CRYPTO 2000

August 20--24, 2000
Santa Barbara, California, USA

Rump Session Program


This is a list of talks given at the rump session. We will include here any information regarding the paper provided by the authors, such as abstract, pointers or preprints. Authors are encouraged to send us the information. The papers are ordered as per the program.


Title: AES update
Presenter: Morris Dworkin
Contact Email: dworkin@nist.gov


Title: Assasinating SASAS
Authors: Alex Biryukov and Adi Shamir
Contact Email: shamir@wisdom.weizmann.ac.il
Abstract


Title: A simple algebraic representation of Rijndael
Authors: Niels Ferguson, Richard Schroeppel and Doug Whitting
Contact Email: niels@ferguson.net


Title: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms
Authors: Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
Contact Email: shiho@sucaba.isl.ntt.co.jp
Note: This appears in SAC 2000
Abstract


Title: Improved impossible differentials on Twofish
Authors: Eli Biham and Vladimir Furman
Contact Email: vfurman@cs.technion.ac.il


Title: The left super-summit-set attack on Ko-Lee-Cheon-Han-Kang-Park key agreement protocol in B_45
Authors: Jim Hughes
Contact Email: jim@network.com


Title: ECSTR (XTR): Elliptic curve singular trace representation
Authors: Alfred Menezes and Scott Vanstone
Contact Email: vanstone@certicom.com


Title: Search on Encrypted Data
Authors: Dawn Song, David Wagner and Adrian Perrig
Contact Email: dawnsong@cs.berkeley.edu
Note: This appears in 2000 IEEE Symposium on Security and Privacy
Abstract


Title: Uncheatable Distributed Computations
Authors: Philippe Golle
Contact Email: pgolle@CS.Stanford.EDU
Abstract


Title: Session-Key Generation with Human Passwords Only
Authors: Oded Goldreich and Yehuda Lindell
Contact Email: lindell@wisdom.weizmann.ac.il
Abstract


Title: Concurrent oblivious transfer
Authors: Juan Garay and Phil MacKenzie
Contact Email: garay@research.bell-labs.com, philmac@research.bell-labs.com
Note: This appears in FOCS 2000
Abstract


Title: Zaps and Their Applications
Authors: Cynthia Dwork and Moni Naor
Contact Email: dwork@pa.dec.com
Note: This appears in FOCS 2000
Abstract


Title: Transitive signature schemes
Authors: Silvio Micali and Ron Rivest
Contact Email: rivest@theory.lcs.mit.edu


Title: Encryption Modes with Almost Free Message Integrity
Authors: Charanjit S. Jutla
Contact Email: csjutla@watson.ibm.com
Abstract


Title: A chosen-ciphertext secure encryption scheme tightly as secure as factoring
Authors: Eiichiro Fujisaki
Contact Email: fujisaki@sucaba.isl.ntt.co.jp


Title: An NTRU based digital signature scheme
Authors: Joe Silverman and Jeff Hoffstein
Contact Email: Jeffrey_Hoffstein@postoffice.brown.edu
Abstract


Title: Elliptic Curves: Twice as Fast!
Authors: Rich Schroeppel
Contact Email: rcs@cs.arizona.edu
Abstract


Title: Factoring polynomials over the rationals quickly and using lattice-basis reduction
Authors: Arjen Lenstra for Mark van Hoeij
Contact Email: arjen.lenstra@citicorp.com


Title: The Min-Rank problem
Authors: Nicolas Courtois
Contact Email: courtois@minrank.org


Title: Lower bounds on the efficiency of generic cryptographic constructions
Authors: Rosario Gennaro and Luca Trevisan
Contact Email: rosario@watson.ibm.com
Note: This appears in FOCS 2000
Abstract


Title: Oblivious cast and multiparty computation
Authors: Matthias Fitzi, Juan Garay, Ueli Maurer and Rafail Ostrovsky
Contact Email: garay@research.bell-labs.com
Abstract


Title: A Statistical Decoding Algorithm for General Linear Codes
Authors: A. Al Jabri
Contact Email: aljabri@ksu.edu.sa
Abstract


Title: Inherently Large Traceability of Broadcast Encryption Scheme
Authors: Kaoru Kurosawa, T. Yoshida and Yvo Desmedt
Contact Email: kurosawa@crypt.ss.titech.ac.jp
Abstract.ps


Title: TWEEDLE, a sound variation of TWINKLE
Authors: Jean-Jacques Quisquater
Contact Email: jjq@dice.ucl.ac.be


Title: Sharing block ciphers
Authors: Ernie Brickell, Giovanni Di Crescenzo and Yair Frankel
Contact Email: giovanni@research.telcordia.com


Title: A new application of EPR for quantum key distribution
Authors: Jaroslav Hruby
Contact Email: hruby@gcucmp.cz


Title: Correlation Cryptanalysis of SSC2
Authors: Greg Rose and Phil Hawkes
Contact Email: ggr@qualcomm.com
Abstract


Title: Simple electro-magnetic analysis for smartcards: New results
Authors: Jean-Jacques Quisquater and David Samyde
Contact Email: jjq@dice.ucl.ac.be


Title: Root Finding Interpolation Attack
Authors: Kaoru Kurosawa, Tetsu Iwata and Viet Duong Quang
Contact Emails: kurosawa@crypt.ss.titech.ac.jp, tez@crypt.ss.titech.ac.jp , viet@crypt.ss.titech.ac.jp
Note: This appears in SAC 2000.
Abstract.ps


Title: Timing attacks: state of the art
Authors: Werner Schindler, Francois Koeune and Jean-Jacques Quisquater
Contact Email: werner.schindler@bsi.bund.de


Title: A Non Euclidean Ring Data Scrambler (NERDS) - a public key cryptosystem
Authors: Emiliano Kargieman, Ariel Pacetti and Ariel Waissbein
Contact Email: wata@core-sdi.com
Abstract


Title: Timing Analysis in Exponentiation for RSA
Authors: B. Canvel and C.T.J. Dodson
Contact Email: dodson@umist.ac.uk
Abstract