Speakers are marked with a "*". Crypto '97 Rump Session August 19, 1997 7:00 Stuart Haber Introduction 7:03 Serge Vaudenay On the security of knapsack-based cryptosystems 7:10 Claus-Peter Schnorr, * Marc Fischlin, Henrik Koy, Alexander May Lattice attacks on GGH-cryptosystem 7:17 Phong Nguyen, Victor Shoup, * Jacques Stern Lattice cryptosystems: do they exist? 7:24 Ian Goldberg & Chris Hall Eliminating decryption errors in the Ajtai-Dwork cryptosystem: 1 day later 7:30 * Ross Anderson, Fabien Petitcoles The marking assumption is wrong 7:36 Robert D. Silverman The o(1) term in the complexity function for the number field sieve 7:41 Peter Lenoir Timing attack on classical RSA using Montgomery multiplications 7:46 BREAK 8:00 Adi Shamir How to photo-finish a cryptosystem 8:05 Miles Smid (NIST, USA) It's time to begin developing an Advanced Encryption Standard (AES) 8:12 * Mihir Bellare, Anand Desai, Eron Jokipii, Phillip Rogaway Analysis of the DES modes of operation 8:18 Amit Khetan, * R. Venkatesan On defending DES against plaintext-ciphertext attacks & exhaustive search engines 8:23 Shiho Moriai Security of modes of operation against higher-order differential attack 8:28 Shiho Moriai Higher-order differential attack of a CAST cipher with 5 rounds 8:32 * S. Raj Rajagopalan, Bill Aiello VRA Lite: fast, strong, and exportable file encryption 8:37 Matt Blaze A better DES challenge 8:42 BREAK 9:00 John Gilmore Recent progress on Constitutional attacks on export-control protocols 9:06 Charanjit S. Jutla On finding small solutions of modular multivariate polynomial equations 9:10 Mihir Bellare, * Juan Garay, Tal Rabin Fast batch verification for modular exponentiation and digital signatures 9:15 Neal Koblitz A very easy way to generate curves over prime fields for hyperelliptic cryptosystems 9:20 Jilyana Cazaran Classes of polynomials which are closed under composition & represent injective mappings over a finite commutative ring, & their application to public-key cryptosystems 9:24 Daniel Lieman The NTRU public-key cryptosystem: a status update & a response to various lattice attacks 9:30 Ivan Damgaard Summer school in cryptography & data security (Denmark, July '98) 9:31 Ivan Damgaard Zero-knowledge proofs for finite-field arithmetic, or Can zero-knowledge be for free? 9:36 Peter Landrock How to possibly blackmail anyone using RSA with exponent 3 9:40 * Matt Blaze, Martin Strauss Proxy cryptography 9:44 BREAK 10:00 * Peter Pearson, Jimmy Upton, Bryan Olson Some simple observations on the SHA key schedule. 10:05 Adam Shostack Low-hanging fruit: A replay attack on TIS's encrypting authentication service 10:09 * David Grawrock, Eli Biham, Andy Clark, Jennifer Seaberry, et al. Strawberry crypto 10:15 Hoi-Kwong Lo Insecurity of quantum secure computations 10:19 * James Kubik, Aamir Akram, Sviatoslav Sheremetyev, David Patterson, Henry Stark Practical free-space quantum cryptography systems 10:23 Jean-Jacques Quisquater YAPISO9796: the TCR episode (yet another proposal for ISO standard 9796) 10:27 Hugo Krawczyk, * Tal Rabin Chameleon hashing and signatures 10:31 * Juan Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin Secure distributed storage and retrieval 10:35 * Shai Halevi, Hugo Krawczyk Public passwords & their use for strong password authentication 10:39 * Moti Yung, Adam Young Software escrow encryption, or Hunting the pink live gizmo 10:43 Yacov Yacobi On the continuum between on-line & off-line e-cash systems 10:47 GOOD NIGHT!