGINT in Europe During the Cold War + DIMACS Workshop on the Management of Digital IP + New Reports in the Theory of Cryptography Library * New Books * Open Position * Calender of Events in Cryptology * IACR Contact Information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the fourth electronic issue of the IACR Newsletter! The biggest news in this issue, at least in my view, is the announcement of the ``IACR Cryptology e-Print Server.'' This service will make research results accessible faster and increase interaction and exchange of ideas in the field. I may also direct your attention to the current IACR elections and upcoming conferences. Next year will be the first year with three IACR-sponsored cryptography conferences: * Eurocrypt in Bruges/Brugge (Belgium), May 14-18; * Crypto in (Santa Barbara) , August 20-24; * Asiacrypt in Kyoto (Japan), December 3-7. Conferences in 2001: Eurocrypt will be held in Innsbruck, Austria (tentatively, May 6-10); program chair is Birgit Pfitzmann (pfitzmann@cs.uni-sb.de) and general chair is Reinhard Posch (Reinhard.Posch@iaik.at). For Crypto 2001 (tentatively, August 19-23), the program chair is Joe Kilian and general chair is Dave Balenson. For more information about upcoming workshops and confereneces, check the Calendar section or www.iacr.org/events/! If you have not received the IACR Newsletter by Email and would like to receive it in the future, then check out your Email address in the IACR member list that has been mailed in February 1999. IACR can only provide you with accurate information if you contribute your input. Please send in announcements of workshops, conferences, calls for papers, or any other item of interest to IACR members. The address for all submissions to the Newsletter and Calendar is newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in February. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ Eurocrypt 2000 ______________________________________________________________________________ E U R O C R Y P T 2 0 0 0 Bruges (Brugge), Belgium, May 14-18, 2000 CALL FOR PAPERS General Information: Original papers on all technical aspects of cryptology are solicited for submission to Eurocrypt 2000, the 19th Annual Eurocrypt Conference. Eurocrypt 2000 is organized by the International Association for Cryptologic Research (IACR). For more information, access http://www.iacr.org/. Instructions for authors: Authors are strongly encouraged to submit their papers electronically. A detailed description of the electronic submission procedure will appear by September 15, 1999 at http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/. Electronic submissions must conform to this procedure and be received by November 3, 1999, 17:00 MET in order to be considered. Authors unable to submit electronically are invited to send a cover letter and 20 copies of an anonymous paper (double-sided copies preferred) to the Program Chair at the postal address below. Submissions must be received by the Program Chair on or before November 3, 1999 (or postmarked by October 26, 1999, and sent via airmail or courier). Late submissions and submissions by fax will not be considered. The cover letter should contain the paper's title and the names and affiliations of the authors, and should identify the contact author including e-mail and postal addresses. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with proceedings. The paper must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be at most 12 pages excluding the bibliography and clearly marked appendices, and at most 20 pages in total, using at least 11-point font and reasonable margins. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Notification of acceptance or rejection will be sent to authors by January 26, 2000. Authors of accepted papers must guarantee that their paper will be presented at the conference. Conference Proceedings: Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on March 1, 2000. Submission: November 3, 1999 Acceptance: January 26, 2000 Proceedings version: March 1,2000 Program Committee: Simon Blackburn (Royal Holloway Univ. of London, UK) Dan Boneh (Stanford Univ., USA) Christian Cachin (IBM Research, Switzerland) Don Coppersmith (IBM Research, USA) Ronald Cramer (ETH Zurich, Switzerland) Hans Dobbertin (BSI, Germany) Markus Jakobsson (Bell Laboratories, USA) Thomas Johansson (Lund Univ., Sweden) Joe Kilian (NEC Research Institute, USA) Lars Knudsen (Univ. of Bergen, Norway) Mitsuru Matsui (Mitsubishi, Japan) Alfred Menezes (Univ. of Waterloo, Canada) Moni Naor (Weizmann Institute of Science, Israel) Kaisa Nyberg (Nokia Research Center, Finland) Paul van Oorschot (Entrust Technologies, Canada) Torben Pedersen (Cryptomathic, Denmark) David Pointcheval (ENS, France) Bart Preneel (chair) (K.U.Leuven, Belgium) Moti Yung (Certco, USA) Address for non-electronic submissions: Bart Preneel Program Chair, Eurocrypt 2000 Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT Kard. Mercierlaan 94 B-3001 Leuven, BELGIUM Phone: +32 16 32 11 48 Fax: +32 16 32 19 86 E-mail: bart.preneel@esat.kuleuven.ac.be For other information contact: Joos Vandewalle, General Chair, Eurocrypt 2000 Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT Kard. Mercierlaan 94 B-3001 Leuven, BELGIUM Phone: +32 16 32 10 50 Fax: +32 16 32 19 69 E-mail: eurocrypt2000@esat.kuleuven.ac.be Conference URL: http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/ Stipends: A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to the General Chair. ______________________________________________________________________________ Crypto '99 Rump Session Schedule ______________________________________________________________________________ Stuart Haber Presiding Session I 7:00 Introduction Stuart Haber 7:03 Prize awards for Hasty Pudding analysis Rich Schroeppel 7:10 Belgian remarks on U.S. pudding Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen 7:14 An attack on ISO 9786-1 Don Coppersmith, Shai Halevi, Charanjit Jutla 7:21 FPGA: A practical tool for cryptanalysis with running examples F. Koeune, J.-J. Quisquater, R. Sebastien, J.-P. David, T. Gilmont, J.-D. Legat 7:25 Quadruple DES Paul Kocher 7:28 Crypto law & export control update John Gilmore (& Cindy Cohn) 7:35 Fast precomputation for discrete logarithm cryptosystems C.P. Schnorr 7:40 Issues in tamper resistance Benjamin Jun 7:44 Random number generator failure in provably secure encryption schemes William Whyte, Burt Kaliski 7:50 (1) Arms export: Blazonry for dummies (2) Oenocryptology Don Beaver 7:56-8:10 Break Session II 8:10 Fun with cryptography: How not to set a final exam question G. Agnew 8:15 Signature schemes based on the strong RSA assumption Ronald Cramer, Victor Shoup 8:19 Constructions of universal hash families from algebraic curves over finite fields Chaoping Xing, Huaxiong Wang, Kwok Yan Lam 8:26 What is the PGP key of Bill Gates? A practical experiment with key servers J.-J. Quisquater 8:30 How to solve a system of equations inside IDEA E.G. Giessmann, G. Lassmann 8:32 Keeping secrets using .o files Steve Meyer 8:37 Computer license plates Thomas Cusick 8:41 A probabilistic poly-time framework for protocol analysis P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrov 8:46 Cross-encryption Rosario Gennaro, Shai Halevi, Tal Rabin 8:52 New forgeries with Rabin-like cryptosystems J.-S. Coron, M. Joye, J.-J. Quisquater 8:57 Cracking Kryptos (well, almost) Jim Gillogly 9:01 Introducing the T-class of SOBER stream ciphers Greg Rose, Philip Hawkes 9:06 Studying cycles in RC4 Chris Hall 9:11 Next-generation mobile phone algorithms Greg Rose 9:15-9:30 Break Session III 9:30 The P-problem: a solved instance and its implications Detlef Huehnlein 9:33 Player elimination in distributed protocols: Can resilience be for free? Martin Hirt, Ueli Maurer, Bartosz Przydatek 9:39 Efficient separable fair contract signing schemes based on standard signatures Jan Camenisch, Markus Michels 9:45 Consistency concerns for fair exchange Paul Syverson 9:51 OEF using a successive extension Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi 9:54 Tricks for a better efficiency of authentication protocols Marc Girault 9:58 Public-key cryptography and password protocols: The multi-user case Maurizio Boyarsky (presented by Cynthia Dwork) 10:03 Correlated coins and applications to game theory Yevgeniy Dodis, Shai Halevi, Tal Rabin 10:09 Complete characterization of security notions for probabilistic private-key encryption Jonathan Katz, Moti Yung 10:14 Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security Amit Sahai 10:16 A secure e-mail voting scheme with trusted authorities for one occasion Jozsef Lukovics 10:19 Riffle-shuffle and gray-code as block cipher components Jayant Shukla 10:22 A new blind signature scheme Pascal Paillier 10:26 Efficient dynamic traitor tracing Omer Berkman, Michal Parnas, Jiri Sgall 10:31 On full linear (k, n) traceability schemes K. Kurosawa, M. Burmester, Y. Desmedt 10:35 A new measure of cryptanalytic strength Bruce Schneier 10:38 Towards a simple distributed undeniable method of achieving robustly threshold-untraceable indistinguishability Michael Richardson 10:40 END ______________________________________________________________________________ 1999 Elections: Candidates ______________________________________________________________________________ Gilles Brassard (no statement) Kwangjo Kim Based on my previous experiences as a program co-chair of Asiacrypt '96 and program committee member of eleven international conferences, I will establish the coming IACR-sponsored Asiacrypt to be as prestigious as Crypto and Eurocrypt, and do my best to promote and vitalize cryptologic research activities throughout the world. Ueli Maurer I will continue to focus on all scientific aspects relevant to IACR (conferences, publications, electronic and conventional), helping IACR to improve its scientific standing. I will further contribute to the promotion of a good relationship between academic research and the commercial world. Bart Preneel Having first been a member of the IACR in 1988, I would like to continue serving as a Director with the objective of promoting research, stimulating young people to enter our fascinating field, and balancing the interests of research and applied cryptology. See www.esat.kuleuven.ac.be/~preneel for a longer statement. Jean-Jacques Quisquater (no statement) Serge Vaudenay I am willing to serve IACR in order to promote academic research in cooperation with industry. ______________________________________________________________________________ IACR Nominations Committee (see www.iacr.org/bod.html for addresses): Eli Biham Matt Franklin (Chair) Peter Landrock (Returning Officer) Positions for this Election: 3 Directors January 2000 - December 2002 Incumbents: Gilles Brassard Ueli Maurer Bart Preneel Ballots will be mailed by OCTOBER 1, 1999. Ballots must be mailed to be received by the Returning Officer in the official envelopes by NOVEMBER 15, 1999. ______________________________________________________________________________ IACR Cryptology e-Print Server Announcement ______________________________________________________________________________ Background So far IACR's publishing activities included the Journal of Cryptology and the Crypto/Eurocrypt conference volumes. The journal represents the oldest and most established form of scientific publication; conferences and their proceedings have the advantage of faster publication. For IACR and cryptology, however, the publication delay for a new result can easily be half a year or more. This will soon change with the introduction of the IACR cryptology e-print server. In the recent years, many people have started to publish work on their personal webpages, either as a supplement to the conventional methods or uniquely publishing work in this way. Other societies have also started electronic servers for preprints, the largest of which is the Los Alamos ``XXX e-print archive'' (xxx.lanl.gov), started by physicists. A small preprint server for cryptology exists since 1996 (the ``Theory of Cryptology Library'', started by Oded Goldreich, currently hosted at UCSD). The IACR Cryptology e-Print Server The IACR board of directors has decided at their meeting at Crypto '99 to set up a preprint server for cryptology. It will be called the IACR cryptology e-print server. ``e-print server'' stands for the new features of papers published there: electronically distributed, rapidly published, recent work, immediately accessible. However, an e-print server is different from other scientific forms of publishing because work is placed there by the authors and does undergo almost no refereeing. Work is only superficially checked to fall in the areas of interest. Mihir Bellare at UCSD has kindly volunteered to host the eprint server at UCSD. He and Bennett Yee have been hosting the ``Theory of Cryptology Library'' at UCSD; the current plan is to integrate this library in the new server. We are about to set up the software and it is expected that the server is operational later this year. The URL will be http://eprint.iacr.org. In any case, check out http://www.iacr.org for more information! Christian Cachin ______________________________________________________________________________ Minutes of the BoD Meeting at Eurocrypt '99 ______________________________________________________________________________ Board of Directors Meeting EuroCrypt '99 Prague 2 May 1999 Preface: On 20 March 1999, Journal Editor Feigenbaum brought to the attention of the Board a problem wherein papers accepted for a special issue of the Journal far exceeded the normal page count for a single issue. Following a discussion by e-mail, the Board approved the following proposal submitted by Feigenbaum by a vote of 10 to 2 with 1 abstention. I propose that the Board approve the expenditure of $20,000 for an exceptionally long "special issue" of the Journal of Cryptology. This issue will probably be one of the four issues of volume 13 (2000), but there is a chance that it will be the last issue of volume 12 (1999). It will be roughly the size of three normal issues (perhaps slightly larger). The rest of the issues in volume 13 (or 12) will be normal-sized issues. The subject of the special issue is secure multi-party function evaluation, and the editorial board member in charge of it is Oded Goldreich. The $20,000 covers all production, printing, and mailing costs and will thus have no effect on the price that Springer charges subscribers, including libraries, for J. Cryptology. ________________________________________________________________________ The Board President called the meeting to order at 10:06am. Present were Benaloh, Berson, Biham, Cachin, Clark, Franklin, Hruby, Landrock, Maurer, McCurley, E. Okamoto, Preneel, Upton, and Van Oorschot. Proxies were held for Beaver by McCurley, for Feigenbaum by Upton, for T. Okamoto by Maurer, and for Vandewalle by Preneel. It was noted that there would be no report this meeting from Journal Editor Feigenbaum but a report was promised for the Board meeting in August. ************************************************************************ Minutes of the 23 August 1998 meeting were approved with modifications. Motion by Preneel seconded by Berson carried 9 to 0. ************************************************************************ ________________________________________________________________________ EuroCrypt '99 General Chair Hruby reported on the conference. The conference budget was within expected bounds. The budget anticipated 380 attendees. At that point, 373 had registered. [Final registration was 383.] Data was provided for 375 registrants (sic) among whom 315 were full charge (146 early and 169 late) and 60 were student rate (38 early and 22 late). $23,000 had been advanced by the IACR, of which $10,000 was returned to the IACR, $10,000 was used for Program Committee expenses, and $2,400 was used for booking the concert. Clark asked about totals and was told that the $10,000 returned to the IACR was borrowed at a rate of approximately 30 Czech Koruna per U.S. Dollar and returned to the IACR at a rate of approximately 35 Czech Koruna per U.S. Dollar but that the conference was expected to produce s surplus of approximately $10,000. Clark praised ITC (local arrangements company) for their promptness and general competence at organization. All agreed with applause. The quality of the local organization precluded any need for a visit from the Secretariat and thereby reduced costs. Upton asked whether the student registration count was typical and was told that 10% students was the normal count. McCurley expressed concern about the lack of growth in attendance numbers over recent years. ________________________________________________________________________ A EuroCrypt 2000 status report was given by Preneel. The conference will be held in Bruges, Belgium, 14-18 May 2000. Joos Vandewalle will be the General Chair and Bart Preneel will be the Program Chair. Two sheets of information were distributed on planning and budget. Some information can be obtained at http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/ and at http://www.brugge.be/ and http://www.brugge.be/toerisme/en/meetinge.htm. [Note the last URL is corrected from the information sheet.] The conference sessions will be in a flat lecture room with a 500-person capacity. All hotels will be in the old city within walking distance from the conference site. The city has 1500 hotel rooms that generally have no vacancy in May. 300 three and four star hotel rooms have already been booked. 200 two star hotel and bed & breakfast rooms are in the process of being booked. Advanced payment of first night's hotel will be necessary. A professional conference organizer is now doing the work for $15 per participant and a fixed fee of $3,000 rather than the typical fee of 8% on hotel bookings. There are a variety of hotel booking and payment options for participants. Landrock suggested that individuals handle their own booking. McCurley seconded this but expressed concern that some participants might find no hotels available. Clark suggested that the Secretariat can co-ordinate booking. Upton expressed that the intent was to have central booking. Van Oorschot questioned the effect on the registration forms. Upton suggested offloading work to the secretariat whenever possible. Landrock suggested budgeting for 400 participants. Preneel suggested pre-booking Hotel Montanus for Board members and encouraged all Board members to stay at this hotel. ________________________________________________________________________ AsiaCrypt Steering Committee Chair E. Okamoto presented details on upcoming AsiaCrypt conferences. AsiaCrypt '99 will be in Singapore. It is not sponsored by the IACR. Hotel costs will be approximately $80 per night and registration will be approximately $400. AsiaCrypt 2000 will be held in Kioto Japan, 3-7 Dec 2000. It is sponsored by the IACR, and details will be forthcoming at the Crypto meeting in August. AsiaCrypt 2001 is being recommended for Taiwan together with possible General Chair and Program Chair recommendations. McCurley questioned when final decisions could be made for the General Chair and Program Chair for AsiaCrypt 2001. Consensus was that the current timing should be continued. ________________________________________________________________________ A report on EuroCrypt 2001 proposals was given by Clark. There are no active proposals for EuroCrypt 2001. A planned proposal for Villach, Austria (which was later moved to Vienna because of logistic concerns) was withdrawn two days prior to the board meeting. It was conjectured that the organizers were dissatisfied with the apparent requirement that the venue be changed from Villach to Vienna. Clark discussed plans to solicit bids from potential organizers in Italy, U.K. (Bath), Greece, Sweden, Norway, U.K. (Scotland), Ireland, Netherlands, and Poland. McCurley suggested that the IACR web site resume the (discontinued) solicitation of proposals for EuroCrypt hosts. Clark promised to vigorously pursue the U.K.-Bath option and expressed concerns that the Santa Barbara meeting might be too late to commit to a site. McCurley wondered if a permanent conference coordinator position within the Board would make sense. Berson suggested that European Board members take the lead in this regard. Landrock and Clark agreed to serve as primary Board contacts for proposals. Clark asked for Board consensus that proposals must be able to accommodate 500 participants and that hotel accommodations should be near the conference venue. Berson asked whether Israel is, for these purposes, part of Europe. The consensus was that it is. McCurley urged that the local organizer be a regular member of the crypto "community". McCurley asked whether the Board should appoint the Program Chair for EuroCrypt independent of the selection of the local venue. Maurer urged that the Board should select the Program Chair. Landrock agreed to make a presentation at the Business Meeting to solicit proposals. Van Oorschot suggested that the Board consider Program Chair proposals as part of any bids but that such proposals not be required and that the same be true for AsiaCrypt. [Clarification: We should make it clear that submitters of bids are expected to honor their commitment even if their recommendation for Program Chair is rejected.] It was requested that an announcement be made to all EuroCrypt participants that the Business Meeting would immediately follow the final technical talk on Wednesday. McCurley suggested that discussion of Program Chairs be held at the Santa Barbara Board meeting. ________________________________________________________________________ Preneel initiated a discussion about the relationship between the Fast Software Encryption Workshop (FSE) and the IACR. He asked that the IACR hold copyrights for FSE publications and asked whether FSE might enjoy the same relationship with the IACR that used to be enjoyed by AsiaCrypt. McCurley asked to what extent the IACR should affiliate with other conferences and with how many other conferences. He also asked about the intellectual content responsibility for copyrights owned by the IACR. Berson observed that copyright ownership does not imply endorsement of content. Landrock suggested that the IACR support FSE and that other conferences be considered on a case-by-case basis. McCurley told of meeting with Springer-Verlag regarding the contract for the Journal but that no contract yet exists for IACR proceedings. He said that the IACR owns copyrights for EuroCrypt '99 papers and that Springer-Verlag would have exclusive publication rights for the first three years and non-exclusive rights thereafter. Biham noted that the current copyright agreements do not mention journal publication of related results. McCurley expressed a dislike for "duplicate" publication. Biham suggested that the IACR not enforce its copyright against journals. Benaloh asked whether the IACR should pledge to not enforce copyrights against journals. Cachin urged that no such pledge be included within the copyright form. Biham asked how much a publication must be changed to constitute a new work. Clark expressed a preference to not make any explicit licensing policy and suggested that licensing is the correct alternative to copyright re-assignment. Berson voiced the intent of IACR to be a benevolent copyright holder. ************************************************************************ The proposal that IACR be willing to become the copyright holder for FSE publications was made by Preneel and seconded by Maurer. It carried 15 to 0. ************************************************************************ ________________________________________________________________________ Berson asked that IACR strategic planning include the long-term relationships between the IACR and other conferences. McCurley disapproved of the IACR taking direct responsibilities for other conferences asserting that the purpose of the IACR is to support the scientific activities of its members by maintaining the current conferences, journal, and newsletter. Clark offered that strategic planning is beyond this kind of operational planning and should include long-term goals and directions of the IACR. Berson suggested considering the formation of an organizing committee and seeking better used of technologies such as conference calling to facilitate Board discussions. McCurley expressed the opinion that the Board has dealt effectively with these matters in the past with the current structure. ________________________________________________________________________ At this point the meeting recessed for lunch. ________________________________________________________________________ During and after lunch, various strategic items and topics of interest to individual members were discussed, and new Board members were asked to tell what issues were most important to them. McCurley stated his view of IACR's mission was to make sure that conferences run smoothly and to maintain scientific integrity. He also indicated his strong interest in moving towards electronic publishing. Cachin expressed an interest in having an electronic preprint server for cryptographic publications. McCurley voiced potential problems with copyrights of materials on a preprint server and questioned who would manage it. He also questioned the utility of having yet another place to search for papers. Cachin expressed an opinion that administration would be minimal but acknowledged possible complications with respect to anonymous submissions and copyrights. Maurer asked how we can best support the field. Benaloh asked whether we should accept more papers and noted that the original purpose of anonymity was to avoid favoritism. Clark suggested a triage of papers into three categories: archival papers, recent papers (about one year old), and late-breaking papers, and he suggested that different mechanisms might be best suited for each category. Maurer suggested considering bifurcating crypto into a Theoretical Cryptography conference and applied conferences. Preneel expressed a preference against this kind of specialization. McCurley asked that there be a concrete proposal on a preprint server. Cachin recounted many of the disparate issues that this touches upon. ________________________________________________________________________ A discussion then followed on the topic of anonymous submissions. McCurley noted that in a recent Business meeting, the membership voted to maintain the anonymous submission policy. Preneel said that a recent poll among Program Committee members was nearly evenly divided on the issue. Biham asked what obligations the authors had to not announce their results during the Program Committee review process. After discussion of some extreme examples (such as e-mailing an unsolicited, non-anonymous copy of a submission to all Program Committee members), Preneel suggested a "push versus pull" distinction wherein authors should feel free to post copies of their work on web pages, preprint servers, and the like but should not mail out unsolicited copies to Committee members. Upton urged that we make clear that we don't discourage non-anonymous distribution of submissions. Berson suggested that anonymous submissions may no longer be practical. Clark offered a proposal that we clarify the Program Committee guidelines to specify that we do not discourage distribution and re-visit the issue of anonymous submissions at the next EuroCrypt Board meeting. McCurley expressed concerns about changing the policy back and forth and agreed to put the topic on the agenda for the Santa Barbara Board meeting. ________________________________________________________________________ Biham then raised the issue of creating a server for making technical reports available for fast distribution. McCurley asserted that Springer-Verlag would object to this. Cachin expressed the opinion that such a server would be helpful to the research community. ________________________________________________________________________ Franklin listed important issues to him as maintaining IACR excellence, abolishing anonymous submissions, and observing the experiences of other institutions with regard to electronic publishing and distribution with an eye towards updating IACR policies. Hruby offered that a publications server would facilitate updates to publications. ________________________________________________________________________ Benaloh listed maintenance of IACR excellence as his paramount issue and expressed some concerns over the Board's recent decision-making processes. Clark suggested that the decision-making processes need refinement and that e-mail is often the wrong medium. ________________________________________________________________________ McCurley suggested that the Board form a sub-committee to look more carefully at publishing issues. A sub-committee was formed consisting of McCurley, Biham, Cachin, and (pending her consent) Feigenbaum and charged with delivering a report at the Santa Barbara Board meeting. ________________________________________________________________________ Preneel then raised the issue of awards and honors. He said that he had found no consensus on whether to establish best paper awards and urged that we should establish clear mechanisms for inviting IACR Distinguished Lectures. Maurer asked whether the Board should decide on Distinguished Lecturers. Preneel asserted that clear and regular procedures are paramount. Van Oorschot said that we need to know what procedures, if any, exist. Maurer suggested that Preneel should prepare a formal proposal for the Santa Barbara Board meeting. Benaloh expressed the opinion that only the Board should award Distinguished Lecture awards. This was confirmed as the consensus of the Board, and Maurer agreed to include this conclusion in the Program Chair guidelines. McCurley suggested that we have an IACR Distinguished Lecture at AsiaCrypt 2000 as part of the first IACR sponsored AsiaCrypt. ************************************************************************ A proposal was offered by Preneel and seconded by Berson that candidates for IACR Distinguished Lecturer be nominated and submitted to the IACR president by August 1 of each year and that the Board may make a selection from among those nominated. The proposal carried 15 to 0. ************************************************************************ ________________________________________________________________________ McCurley then raised the issue of IACR elections. Clark suggested that the Secretariat can and should handle the distribution and collection of election ballots. Landrock, Biham, and Franklin agreed to serve on the election committee. Benaloh asked whether is was necessary to vote on the By-Laws again to correct problems introduced by printing errors in last year's amendments. The consensus of the Board was that another vote was unnecessary. Preneel asked that the By-Laws be maintained in ASCII format. ________________________________________________________________________ McCurley then raised the issue of how to best use and oversee the job of IACR Membership Secretary. Clark volunteered to serve as liaison to co-ordinate Board issues with the Membership Secretary. Upton expressed the view that we need closer contact with the Membership Secretary and suggested that the Membership Secretary either be a member of the Board or be directly overseen by a single member of the Board. Clark commented that Y2K compliance was going well but that updated versions of Access software would be necessary to achieve compliance. Benaloh offered to obtain and deliver copies of Access 2000 to Clark, Preneel, and the Membership Secretary. ________________________________________________________________________ Upton then presented a financial report stating that both the EuroCrypt and Crypto conferences returned surpluses of between $10,000 and $20,000 in 1998, that total IACR reserves were now in excess of $200,000, and that 1998 tax filing was underway. Upton stated that he did not anticipate recommending an increase in IACR member dues. McCurley asked that a more detailed report of IACR finances be published in the Newsletter. ________________________________________________________________________ Cachin then reported on the Newsletter. McCurley noted that Cachin had assumed administration of the IACR Web Site. Congratulations were given by all. Cachin reported that the Newsletter has been moved to the Web Site and solicited conference reports for the Newsletter. Clark asked how many paper copies of the Newsletter were being distributed. Cachin answered that anyone who wishes may ask the Membership Secretary to print and mail a copy of the Newsletter. Clark expressed the opinion that the Membership Secretary has provided good service to the IACR and noted the importance of members keeping their addresses current with the Membership Secretary. Hruby stated that 10% of this year's EuroCrypt announcements were returned by the postal service as undeliverable. McCurley offered thanks to Cachin for his efforts. Applause was given by all. McCurley offered thanks to Upton for his efforts. Applause was given by all. ________________________________________________________________________ Since Beaver was absent, no report on Crypto '99 was presented. Cachin noted that no Call For Participation had yet been distributed for Crypto '99. [Beaver subsequently said that he was following the usual schedule by not sending out registration materials too early.] ________________________________________________________________________ Franklin reported that Crypto 2000 planning was proceeding uneventfully. ________________________________________________________________________ McCurley suggested that there be an integrated discussion at the Santa Barbara Board meeting to decide on Program Chair lists and other issues for EuroCrypt, Crypto, and AsiaCrypt in 2001. ________________________________________________________________________ McCurley then gave an update on the status of the CD-ROM of past Crypto and EuroCrypt proceedings. He said that after much work, the CD-ROM was complete and had been delivered to Springer-Verlag for reproduction and distribution and that copies would be available for sale during this conference. He said that Springer-Verlag had agreed to send out two copies to everyone who had ordered one in recompense for the production delays. Clark noted that the address labels had become out of date and urged that updates be sent to iacrmem@iacr.org by May 12 to ensure that the CD-ROMs are sent to current addresses. Clark also noted the outstanding, "super-human" work done by McCurley on the CD-ROM. Applause was given by all. Clark also asked that Springer-Verlag be urged to make the CD-ROM available to IACR members at the original IACR discounted price. In addition, Clark noted that CD-ROM sales through Amazon.com obtained via an IACR link could be eligible for a 5-15% kickback to IACR. He also suggested that one of the copies available for sale be held for a quality control check. [Note: It was subsequently discovered that there were problems with the CD-ROMs on some platforms, and correction before distribution was anticipated. Also Clark obtained a commitment from Springer-Verlag to offer the CD-ROMs for sale at a discounted price.] ************************************************************************ A proposal was offered by Van Oorschot and seconded by Upton that decisions made by e-mail should be included in the following Board meeting minutes. The proposal carried 15 to 0. ************************************************************************ ________________________________________________________________________ A brief discussion then followed about items to be included in the Business meeting. Berson asked that attendees be reminded that they are, unless they've specifically asked not to be, IACR members. McCurley stated that he would remind members of the general IACR functions, announce upcoming conferences and meetings, update members on the CD-ROM and the May 12 deadline for updating addresses, remind members of the Newsletter submission deadline of May 31, report that both IACR sponsored conferences produced surpluses during the prior year, and tell new members how they could receive membership for the 1999 calendar year. ________________________________________________________________________ Action items noted by McCurley included EuroCrypt 2001 site selection, upcoming IACR elections, and distribution of the CD-ROM. ________________________________________________________________________ McCurley then moved to adjourn. The motion was seconded by Clark and carried unanimously at 4:49pm. Respectfully submitted Josh Benaloh IACR Secretary ______________________________________________________________________________ Announcements ______________________________________________________________________________ SIGINT in Europe During the Cold War =========================================================================== More and more students of the Cold War begin to realize that the intelligence communities played an important role during the Cold War. In recent years in particular the importance of Signals Intelligence (SIGINT) has been stressed and especially the capabilities and possibilities of reading and deciphering diplomatic, military, commercial and other Communications of other nations. This growing awareness of the importance of intelligence applies not only to the activities of the big services but also to those of the smaller nations like for example the Netherlands. For this exact reason a couple of years ago the Netherlands Intelligence Studies Association (NISA) was established in which academics and (former and still active) members of the Netherlands intelligence community work together in order to promote research into the history of Dutch intelligence communities. This growing interest had led in Holland to publications dealing with the history of the Dutch internal security service (1995), the Dutch Navy Intelligence (1997) and the Netherlands foreign intelligence service (November 1998). As honorary secretary of the NISA it is my pleasure to announce that the NISA will host an international conference dealing with THE IMPORTANCE OF SIGINT IN WESTERN EUROPE IN THE COLD WAR This conference with a particular emphasis on Sigint and the Northwestern European nations will take place on Saturday November 27 in Amsterdam. The line up of the program is as follows: SPEAKERS: 09.45: Opening of the Conference and Welcome to the speakers and participants 10.00: Matthew Aid (United States, historian) Introduction on the importance of SIGINT in the Cold War 10.45: coffee 11.00: Richard Aldrich (United Kingdom, University of Nottingham) GCHQ and Sigint in the Cold War 11.45: Erich Schmidt-Eenboom (Germany, Forschungsinstitut fur Friendenspolitik) The BND, German Military Forces and Sigint in the Cold War 12.30: lunch 13.30: Alf Jacobsen (Norway, NRK) Scandinavia, Sigint and the Cold War 14.15: Cees Wiebes (Netherlands, NISA) The history of the WKC (Dutch NSA/GCHQ) 15.00: Tea 15.30: Wies Platje (Netherlands, NISA) Dutch Sigint and the conflict with Indonesia, 1950 - 62 16.15: Round Table discussion The importance of Sigint during the Cold War 17.00: Closing Remarks + Reception Since the number of seats is strictly limited to 100, you are requested to submit your registration as soon as possible. Places will be attributed on a first registered-first served basis. The conference rate is US $ 80 including lunch and drinks at the reception. Please register as quickly as possible by sending an E-mail or letter to the honorary secretary of the NISA, Dr. Cees Wiebes, at the following address: Dr. Cees Wiebes Honorary secretary NISA P.O. Box 18 210 1001 ZC Amsterdam The Netherlands E-mail: WIEBES@PSCW.UVA.NL DIMACS Workshop on the Management of Digital IP =========================================================================== DIMACS Workshop on the Management of Digital IP April 17-18, 2000, Rutgers, New Jersey, USA CALL FOR PARTICIPATION Critical to the development of e-commerce is the management of digital intellectual property (IP). Technology has challenged the status quo of IP management in many ways. Widespread use of personal computers and Internet communication creates vast opportunities for producers, distributors, and consumers of digital works of all forms, but it also threatens to render copying and modification of these works completely uncontrollable. DIMACS will sponsor a two-day series of technical talks and "position statements" on the design, development, and deployment of IP-management technology that strikes the right balance between the need to control copying and modification and the desire to foster innovative uses of digital works that have been enabled by computing and communication advances. Speakers are encouraged to address all technical, legal, and business aspects of digital IP management. Companies offering relevant products and services are encouraged to participate and to submit abstracts or papers outlining their approach. Topics appropriate for this workshop include, but are not limited to: * Intellectual property protection. * Anti piracy techniques. * Legal issues in the protection of digital rights. * New business models for managing digital rights. * Passive content protection, e.g. watermarking, tracing traitors. * Active content protection, e.g. software tamper resistance. * Hardware solutions to content protection. WORKSHOP URL: http://crypto.stanford.edu/DIMACS/ INSTRUCTIONS FOR AUTHORS Authors are strongly encouraged to send their submission electronically. Authors unable to submit electronically are invited to send a cover letter and 4 copies of a submission (double-sided copies preferred) to the postal address below. Submissions must be received on or before January 17, 2000 (or postmarked by January 5, 2000, and sent via airmail or courier). The cover letter should contain the submission's title and the names and affiliations of the authors and should identify the contact author including e-mail and postal addresses. Authors are invited to submit a one-page abstract or a full-length paper or position statement. (1) Abstract submissions should contain a title, list of authors, and an abstract describing the proposed talk. The abstract should indicate whether the authors intend to submit a full-length paper in case the abstract is accepted. (2) Full-length submissions should begin with a title, list of authors, and a short abstract. The introduction should summarize the contributions of the work at a level appropriate for a non-specialist reader. The submission should be at most 12 pages excluding the bibliography and clearly marked appendices, using at least 11-point font and reasonable margins. The organizers do not guarantee that they will read appendices; so submissions should be intelligible without them. Notification of acceptance or rejection will be sent to authors by February 14, 2000. CONFERENCE PROCEEDINGS We will decide whether to publish a proceedings for the workshop based on the number of full-length submissions. If the number and quality of full-length submissions are sufficient, proceedings will be published by the American Mathematical Society as a volume in the DIMACS series. CONFIRMED SPEAKERS: (1) Paul Kocher, Cryptography Research. (2) Stuart Haber, InterTrust. (3) Narayanan Shivakumar, Univ. Washington (4) Jon Callas, Kroll-O'Gara DATES: SUBMISSION: January 17, 2000 ACCEPTANCE: February 14, 2000 Pre-PROCEEDINGS VERSION: March 24, 2000 ORGANIZING COMMITTEE: Dan Boneh, Stanford University, USA Joan Feigenbaum, AT&T Labs -- Research Ramarathnam Venkatesan, Microsoft Research ADDRESS FOR ELECTRONIC SUBMISSIONS: dabo@cs.stanford.edu ADDRESS FOR NON-ELECTRONIC SUBMISSIONS: Dan Boneh, DIMACS workshop, Gates 475, Stanford, CA, 94304-9045 U.S.A Phone: (1) 650-725-3897 Fax: (1) 650-725-4671 E-mail: dabo@cs.stanford.edu STIPENDS: A limited number of stipends are available to those unable to obtain funding to attend the workshop. Students giving talks at the workshop are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to Joan Feigenbaum at jf@research.att.com or 973 360-8442. New Reports in the Theory of Cryptography Library =========================================================================== The library is currently located at http://philby.ucsd.edu/cryptolib/. LIST OF NEW PAPERS (June 15 -- October 1st, 1999) 99-14: I. Damgard, Concurrent Zero-Knowledge is Easy in Practice , June 1999. Revised July 1999. 99-15: O. Goldreich, S. Goldwasser and S. Micali, Interleaved Zero-Knowledge in the Public-Key Model , June 1999. Revised July 1999. 99-16: M. Bellare and S. Miner, A forward-secure digital signature scheme, July 1999. 99-17: V. Shoup, A composition theorem for universal one-way hash functions, July 1999. 99-18: M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization, July 1999. 99-19: J. Hastad and M. Naslund, Security of all RSA and Discrete Log Bits, August 1999. 99-20: S. Micali and L. Reyzin, Improving the Exact Security of Digital Signature Schemes, August 1999. 99-21: M. Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, September 1999. ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology. We are looking for reviewers! Elliptic Curves in Cryptography Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart Hewlett-Packard Laboratories Palo Alto, California and Bristol, U.K. Cambridge University Press, Cambridge, 1999 ISBN: 0521653746 Description In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-based signatures will become all pervasive. This book summarizes knowledge built up within Hewlett-Packard over a number of years, and explains the mathematics behind practical implementations of elliptic curve systems. Due to the advanced nature of the mathematics there is a high barrier to entry for individuals and companies to this technology. Hence this book will be invaluable not only to mathematicians wanting to see how pure mathematics can be applied but also to engineers and computer scientists wishing (or needing) to actually implement such systems. For more information, see http://www.hpl.hp.com/research/itc/csl/vcd/infotheory/ellipbook.htm _________________________________________________________________ Elliptic Curves and Their Applications to Cryptography: An Introduction Andreas Enge Institut fuer Mathematik, Universitaet Augsburg, Germany Kluwer Academic Publishers, Boston Hardbound, ISBN 0-7923-8589-6 August 1999, 184 pp. NLG 235.00 / USD 115.00 / GBP 74.75 Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. "Elliptic Curves and Their Applications to Cryptography: An Introduction" provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying these cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. "Elliptic Curves and Their Applications: An Introduction" has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics. For more information, see http://www.wkap.nl/book.htm/0-7923-8589-6. _________________________________________________________________ Crypto-related Books from Springer Springer Verlag maintains a list of books in cryptology at [3]http://www.springer.de/comp/lncs/crypto.html. As Springer is not unknown to IACR members, it may be worthwile to check the site occasionally. _________________________________________________________________ Please send your new book announcements to the newsletter editor at newsletter at iacr.org ______________________________________________________________________________ Open Position ______________________________________________________________________________ A major consumer electronics research laboratory in New York State asks that we seek for regular employment a person with formal training in cryptography, preferably with some course work in cryptanalysis. Current work focuses on conditional access and copy protection for network digital interfaces and for audio. Requirement - PhD, or Masters with several years relavent experience. Newly graduating doctorates will be considered. A second opening exists for someone with the same general background who may be completing a masters degree. Any work experience will be helpful. U.S. residence is not a requirement for either position. Interested persons may contact Sid Lasky by email at lasky2@airmail.net, telephone 214-826-8450, or fax 214-823-1628. ______________________________________________________________________________ IACR Calender of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please send email to webmaster(at)iacr.org . 1999 * [1]FOCS '99, October 17-19, 1999, New York City, NY. * [2]3rd Workshop on Elliptic Curve Cryptography (ECC '99), November 1-3, 1999, University of Waterloo, Waterloo, Canada. * [3]6th ACM Conference on Computer and Communications Security (ACM CCS '99), November 1-4, 1999, Singapore. * [4]Midwest Arithmetical Geometry in Cryptography (MAGC), November 5-7, 1999, University of Illinois at Urbana-Champaign, USA. * [5]Information Security Workshop (ISW '99), November 6-7, 1999, Kuala Lumpur, Malaysia. * [6]ICICS '99, 2nd International Conference on Information and Communication Security, November 9-11, 1999, Sydney, Australia. * [7]Asiacrypt '99, November 15-18, 1999, Singapore. * [8]CQRE [Secure], November 30-December 2, 1999, Duesseldorf, Germany. * [9]ICISC'99, The 2nd International Conference on Information Security and Cryptology, December 9-10, 1999, Korea University , Seoul, Korea * [10]Seventh IMA International Conference on Cryptography and Coding, December 20-22, 1999, Royal Agricultural College, Cirencester, UK. 2000 * [11]RSA Conference 2000, January 16-20, San Jose Convention Center, San Jose, USA. * [12]PKC2000, International Workshop on Practice and Theory in Public Key Cryptography, January 18-20, 2000, Melbourne, Australia * [13]Financial Cryptography '00, February 21-24, 2000, Anguilla, BWI. * [14]Network and Distributed Systems Security Symposium (NDSS 2000), February 2-4, 2000, San Diego, California, USA. * [15]RSA Conference 2000 Europe, April 10-13, Hilton Munchen Park, Munich, Germany. * [16]Fast Software Encryption Workshop (FSE2000), April 10-12, 2000, New York, USA. * [17]Third AES Candidate Conference (AES3), April 13-14, 2000, New York, USA. * [18]DIMACS Workshop on the Management of Digital IP, April 17-18, 2000, Rutgers, New Jersey, USA. * [19]Eurocrypt 2000, May 14-18, Bruges/Brugge, Belgium. * [20]IEEE Symposium on Security and Privacy, May 14-17, 2000, Oakland, California, USA. * [21]Fifth Australasian Conference on Information Security and Privacy, July 10-12, 2000, Brisbane, Australia * [22]PODC 2000, 19th Symposium on Principles of Distributed Computing, July 16-19, 2000, Portland, Oregon, USA. * [23]9th USENIX Security Symposium, August 14-17, 2000, Denver, CO, USA. * Crypto 2000, August 20-24, 2000, Santa Barbara, California, USA. * [24]Asiacrypt 2000, December 3-7, Kyoto, Japan. 2001 * Eurocrypt 2001, (tentatively: May 6-10), 2001, Innsbruck, Austria. * Crypto 2001, (tentatively: August 19-23), 2001, Santa Barbara, California, USA. References 1. http://www.cs.washington.edu/FOCS99/ 2. http://www.cacr.math.uwaterloo.ca/conferences/1999/ecc99/ ecc99-announce.html 3. http://www.isi.edu/ccs99/ 4. http://www.math.uiuc.edu/~boston/magc.html 5. http://www.musm.edu.my/BusIT/isw99/ 6. http://www.cit.nepean.uws.edu.au/icics99/ 7. http://www.comp.nus.edu.sg/~asia99 8. http://www.secunet.de/forum/cqre.html 9. http://onyx.yonsei.ac.kr/icisc99/ 10. http://www.ima.org.uk/mathematics/conferences.htm 11. http://www.rsasecurity.com/rsa2000 12. http://www.pscit.monash.edu.au/pkc2k/ 13. http://fc00.ai/ 14. http://www.isoc.org/ndss2000/ 15. http://www.rsasecurity.com/rsa2000/europe 16. http://www.counterpane.com/fse.html 17. http://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm 18. http://www.iacr.org/events/pages/dimacs.html 19. http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/ 20. http://www.bell-labs.com/user/reiter/sp2000/ 21. http://www.isrc.qut.edu.au/acisp2K/ 22. http://www.podc.org/podc2000/ 23. http://www.usenix.org/events/sec00/ 24. http://www.ee.kagu.sut.ac.jp/www/staff/hangai/ac2000/ ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (1999) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. Officers Kevin S. McCurley Andrew J. Clark President Vice President 6721 Tannahill Drive P.O. Box 743 San Jose, CA 95120 Brighton USA East Sussex Phone: (408) 927-1838 BN1 5HS Email: [president(at)iacr.org] United Kingdom Phone: +44 1273 270752 Fax: +44 1273 276558 Email: [vicepresident(at)iacr.org] Josh Benaloh Jimmy Upton Secretary Treasurer Microsoft Research Certicom One Microsoft Way 25801 Industrial Blvd Redmond, WA 98052 Hayward, CA 94545 USA USA Phone: (425) 703-3871 Phone: (510)780-5440 Fax: (425) 936-7329 Fax: (510)780-5401 Email: [secretary(at)iacr.org] Email: [treasurer(at)iacr.org] Directors Don Beaver Thomas Berson Crypto '99 General Chair Anagram Labs Certco Inc. P.O. Box 791 55 Broad Street, 22nd Floor Palo Alto CA, 94301 New York, NY 10004 USA USA Phone: (415) 324-0100 Phone: (212) 709-8900 Email: [berson(at)anagram.com] Fax: (212) 709-6754 Email: crypto99(at)iacr.org Eli Biham Gilles Brassard Computer Science Department Departement IRO Technion Universite de Montreal Haifa 32000 C.P. 6128, succursale centre-ville Israel Montreal, Quebec H3C 3J7 Email: [biham(at)cs.technion.ac.il] Canada Voice: +972-4-8294308 Email: [brassard(at)iro.umontreal.ca] Fax: +972-4-8221128 Christian Cachin Whitfield Diffie IACR Newsletter Editor Sun Microsystems, MPK15-214 IBM Zurich Research Laboratory 901 San Antonio Road Saumerstrasse 4 Palo Alto, California 94303 CH-8803 Ruschlikon phone: +1 650-786-6359 Switzerland fax: +1 650-786-6445 Email: [cachin(at)acm.org] Email: Phone: +41-1-724-8989 [whitfield.diffie(at)eng.sun.com] Fax: +41-1-724-8953 Joan Feigenbaum Matt Franklin Editor-in-Chief, Journal of Cryptology Crypto '2000 General Chair AT&T Labs Research Xerox PARC Room C203 3333 Coyote Hill Road 180 Park Avenue Palo Alto, CA 94304 Florham Park, NJ 07932-0971 (W) 650-812-4228 USA (fax) 650-812-4471 Email: [jf(at)research.att.com] Email: crypto2000(at)iacr.org [jofc(at)iacr.org] Phone: +1 973 360-8442 Fax: +1 973 360-8178 Jaroslav Hruby Peter Landrock Eurocrypt '99 General Chair Mathematics Institute GCUCMP Praha Aarhus University PO Box 21/OST Ny Munkegade 170 34 Prague 7 8000 Aarhus C Czech Republic Denmark Email: [eurocrypt99(at)iacr.org] Email: Phone: 420 2 6143 5524 [landrock(at)cryptomathic.aau.dk] Fax: 420 2 324450 Tsutomu Matsumoto Ueli Maurer Div. of Electrical and Computer Eng. Department of Computer Science Yokohama National University ETH Zurich 156 Tokiwadai, Hodogaya-ku CH-8092 Zurich Yokohama, 240, Japan Switzerland Tel: +81-45-335-1451 (Ext. 2898, 2904) Email: [maurer(at)inf.ethz.ch] Fax: +81-45-338-1157 Email: tsutomu(at)mlab.dnj.ynu.ac.jp Tel-1: +41-1-632 7420 Tel-2: +41-1-632 7371 Fax : ++41-1-632 1172 Bart Preneel Tatsuaki Okamoto Department of Electrical Engineering NTT Labs Katholieke Universiteit Leuven 1-1 Kikarinooka Kardinaal Mercierlaan 94 Yokosuka-Shi 239 B-3001 Heverlee Japan Belgium USA Email: Phone: 81-468-59-2511 [bart.preneel(at)esat.kuleuven.ac.be] Fax: 91-468-59-3858 Phone: +32 16 32 11 48 Email: [okamoto(at)sucaba.isl.ntt.jp] Fax: +32 16 32 19 86 Paul C. Van Oorschot Joos Vandewalle Entrust Technologies Eurocrypt '2000 General Chair 750 Heron Road, Suite E08 Electrical Engineering Department Ottawa, Ontario (ESAT) K1V 1A7 Katholieke Universiteit Leuven Canada Kard. Mercierlaan 94 Email: [paulv(at)entrust.com] B-3001 Heverlee Belgium Fax: 32/16/32.19.70 Phone: 32/16/32.10.52 email : Joos.Vandewalle(at)esat.kuleuven.ac.be ______________________________________________________________________________ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For calls for papers, please submit a one page ASCII version. Send your contributions to newsletter(at)iacr.org Deadline for submissions to the next newsletter issue is January 31, 2000. However, many items will be posted on the website as soon as possible. The IACR Newsletter is copyright (c) 1999, International Association for Cryptologic Research. ______________________________________________________________________________ End of IACR Newsletter, Vol. 16, no. 3, Fall 1999. ______________________________________________________________________________