Note: Each presentation material is provided by individual author for
research
purpose only. Note that every material is copyrighted by the author.
Rump Session
T1. How to Hack the Microsoft Research Conference Management Tool (MSRCMT)
T2. Time memory tradeoff attacks on streamciphers, revisited
T3. Improved Key Management for Fiat-Tassa Dynamic Traitor Tracing
Scheme Tzong-Chen Wu,
Yen-Ching Lin, & Ming-Chin Lee
A1. Information Theory Workshop 2005 (ITW 05 Japan)
A2. An update on the standards for efficient cryptography group(SECG)
A3. A Call for Stream Ciphers by ECRYPT
A4. Announcements regarding Crypto 05
A5. Another announcement
A6. International Conference on Cryptology in Malaysia (Mycrypt 2005)
Ed Dawson, Serge Vaudenay & Raphael C.-W. Phan
A7. Call for Participation to PKC 2005 Jean Monnerat
INTERMISSION
T4. Improved Related-Key Attacks on DESX and DESX+
Raphael C.-W. Phan
& Adi Shamir
T5. Certified E-mail for Contracts of Changeable Values Kenji Imamoto & Kouichi SAKURAI
T6. Specification of a quantum computer for factoring Noboru Kunihiro
T7. Security Analysis of a 2/3-rate Double Length Compression Fcn in
Black-Box Model Wonil Lee, Mridul
Nandi, Kouichi Sakurai & Sangjin Lee
T8. Secure Distributed Human Computation Craig Gentry, Zulfikar Ramzan & Stuart Stubblebine
T9. A Surprise Talk