______________________________________________________________________________
______________________________________________________________________________
   

   IACR Newsletter

   Vol. 16, No. 1, Winter 1999.

   Published by the International Association for Cryptologic Research
   Christian Cachin, Editor

______________________________________________________________________________
______________________________________________________________________________

   http://www.iacr.org/newsletter/

______________________________________________________________________________
   
   Contents
______________________________________________________________________________

     * Editorial
     * Electronic Proceedings CD-ROM
     * IACR 1998 Election Results
     * Eurocrypt '99 in Prague
     * Martin Hellman to hold 1999 IACR Distinguished Lecture
     * Slides from the 1998 IACR Distinguished Lecture by Michael Rabin
     * Papers to appear in the Journal of Cryptology
     * New Books
     * Calendar of Events
     * Conference Announcements and Calls for Papers
     * IACR Contact Information

______________________________________________________________________________
   
   Editorial
______________________________________________________________________________

   Welcome to the second electronic issue of the IACR Newsletter!

   With the the AES process going in its second round, Eurocrypt '99 in
   Prague, and many other interesting events coming up, 1999 promises to
   be an exciting year for cryptology and for IACR. We see also new
   workshops in the field, such as CHES (Workshop on Cryptographic
   Hardware and Embedded Systems), and continuation of established
   conferences. See the Calendar section or www.iacr.org/events!
   
   It looks as if the electronic proceedings CD-ROM may finally be ready!
   The CD-ROM contains PDF files for all papers published in IACR
   proceedings from 1981-1997. It will also be available separately from
   Springer in the LNCS series. I've seen the collection and it's indeed
   a very valuable tool to have around.
   
   If you have not received the IACR Newsletter by Email and would like
   to recive it in the future, then check out your Email address in the
   IACR member list that has been mailed in February 1999.
   
   IACR can only provide you with accurate information if you contribute
   your input. Please send in announcements of workshops, conferences,
   calls for papers, or any other item of interest to IACR members. The
   address for all submissions to the Newsletter and Calendar is
   
     newsletter@iacr.org
     
   The next issue of the IACR Newsletter is scheduled for publication in
   July. However, announcements will be posted on the IACR Website as
   soon as possible.
   
   Christian Cachin
   IACR Newsletter Editor

______________________________________________________________________________

   Electronic Proceedings CD-ROM
______________________________________________________________________________

   It was announced last year that Spring-Verlag will be selling a CD-ROM
   containing the electronic proceedings of all IACR conferences from
   1981-1987. For a variety of reasons (including my heavy workload,
   unfortunately), the production of this volume has taken much longer
   than expected. I recently sent a copy of what I consider to be the
   final version of this CD-ROM off to Springer-Verlag for reproduction,
   and we are hoping to get this out before Eurocrypt 1999.
   
   The CD is designed to be viewed with a Java-capable web-browser, and
   contains the following elements:
     * PDF files for all 1,275 papers from Crypto 81-87, Eurocrypt 82,
       and Eurocrypt 84-97.
     * A complete author index in HTML
     * A keyword index in HTML
     * A list of all program committees in HTML
     * A BibTeX file of all papers
     * A full-text search capability, using a Java Applet
       
   The PDF files were produced from scanned images of the pages. This
   results in large files, but the reproduction is as faithful as
   possible to the original printed paper and can be printed at
   reasonable resolution. The search capability was built using OCR pass
   on the images, so that the text index is only approximate. In order to
   overcome this limitation, the Java applet allows the user to control
   how many errors they are willing to tolerate in their searches.
   
   I sincerely apologize for the delay in getting this out. I can only
   hope that the finished product will be worth the wait.
   
   Kevin McCurley

______________________________________________________________________________

   IACR 1998 Election Results
______________________________________________________________________________
                                      
ELECTION OF OFFICERS

   The four IACR officers were elected for the three-year term ending 31
   December 2001.
   
   President Kevin McCurley
   Vice President Andrew J. Clark
   Secretary Josh Benaloh
   Treasurer Jimmy Upton
   
ELECTION OF DIRECTORS

   Ten candidates stood for the three open positions of Director. The
   three candidates with the highest number of votes were elected. These
   new directors are:
   
   Eli Biham
   Whitfield Diffie
   Peter Landrock
   
   Their terms will expire on 31 December 2001.
   
REVISION OF BYLAWS

   On the question of approval of revisions to the IACR Bylaws, the
   following votes were cast:
   
   Approve 244
   Do not approve 16
   Obstain 6
   
   Therefore the revision is APPROVED.
   
   NOTES: 291 ballots were cast. Of these, 25 ballots were invalid
   because they could not be authenticated as coming from a member.
   
   Zurich, 19 November 1998.
   
   Ueli Maurer, Returning officer
   Reto Kohlas, Witness
   Thomas Kuehne, Witness
   Stefan Wolf, Witness
   
   The [1]detailed results are also available.

References

   1. http://www.iacr.org/elections/98/details.html

______________________________________________________________________________

   Eurocrypt '99 Preliminary Technical Program
______________________________________________________________________________

   For more information, see the conference web page at
   http://www.iacr.org/conferences/ec99/index.html.
   
Monday, 3.5.1999

  Morning sessions
  
   Cryptanalysis I (chair: Jacques Stern)
     * Cryptanalysis of RSA with Private Key d < N^0.292
       Dan Boneh and Glenn Durfee (Stanford University)
     * Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible
       Differentials
       Eli Biham, Alex Biryukov (Technion), and Adi Shamir (Weizmann
       Institute of Science
       
   Hash Functions (chair: Jean-Jacques Quisquater)
     * Software Performance of Universal Hash Functions
       Wim Nevelsteen and Bart Preneel (Universiteit Leuven)
       
   Foundations I (chair: Claus Schnorr)
     * Lower Bounds for Oblivious Transfer Reductions
       Yevgeniy Dodis and Silvio Micali (MIT)
     * On the (Im)possibility of Basing Oblivious Transfer and Bit
       Commitment on Weakened Security Assumptions
       Ivan Damgard (University of Aarhus), Joe Kilian (NEC Research
       Institute), and Louis Salvail (University of Aarhus)
     * Conditional Oblivious Transfer and Timed-Release Encryption
       Giovanni Di Crescenzo (University of California San Diego), Rafail
       Ostrovsky, and Sivaramakrishnan Rajagopalan (Bellcore)
     _________________________________________________________________
   
  Afternoon sessions
  
   Public Key (chair: Paul Van Oorschot)
     * An Efficient Threshold Public Key Cryptosystem Secure Against
       Adaptive Chosen Ciphertext Attack
       Ran Canetti (IBM T.J. Watson) and Shafi Goldwasser (MIT)
     * Proving in Zero-Knowledge that a Number is the Product of Two Safe
       Primes
       Jan Camenisch (University of Aarhus) and Markus Michels (Entrust
       Technologies Europe)
     * Secure Hash-and-Sign Signatures without the Random Oracle
       Rosario Gennaro, Shai Halevi, and Tal Rabin (IBM T.J. Watson)
       
   Watermarking and Fingerprinting (chair: Bruce Schneier)
     * A Note on the Limits of Collusion-Resistant Watermarks
       Funda Ergun (Bell Laboratories), Joe Kilian (NEC Research
       Institute), and Ravi Kumar (IBM Almaden)
     * Coin-Based Anonymous Fingerprinting
       Birgit Pfitzmann and Ahmad-Reza Sadeghi (Universitat des
       Saarlandes)
     _________________________________________________________________
   
Tuesday, 4.5.1999

  Morning sessions
  
   Elliptic Curves (chair: Willi Meier)
     * On the Performance of Hyperelliptic Cryptosystems
       Nigel Smart (Hewlett-Packard Laboratories)
     * Fast Elliptic Curve Algorithm Combining Frobenius Map and Table
       Reference to Adapt to Higher Characteristic
       
       Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, and Fumitaka
       Hoshino (NTT Laboratories)
     * Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
       Ryuichi Harasawa, Junji Shikata, Joe Suzuki (Osaka University),
       and Hideki Imai (University of Tokyo)
       
   New Schemes (chair: Dan Boneh)
     * Unbalanced Oil and Vinegar Signature Schemes
       Aviad Kipnis (NDS Technologies), Jacques Patarin, and Louis Goubin
       (Bull SmartCards and Terminals)
     * Public-Key Cryptosystems Based on Composite Degree Residuosity
       Classes
       Pascal Paillier (Gemplus)
     * New Public Key Cryptosystems based on the Dependent--RSA Problems
       David Pointcheval (Ecole Normale Superieure)
     _________________________________________________________________
   
  Evening rump session (chair: Ross Anderson)
     _________________________________________________________________
   
Wednesday, 5.5.1999

  Morning sessions
  
   Block Ciphers (chair: Lars Knudsen)
     * Resistance Against General Iterated Attacks
       Serge Vaudenay (Ecole Normale Superieure)
     * XOR and non-XOR Differential Probabilities
       Philip Hawkes (Qualcomm International) and Luke O'Connor (IBM
       Zurich)
     * S-boxes with Controllable Nonlinearity
       Jung Hee Cheon, Sungtaek Chee, and Choonsik Park (ETRI)
       
   Distributed Cryptography (chair: Carlo Blundo)
     * Secure Distributed Key Generation for Discrete-Log Based
       Cryptosystems
       Rosario Gennaro (IBM T.J. Watson), Stanislaw Jarecki (MIT), Hugo
       Krawczyk (Technion), and Tal Rabin (IBM T.J. Watson)
     * Efficient Multiparty Computations Secure Against an Adaptive
       Adversary
       Ronald Cramer (ETH Zurich), Ivan Damgard, Stefan Dziembowski
       (Aarhus University), Martin Hirt (ETH Zurich), and Tal Rabin (IBM
       T.J. Watson)
     * Distributed Pseudo-Random Functions and KDCs
       Moni Naor, Benny Pinkas, and Omer Reingold (Weizmann Institute of
       Science)
     _________________________________________________________________
   
  Afternoon sessions
  
   Cryptanalysis II (chair: Eli Biham)
     * Improved Fast Correlation Attacks on Stream Ciphers via
       Convolutional Codes
       Thomas Johansson and Fredrik Jonsson (Lund University)
     * Cryptanalysis of An Identification Scheme Based on The Permuted
       Perceptron Problem
       Lars R. Knudsen (University of Bergen) and Willi Meier (FH-Aargau)
       
   Tools from Related Areas (chair Victor Shoup)
     * An Analysis of Exponentiation Based on Formal Languages
       Luke O'Connor (IBM Zurich Research)
     * Dealing Necessary and Sufficient Numbers of Cards for Sharing a
       One-bit Secret Key
       Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki (Tohoku
       University)
     _________________________________________________________________
   
   IACR Business Meeting
     _________________________________________________________________
   
Thursday, 6.5.1999

  Morning sessions
  
   Foundations II (chair: Claude Crepeau)
     * Computationally Private Information Retrieval with Polylogarithmic
       Communication
       Christian Cachin (IBM Zurich), Silvio Micali (MIT), and Markus
       Stadler (Crypto AG)
     * On the Concurrent Composition of Zero-Knowledge Proofs
       Ransom Richardson (Groove Networks) and Joe Kilian (NEC Research
       Institute)
     * Pseudorandom Function Tribe Ensembles Based on One-Way
       Permutations: Improvements and Applications
       Marc Fischlin (Universitat Frankfurt)
       
   Broadcast and Multicast (chair: Yuliang Zheng)
     * Secure Communication in Broadcast Channels: the Answer to Franklin
       and Wright's Question
       Yongge Wang and Yvo Desmedt (University of Wisconsin)
     * Efficient Communication-Storage Tradeoffs for Multicast Encryption
       Ran Canetti (IBM T. J. Watson), Tal Malkin (MIT), and Kobbi Nissim
       (Weizmann Institute of Science)

______________________________________________________________________________

   Martin Hellman to hold 1999 IACR Distinguished Lecture
______________________________________________________________________________

   Martin Hellman has been appointed 1999 IACR Distinguished Lecturer.
   The lecture will be given at Crypto'99 in Santa Barbara. We look
   forward to his presentation.

______________________________________________________________________________

   Slides from the 1998 IACR Distinguished Lecture by Michael Rabin
______________________________________________________________________________

   The slides from Michael Rabin IACR Distinguished Lecture at Crypto '98
   are available at
   http://www.iacr.org/publications/dl/rabin98/rabin98.html

______________________________________________________________________________

   Papers to appear in the Journal of Cryptology
______________________________________________________________________________

   (as of March 1999)
    1. Blundo, De Santis, Kurosawa and Ogata: On a Fallacious Bound for
       Authentication Codes.
    2. Quinn: Bounds for Key Distribution Patterns.
    3. Zbinden, Gisin, Huttner, Muller and Tittel: Practical Aspects of
       Quantum Cryptographic Key Distribution.
    4. Biham: Cryptanalysis of Triple Modes of Operation.
    5. Bernstein: How to Stretch Random Functions: The Security of
       Protected Counter Sums.
    6. Joye, Lenstra and Quisquater: Chinese Remaindering Based
       Cryptosystems in the Presence of Faults.
    7. Smart: The Discrete Logarithm Problem on Elliptic Curves of Trace
       One.
    8. Pointcheval and Stern: Security Arguments for Digital Signatures
       and Blind Signatures.
    9. Knudsen: A Detailed Analysis of SAFER K.
   10. Coppersmith and Shparlinksi: On Polynomial Approximation of the
       Discrete Logarithm and the Diffie-Hellman Mapping.
   11. Shoup: On the Security of a Practical Identification Scheme.
   12. Golic, Salmasizadeh and Dawson: Fast Correlation Attacks on the
       Summation Generator.
   13. Gennaro, Krawczyk and Rabin: RSA-Based Undeniable Signatures.
   14. Blundo, De Santis and Stinson: On the Contrast in Visual
       Cryptography Schemes.
   15. Coppersmith: Weakness in Quaternion Signatures.
   16. Burmester, Desmedt, Itoh, Sakurai and Shizuya: Divertible and
       Subliminal-Free Zero-Knowledge Proofs of Languages.
   17. Fischlin and Schnorr: More RSA and Rabin Bits are More Secure.
   18. Franklin and Wright: Secure Communication over Echo Lines.
   19. Hirt and Maurer: Player Simulation and General Adversary
       Structures in Perfect Multi-Party Computation.

______________________________________________________________________________

   New Books
______________________________________________________________________________

   This page lists new books about cryptology. We are looking for
   reviewers! 
   
Modern Cryptography, Probabilistic Proofs and Pseudorandomness

   Oded Goldreich: Modern Cryptography, Probabilistic Proofs and
   Pseudorandomness, Springer-Verlag, Algorithms and Combinatorics, Vol
   17, 1998. ISBN 3-540-64766-x.
   
   This remarkable new book is one of the few that treats
   complexity-based approach to cryptography and it links it with two
   related fields, namely probabilistic proofs and pseudorandomness.
   Attendents of Crypto '98 will remember Oded Goldreich's invited talk
   that provided a basis for the first part of the book.
   
   Citing from the preface:
   
     The interplay between randomness and computation is one of the most
     fascinating scientific phenomena uncovered in the last couple of
     decades. This interplay is at the heart of modern cryptography and
     plays a fundamental role in complexity theory at large.
     Specifically, the interplay of randomness and computation is
     pivotal to several intriguing notions of probabilistic proof
     systems and is the focal of the computational approach to
     randomness. This book provides an introduction to these three,
     somewhat interwoven domains (i.e., cryptography, proofs and
     randomness).
     
     [...]
     
     This book offers an introduction and extensive survey to each of
     the three areas mentioned above. It present both the basic notions
     and the most important (and sometimes advanced) results. The
     presentation is focused on the essentials and does not ellaborate
     on details. In some cases it offers a novel and illuminating
     perspective. The goal is to provide the reader with
     * A clear and structured overview of each of these areas.
     * Knowledge of the most important notions, ideas, techniques and
       results in each area.
     * Some new insights into each of these areas.
       
     [...]

     _________________________________________________________________
   
   Please send your new book announcements to the newsletter editor at
   newsletter at iacr.org


______________________________________________________________________________

   IACR Calender of Events in Cryptology
______________________________________________________________________________

   The IACR calendar lists events (conferences, workshops, ...) that may
   be of interest to IACR members. If you want to have an event listed
   here, please send email to webmaster at iacr.org .
   
  1999
  
     * [1]Second AES Candidate Conference, March 22-23, 1999, Rome,
       Italy.
     * [2]Sixth Fast Software Encryption Workshop, March 24-26, 1999,
       Rome, Italy.
     * [3]ACISP '99, April 7-9, 1999, University of Wollongong, NSW,
       Australia.
     * [4]Eurocrypt '99, May 2-6, 1999, Prague, Czech Republic.
     * [5]STOC '99, May 2-4, Atlanta, Georgia, USA.
     * [6]PODC '99, May 4-6, Atlanta, Georgia, USA.
     * [7]IEEE Symposium on Security and Privacy, May 9-12, 1999,
       Oakland, California, USA.
     * [8]Mathematics of Public-Key Cryptography, June 13-17, 1999,
       Fields Institute in Toronto, Canada.
     * [9]IEEE Information Theory and Networking Workshop, June 27 - July
       1, 1999, Metsovo, Greece.
     * [10]CrypTEC '99, July 5-8, 1999, Hong Kong, China.
     * [11]Workshop on Selected Areas in Cryptography (SAC '99), August
       9-10, 1999, Queen's University, Kingston, Canada.
     * [12]Workshop on Cryptographic Hardware and Embedded Systems
       (CHES), August 12-13, 1999, Worcester, Massachusetts, USA.
     * [13]Crypto '99, August 15-19, 1999, Santa Barbara, California,
       USA.
     * [14]8th USENIX Security Symposium, August 23-26, 1999, JW Marriott
       Hotel, Washington, D.C., USA.
     * [15]Second Workshop on Security in Communication Networks (SCN
       '99), September 16-17, 1999, Amalfi, Italy.
     * [16]CMS'99, Communications and Multimedia Security, September
       20-21, 1999, Leuven, Belgium.
     * [17]Workshop on Information Hiding, September 29-October 1, 1999,
       Dresden, Germany.
     * [18]6th ACM Conference on Computer and Communications Security,
       November 1-4, 1999, Singapore.
     * [19]Information Security Workshop (ISW '99), November 6-7, 1999,
       Kuala Lumpur, Malaysia.
     * [20]Asiacrypt '99, November 15-18, 1999, Singapore.
     * [21]CQRE [Secure], November 30-December 2, 1999, Duesseldorf,
       Germany.
     * [22]ICICS '99, 2nd International Conference on Information and
       Communication Security, November, 1999, Sydney, Australia.
     * [23]Seventh IMA International Conference on Cryptography and
       Coding, December 20-22, 1999, Royal Agricultural College,
       Cirencester, UK.
       
  2000
  
     * Eurocrypt '2000, May 14-18, Bruges (Brugge), Belgium.
       
     _________________________________________________________________
   
Journal Calls for Papers

     * [25]IEEE Journal on Selected Areas in Communications (JSAC).
       Special Issue on Network Security, February 5, 1999. Publication
       date: January, 2000.
     _________________________________________________________________
   

References

   1. http://csrc.nist.gov/encryption/aes/aes_home.htm#conf2
   2. http://www.ii.uib.no/~larsr/fse99.html
   3. http://www.itacs.uow.edu.au/ccsr/proceedings/acisp99.html
   4. http://www.iacr.org/conferences/ec99/index.html
   5. http://sigact.acm.org/stoc99/
   6. http://www.cs.tamu.edu/people/hlee/podc.html
   7. http://java.sun.com/people/gong/conf/ieee-sp/index.html
   8. http://fields.utoronto.ca/publickey.html
   9. http://www.cs.purdue.edu/homes/spa/itw99.html
  10. http://www.cs.cityu.edu.hk/~cryptec/cryptec.htm
  11. http://www.engr.mun.ca/~sac99/
  12. http://ece.wpi.edu/Research/crypt/ches/
  13. http://www.iacr.org/conferences/c99/index.html
  14. http://www.usenix.org/events/sec99/
  15. http://www.unisa.it/SCN99/
  16. http://www.esat.kuleuven.ac.be/cosic/cms99/
  17. http://www.inf.tu-dresden.de/ihw99/
  18. http://www.isi.edu/ccs99/
  19. http://www.musm.edu.my/BusIT/isw99/
  20. http://www.comp.nus.edu.sg/~asia99
  21. http://www.secunet.de/forum/cqre.html
  22. http://icics99.cit.nepean.uws.edu.au/
  23. http://www.ima.org.uk/mathematics/conferences.htm
  24. http://www.iacr.org/events/archive.html
  25. http://www.iacr.org/events/pages/jsac99.txt
  26. http://www.iacr.org/index.html


______________________________________________________________________________

   Conference Announcements and Calls for Papers
______________________________________________________________________________


                 1999 IEEE Symposium on Security and Privacy
                       Special 20th Anniversary Program

                               May 9-12, 1999
                            The Claremont Resort
                            Berkeley, California
     Sponsored by the IEEE Technical Committee on Security and Privacy
  In cooperation with the International Association of Cryptologic Research

                            Symposium Committee:
                         John McLean, General Chair
                         Jonathan Millen, Vice Chair
                           Li Gong, Program Co-Chair
                      Michael Reiter, Program Co-Chair

                            PRELIMINARY PROGRAM

--------------------------------------------------------------------------
Sunday, May 9, 1999
--------------------------------------------------------------------------
5:00pm Registration
6:00pm Reception
--------------------------------------------------------------------------

Monday, May 10, 1999
--------------------------------------------------------------------------
8:00am Registration
8:45am-9:00am Welcome: Chairs
--------------------------------------------------------------------------
9:00am-10:30am Systems
	Session Chair: Roger Needham, Microsoft Research

Hardening COTS software with generic software wrappers
	Timothy Fraser, Lee Badger, Mark Feldman
	TIS Labs at Network Associates, Inc.
 
Firmato: A novel firewall management toolkit
	Yair Bartal, Alain Mayer, Kobbi Nissim, Avishai Wool
	Lucent Bell Labs
 
Flexible policy-directed code safety
	David Evans, Andrew Twyman
	MIT
-------------------------------------------------------------------------
10:30am-11am coffee break
-------------------------------------------------------------------------
11:00am-12:00pm Policy
	Session Chair: Ravi Sandhu, George Mason University
 
Local reconfiguration policies
	Jonathan K. Millen
	SRI International
 
A modular, user-centered authorization service built on an RBAC foundation
	Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo
	Iris Associates
 
------------------------------------------------------------------------
12:00pm-12:30pm Surprise
------------------------------------------------------------------------
12:30pm-02:00pm Lunch
------------------------------------------------------------------------
2:00pm-3:00pm Verification
	Session Chair: John Mitchell, Stanford University
 
Secure communications processing for distributed languages
	Martin Abadi, Cedric Fournet, Georges Gonthier
	Compaq Systems Research Center, Microsoft Research, and INRIA
 
Verification of control flow based security policies
	T. Jensen, D. Le Metayer, T. Thorn
	IRISA
 
------------------------------------------------------------------------
3:00pm-3:30pm coffee
------------------------------------------------------------------------
3:30pm-5:00pm Panel Discussion

Brief History of Twenty Years of Computer Security Research
	Panel Chair: Teresa Lunt, Xerox PARC
	Panelists: 

        G.R. Blakley, Texas A&M University
        20 years of cryptography

        Virgil Gligor, U Maryland
        20 years of operating system security (Unix as one focus)

        Steve Lipner, MITRETEK 
        20 years of criteria development/commercial technology

        Jonathan K. Millen, SRI International
        20 years of covert channel modeling and analysis

        John McLean, NRL
        20 years of formal methods

        Steve Kent BBN/GTE
        20 years of network security
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Tuesday, May 11, 1999
------------------------------------------------------------------------
9:00am-10:30am Intrusion Detection
 	Session Chair: Cynthia Irvine, Naval Postgraduate School

A data mining framework for building intrusion detection models
	Wenke Lee, Sal Stolfo, Kui Mok
	Columbia University
 
Detecting intrusions using system calls:  Alternative data models
	Christina Warrender, Stephanie Forrest, Barak Pearlmutter
	University of New Mexico
 
Detecting computer and network misuse through the production-based
  expert system toolset (P-BEST)
	Ulf Lindqvist, Phillip A. Porras
	SRI International
 
------------------------------------------------------------------------
10:30am-11:00am coffee
------------------------------------------------------------------------
11:00am-12:30pm Panel 2

Near Misses and Hidden Treasures in Early Computer Security Research
	Panel Chair: Stan Ames, MITRE
	Panelists: Tom Berson, Anagram Labs and Xerox PARC
                   Marv Schaefer, Arca
                   Dick Kemmerer, UC Santa Barbara

------------------------------------------------------------------------
12:30pm-2:00pm lunch
------------------------------------------------------------------------
2:00pm-3:30pm Information Flow
 	Session Chair: John McHugh, Portland State University

A multi-threading architecture for multilevel secure transaction processing
	Haruna Isa, William R. Shockley, Cynthia E. Irvine
	U.S. Navy, Cyberscape Computer Services, and
	Naval Postgraduate School
 
Specification and enforcement of classification and inference constraints
	Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
	SRI International and University of Milan
 
A test for non-disclosure in security level translations
	David Rosenthal, Francis Fung
	Odyssey Research Associates
 
------------------------------------------------------------------------
3:30-4:00pm coffee
------------------------------------------------------------------------
4:00-5:30pm Work-In-Progress (5-minute Presentations)
	Session Chair: Heather Hinton, Ryerson Polytechnic University
------------------------------------------------------------------------
6:00pm IEEE Security and Privacy Technical Committee meeting
        (open to all conference attendees)
------------------------------------------------------------------------
8:00pm Poster Session
------------------------------------------------------------------------
 
Wednesday, May 12, 1999
------------------------------------------------------------------------
9:00am-10:00am Authentication and Key Exchange
	Session Chair: Dieter Gollmann, Microsoft Research

Software smart cards via cryptographic camouflage
	D. Hoover, B. N. Kausik
	Arcot Systems
 
Analysis of the internet key exchange protocol using the NRL protocol analyzer
	Catherine Meadows, 
	Naval Research Laboratory
------------------------------------------------------------------------
10:00am-10:30am coffee
------------------------------------------------------------------------
10:30am-12:00pm. Panel Discussion

Time Capsule -- Twenty Years From Now
	Panel Chair: Michael Reiter, Lucent Bell Labs
	Panelists:

        Mark Weiser, Xerox PARC
        Future of computing

        Roger Needham, Microsoft Research,  Cambridge
        Future of hardware technology

        Howard Shrobe, MIT AI Lab
        Future of software technology

	Hilarie Orman, DARPA
	Future of networking

        Brian Snow, National Security Agency
        Future of Security
------------------------------------------------------------------------
12:00pm Conference Adjourns
------------------------------------------------------------------------

                          Registration Information

Registration must be made in writing either mailed or faxed, by 5 April
1999 to qualify for the advance registration fee. This will be STRICTLY
enforced by postmark or fax time. Sorry, but NO E-Mail registrations will be
accepted.  (The ascii version of the registration form is appended below.)

----------------------------------------------------------------------------

                     Five-Minute Research Talks Session

A continuing feature of the symposium will be a session of 5-minute talks.
We want to hear from people who are advancing the field in the areas of
system design and implementation, but may lack the resources needed to
prepare a full paper. Abstracts of these talks will be distributed at the
Symposium.

Abstracts for 5-minute talks should fit on one 8.5"x11" page,
including the title and all author names and affiliations.  Abstracts
should be sent via email in plain ASCII format to Li Gong at
li.gong@sun.com. The email should state that this abstract is being
submitted for presentation at the 1999 IEEE Symposium on Security and
Privacy, and should include the presenter's name, email and postal
addresses, and phone and fax numbers.

    5-minute abstracts due:  March 12, 1999 
    Acceptance notification: March 26, 1999 

----------------------------------------------------------------------------

                              Evening Sessions

The 1999 IEEE Symposium on Security and Privacy will accommodate poster
sessions and evening discussions. There will be rooms for interested parties
to post presentations on work in progress, recent research results, and
innovative proposals, or to lead discussions on topics of current interest.
These rooms will be available Monday and Tuesday, May 10 and 11. If you are
interested in posting a presentation or organizing a discussion on a
particular topic, please indicate so on the registration form.

----------------------------------------------------------------------------

                  Hotel Reservations - The Claremont Resort

The Claremont Resort in Berkeley, California is situated in the
Oakland-Berkeley hills overlooking the San Francisco Bay on 22 acres of
beautifully landscaped lawns and gardens. Facilities include the Claremont
Pool and Tennis Club and The Spa at the Claremont.

To reach the hotel, allow 35 minutes from the Oakland Airport and 45 minutes
from the San Francisco Airport. Bayporter Express +1-(415)-467-1800 provides
shuttle service from either airport to the Claremont Resort. The charge is
$16 from either the San Francisco or the Oakland Airport, per
person one way. Parking is available at the hotel at a cost of $12 per day
for guests and a maximum of $14 per day for non-guests.

Hotel reservations must be made under the group name IEEE Symposium on
Security and Privacy. The group rate is $121 for singles and $133 for
double occupancy,
plus 11% tax. These rates are available for the period May 7-14, 1999. The
cut-off date for reservations is April 6, 1999. Reservations made
after this date will be accepted on a space available basis. Reservations
must be accompanied by an advance deposit or credit card guarantee.
Individual cancellations will be accepted 24 hours prior to the check-in
date. Please be advised the check-in time is after 3:00 p.m.; check-out is
12 noon.

For reservations and information, contact: The Claremont Resort, 41 Tunnel
Road, Berkeley, CA 94623-0363; Phone: +1-(800)-551-7266 (7 a.m. to
8:30 p.m., PST) or +1-(510)-843-3000; Fax: +1-(510)-549-8582.

----------------------------------------------------------------------------


     1999 IEEE Symposium on Security and Privacy Registration Form

Name: _______________________________________
Affiliation: ________________________________
Postal Address: _____________________________
_____________________________________________
_____________________________________________

Phone: ______________________________________                
Fax: ________________________________________
Email: ______________________________________

Note: Address information will be distributed to attendees.

Please enter the appopriate registration category.  Payment must be 
included and must be either by check in U.S. dollars, drawn on a U.S.
bank and made payable to "IEEE Symposium on Security and Privacy," or
by credit card.  Dates are strictly enforced by postmark.

Advance registration (up to 5 April 1999)
__ Member:             $310.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $385.00
__ Full-time students: $100.00

Late/on-site registration
__ Member:             $370.00
   IEEE or Computer Society Member #________, required
__ Non-Member:         $460.00
__ Full-time students: $100.00

Do you wish to present at a poster session 
or lead an evening discussion? [ ] Yes [ ] No

Do you have any special requirements? ----------------------------------

Please indicate you method of payment by checking the appropriate box:

[ ] Check in U.S. funds drawn on a U.S. bank (PLEASE ENCLOSE WITH THIS FORM)

Credit card authorization: (Charges will appear on your statement as made
by the IEEE COMPUTER SOCIETY.  Your credit card number will be transmitted
to the IEEE over the Internet, using an SSL-protected link.)

[ ] Visa   [ ] Mastercard  [ ] American Express  [ ] Diners Club

Credit Card Number:
Card Holder Name:
Expiration Date:
Signature (required for credit card payments)

Mail registration to:

Jonathan Millen
SRI International EL233
333 Ravenswood Ave.
Menlo Park, CA 94025

Or fax this form (credit card registrations only) to:

FAX +1-650-859-2844
(voice confirmation +1-650-859-2358 or +1-650-859-4751)

NO REGISTRATIONS BY EMAIL.  NO REFUNDS.


______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________


           Conference on
The Mathematics of Public-Key Cryptography

           June 12-17, 1999
          The Fields Institute
         Toronto, Ontario, Canada

REGISTRATION FORM NOW AVAILABLE ONLINE AT

      www.fields.utoronto.ca/publickey.html

==================================================

General Announcement for a Conference on
The Mathematics of Public-Key Cryptography

June 12-17, 1999
The Fields Institute
Toronto, Ontario, Canada

Organizers: Andrew Odlyzko, AT&T
            Gary Walsh      U. Ottawa
            Hugh Williams,  U. Manitoba

Purpose of the Meeting:

In recent years there has been an enormous growth in
the number of implementations of Public-Key Cryptography
in Government and Industry, especially in the financial
sector. The level of security provided by PKC lies in
the computational difficulty of certain number theoretic
problems, such as integer factorization, and computing
discrete logarithms in finite abelian groups. This meeting
on Computational Number Theory is intended to be fairly
broad, although there will be an emphasis on issues of
relevance to the security and fast implementation of public-key
cryptographic systems.

Tentative Format: 5 day meeting, 3 plenary talks each morning,
                  contributed talks each afternoon,

                  Key Note Lecture by Paul Van Oorschot
                  of Entrust Technologies

Confirmed Invited Speakers:

Eric Bach, University of Wisconsin
Johannes Buchmann, Universitat Darmstadt
Don Coppersmith, IBM Research
Gerhard Frey, Universitat Essen
Neal Koblitz, University of Washington 
Alfred Menezes, University of Waterloo
Francois Morain, Ecole Polytechnique
Brian Murphy, Australian National University
Harald Neiderreiter, Austrian Academy of Sciences
Carl Pomerance, University of Georgia
Herman te Riele, CWI
Oliver Schirokauer, Oberlin College
Claus Schnorr, Universitat Frankfurt
Victor Shoup, IBM Research
Andreas Stein, University of Waterloo
Paul van Oorschot, Entrust Technologies
Scott Vanstone, Certicom Corporation

Contributed Talks. There will be room for contributed talks.
For those interested, send three (3) hard copies of an extended
abstract (no more than 10 pages) by March 1, 1999 to

Gary Walsh
Department of Mathematics
University of Ottawa
585 King Edward St.
Ottawa, Ontario  K1N  6N5
Canada

Funding: There may be some funding available for grads and postdocs.
Interested parties can send an email to publickey@fields.utoronto.ca
as soon as possible and will be notified some time before the meeting.

Sponsors: Certicom Corporation, Communications Security Establishment,
Entrust Technologies, Fields Institute, RSA Data Security.

Further Information: For any further information please contact
            publickey@fields.utoronto.ca
or see the website
            http://www.fields.utoronto.ca/publickey.html  

______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________


         WORKSHOP ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS (CHES)
                    http://ece.WPI.EDU/Research/crypt/ches

                       Worcester Polytechnic Institute
                        Worcester, Massachusetts, USA
                            August 12 & 13, 1999

                           Second Call for Papers

General Information

The focus of this workshop is on all aspects of cryptographic hardware and
embedded system design. The workshop will be a forum of new results from the
research community as well as from the industry. Of special interest are
contributions that describe new methods for efficient hardware
implementations and high-speed software for embedded systems, e.g., smart
cards, microprocessors, DSPs, etc. We hope that the workshop will help to
fill the gap between the cryptography research community and the application
areas of cryptography. Consequently, we encourage submission from academia,
industry, and other organizations. All submitted papers will be reviewed.

The topics of interest include but are not limited to:

   * Computer architectures for public-key cryptosystems
   * Computer architectures for secret-key cryptosystems
   * Reconfigurable computing and applications in cryptography
   * Cryptographic processors and co-processors
   * Modular and Galois field arithmetic architectures
   * Tamper resistance on the chip and board level
   * Architectures for smart cards
   * Tamper resistance for smart cards
   * Efficient algorithms for embedded processors
   * Special-purpose hardware for cryptanalysis
   * Fast network encryption
   * True and pseudo random number generators

Mailing List

If you want to receive emails with subsequent Call for Papers and 
registration information, please send a brief mail to ches@ece.orst.edu. 

Instructions for Authors

Authors are invited to submit original papers. The preferred submission form
is by electronic mail to ches@ece.orst.edu. Papers should be formatted in
12pt type and not exceed 12 pages (not including the title page and the
bibliography). The title page should contain the author's name, address
(including email address and an indication of the corresponding author), an
abstract, and a small list of key words. Please submit the paper in
Postscript or PDF. We recommend that you generate the PS or PDF file using
LaTeX, however, MS Word is also acceptable. All submissions will be
refereed.

Only original research contributions will be considered. Submissions must
not substantially duplicate work that any of the authors have published
elsewhere or have submitted in parallel to any other conferences or
workshops that have proceedings.

Workshop Proceedings

The post-proceedings will be published in Springer-Verlag's Lecture Notes 
in Computer Science (LNCS) series. Notice that in order to be included
in the proceedings, the authors of an accepted paper must guarantee to
present their contribution at the workshop. 

Important Dates

 Submission Deadline:          April 30th, 1999.
 Acceptance Notification:      June 15th, 1999.
 Final Version due:            July 15th, 1999.
 Workshop:                     August 12th & 13th, 1999.
 
NOTES: The CHES dates August 12 & 13 are the Thursday & Friday preceding
       CRYPTO '99 which starts on August 15.

Invited Speakers

Dale Hopkins, Compaq - Atalla, USA.

Brian Snow, National Security Agency, USA.

Eberhard von Faber, Debis IT Security Services, Germany.
  "Evaluation Schemes for Financial Organizations."

Colin D. Walter, Computation Department - UMIST, U.K.
  "An Overview of Montgomery's Multiplication Technique: 
   How to make it Smaller and Faster."

Program Chairs

All correspondence and/or questions should be directed to either of the
Program Chairs:

 Cetin Kaya Koc                       Christof Paar
 Dept. of Electrical & Computer       Dept. of Electrical & Computer
 Engineering                          Engineering
 Oregon State University              Worcester Polytechnic Institute
 Corvallis, Oregon 97331, USA         Worcester, MA 01609, USA
 Phone: +1 541 737 4853               Phone: +1 508 831 5061
 Fax: +1 541 737 1300                 Fax: +1 508 831 5491
 Email: Koc@ece.orst.edu              Email: christof@ece.wpi.edu

Program Committee

Gordon Agnew,  University of Waterloo, Canada
David Aucsmith,   Intel Corporation, USA
Ernie Brickell,  CertCo, USA
Wayne Burleson,   University of Massachusetts at Amherst, USA
Burt Kaliski,   RSA Laboratories, USA
Jean-Jacques Quisquater,   Université Catholique de Louvain, Belgium
Christoph Ruland,   University of Siegen, Germany
Victor Shoup,   IBM Research, Switzerland
Michael Wiener,   Entrust Technologies, Canada

Location

WPI is in Worcester, the second largest city in New England. The city is 80
km (50 miles) West of Boston and 280 km (175 miles) North-East of New York
City.

Worcester is home to a wealth of cultural treasures, many of which are just
a short distance from WPI. These include the historic Higgins Armory Museum,
which houses one of the world's largest collections of armor; the EcoTarium
(formerly New England Science Center), one of the only museums in the
country dedicated to environmental education; and the beautifully restored
Mechanics Hall, one of America's finest concert halls. The Worcester Art
Museum, holding one of the nation's finest collections, and the
world-renowned American Antiquarian Society, with the largest collection of
items printed during the nation's colonial period, are within two blocks of
the WPI campus. Worcester is also well known for its ten colleges, which
cooperate through the Colleges of Worcester Consortium.

Recreation areas within easy driving distance include Boston and Cape Cod to
the east, the White and Green mountains to the north, and the Berkshires to
the west.

August weather in New England is usually very pleasant with average
temperatures of 20 C (70 F).

Workshop Sponsors

This workshop has received generous support from Advanced Communications Inc., 
Compaq - Atalla Security Products, Intel, SECUNET, and SITI. The organizers 
express their sincere thanks.


______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________


                         Call for Papers

                    Second Workshop on Security 
                     in Communication Networks

                September 16--17, 1999, Amalfi, Italy



                       General Information

Security and privacy are increasing concerns in computer 
networks like the Internet.
The availability of fast, reliable, and cheap electronic 
communication offers the opportunity to perform electronically 
and in a distributed way a wide range of transactions of the 
most diverse nature. 
The problem of security, privacy and integrity of information 
is of dramatic importance in transactions of commercial and 
financial nature. 



The Second Workshop Security in Communication Networks (SCN '99) 
will be held in Amalfi (Italy) on September 16--17, 1999. 
SCN '99 aims at bringing together researchers in the field of 
data security to foster cooperation and exchange of ideas.


Papers are solicited on all technical aspects of data security 
including:


    Anonymity                   Identification
    Authentication              Implementations
    Block Ciphers               Key Distribution
    Computer Security           Privacy
    Cryptanalysis               Protocols
    Hash Functions              Public Key
    Digital Signatures          Secret Sharing
    Electronic Money            Standards
    Foundations and Theory      Survey and state of the art



                 Instructions for Authors:

Authors are strongly encouraged to submit their papers 
electronically (Postscript file). A detailed description of the 
electronic submission procedure will appear by March 29, 1999 
at http://www.unisa.it/SCN99/.
Electronic submissions must conform to this procedure in order
to be considered. Authors unable to submit electronically are 
invited to send a cover letter and 14 copies of an extended 
abstract to the Program Chair at the address given below. 
Submission must be received by the Program Chair on or before 
May 15, 1999 (or postmarked by May 1, 1999 and sent via 
airmail or courier).

The program committee will also consider papers that are 
currently submitted to other conferences as well as reports on 
ongoing research. 
The extended abstract should start with the title and an 
abstract and should state whether the paper is currently 
submitted to a conference and the name of the conference. 
The abstract should be followed by a succinct statement 
appropriate for a non-specialist reader specifying the subject 
addressed, its background, the main 
achievements, and their significance to data security. 
Submissions are limited to 12 single-spaced pages of 12pt type.
Notification of acceptance or rejection will be sent to authors
no later than July 1, 1999.

                   Conference Proceedings:

There will be no conference proceedings but a booklet of 
extended abstracts will be distributed to the participants and 
made available through the WWW. We are currently negotiating 
to have a special issue of an international journal devoted to 
selected papers from the conference.


Important Dates: 

 Submission: May 15, 1999. 
 Acceptance: July 1, 1999.
 Conference: September 16-17, 1999


Program Chair:

 Giuseppe Persiano                 
 Dip. di Informatica ed Appl. 
 Universita` di Salerno 
 84081 Baronissi (Salerno), ITALY 
 e-mail: giuper@dia.unisa.it	
 phone (+39)-089-965.241
 FAX: (+39)-089-965.272


Programme Committee:

 Carlo Blundo                (Universita` di Salerno, Italy)
 Dan Boneh                   (Stanford University, USA) 
 Johannes Buchmann           (T. U. of Darmstadt, Germany)
 Benny Chor                  (Technion, Israel)
 Rosario Gennaro             (IBM T.J. Watson, USA)
 Rafael Hirschfeld           (Unipay Technologies, The Netherlands)
 Jim Massey                  (Lund University, Sweden) 
 Ueli Maurer                 (ETH Zurich, Switzerland)
 Rafail Ostrovsky            (Bellcore, USA)
 Giuseppe Persiano (Chair)   (Universita` di Salerno, Italy) 
 Doug Stinson                (University of Waterloo, Canada)
 Gene Tsudik                 (U. of Southern California, USA)
 Moti Yung                   (CertCo, USA)
 

General Chairs:
 C. Blundo and A. De Santis 
 Dip. di Informatica ed Appl. 
 Universita` di Salerno
 84081 Baronissi (Salerno), ITALY
 e-mail: {carblu,ads}@dia.unisa.it
 phone (+39)-089-965.403
 

Local Organizing Committee:
 V. Auletta (Chair)
 P. D'Arco, C. Galdi, B. Masucci 


Publicity Chairs:
 C. Galdi and V. Scarano
 e-mail: {clegal,vitsca}@dia.unisa.it
 phone (+39)-089-965.264

______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________


                Preliminary Announcement and Call for Papers
                                      
         6th ACM Conference on Computer and Communications Security
                                      
                             November 1-4, 1999
                                      
                     Kent Ridge Digital Labs, Singapore
                                      
                          http://www.isi.edu/ccs99
                                      
   Papers offering research contributions in any aspect of computer
   security are solicited for submission to the Sixth ACM Conference on
   Computer and Communications Security. Papers may present theoretical
   results, techniques/protocols, applications, or practical experience
   on a wide rage of topics, e.g.:
   
   Novel cryptographic constructs Implementation experiences New security
   architectures
   Intrusion detection & response Malicious code & countermeasures
   Authentication & key management
   Authorization, access control & audit Secure electronic commerce
   Privacy & anonymity
   Licensing & intellectual property New attacks & threats Database
   security
   
   Accepted papers will be presented at the conference and published by
   the ACM in a conference proceedings. Outstanding papers will be
   invited for submission to ACM Transactions on Information and System
   Security (TISSEC).
   
   Submitting papers: submitted material must not substantially overlap
   with papers that have been published or that are simultaneously
   submitted to a journal or a conference with a proceedings. Papers
   should be at most 15 pages excluding bibliographies and well-marked
   appendices (using 11-point font and reasonable margins on 8.5'x11' or
   A4 paper), and at most 20 pages total. Since reviewers are not
   required to read the appendices papers should be intelligible without
   them. All submissions should be appropriately anonymized, i.e., no
   author names or affiliations, no obvious citations (where possible)
   and no web pointers!
   
   Submission Procedure:
   1.
          Email to ccs99@isi.edu in plain ASCII: paper title, abstract,
          authors and contact information.
   2.
          In addition, submit your paper using ONE of the following two
          methods:
          + Electronic submission (preferred): Instructions for
            submitting postscript papers by e-mail are available from
            [4]http://www.isi.edu/ccs99/esub.html . Early electronic
            submission is strongly recommended. Allow at least five (5)
            days ahead of the due date to allow for test-printing of the
            paper and, in case of problems, leaving sufficient time to
            re-submit in hardcopy. Organizers are not responsible for
            unprintable papers!
          + Hardcopy submission: Send eight (8) copies of your paper to
            the program chair at the address below along with a cover
            letter and a listing (on a separate page) of authors' names,
            email/postal addresses, phone/fax numbers, and identifying
            the contact author.
          
   Submissions received after the submission deadline will be rejected
   without review. Where possible all further communications to authors
   will be via email.
   
   Submitting Panel and Tutorial Proposals: this conference will include
   panel and tutorial sessions addressing topics of interest to the
   computer security community. Proposals should be no longer than five
   (5) pages in length and, for panels, should include possible panelists
   and an indication of which of those panelists have confirmed
   participation. Proposals can be e-mailed or sent in hardcopy to the
   program chair at the address below along with a cover letter
   indicating that the proposal is for the 6th ACM CCCS, and listing the
   proposers' names, email/postal addresses as well as phone/fax numbers.
   
     Papers Panel & Tutorial Proposals
   Submissions due April 30, 1999 May 15, 1999
   Acceptance June 30, 1999 June 30, 1999
   Final versions July 30, 1999 July 30, 1999
   
                           Conference Organizers:
                                      
   General chair: Juzar Motiwalla
     Kent Ridge Digital Labs (KRDL)
     21 Heng Mui Keng Terrace
     Singapore 119613
     juzar@krdl.org.sg
     (65) 874-2075
   
   Steering committee chair: Ravi Sandhu
     George Mason University
     ISSE Department, Mail Stop 4A4
     Fairfax, VA 22030-4444, USA
     sandhu@isse.gmu.edu
     (1) 703 993-1659
   
   Program chair: Gene Tsudik
     USC Information Sciences Institute
     4676 Admiralty Way, Suite 10001
     Marina del Rey, CA 90292 USA
     ccs99@isi.edu
     (1) 310 822-1511 ext. 329
   
   Program committee: N. Asokan, Nokia Research
     Dan Boneh, Stanford University
     Robert Deng, Kent Ridge Digital Labs
     Matt Franklin, Xerox PARC
     Eli Gafni, UCLA and RSA Labs
     Ravi Ganesan, Checkfree, Inc.
     Li Gong, SUN Javasoft
     Sushil Jajodia, George Mason University
     Markus Jakobsson, Lucent Bell Labs
     Ari Juels, RSA Labs
     Mike Just, Entrust and Carleton University
     Alain Mayer, Lucent Bell Labs
     Refik Molva, Eurecom Institute
     Clifford Neuman, USC ISI
     Radia Perlman, SUN Labs
     Mike Reiter, Lucent Bell Labs
     Ravi Sandhu, George Mason University
     Gene Spafford, Purdue University
     Vijay Varadharajan, University of Western Sydney
     Yuliang Zheng, Monash University
   
   Local Arrangements Chair: Desai Narasimhalu, KRDL
   Publicity chair: Jianying Zhou, KRDL
   Registration Chair: Victorine Chen-Toh, KRDL
   Exhibits Chair: Robert Deng, KRDL
   Tutorials Chair: Ngair Teow Hin, KRDL
   Proceedings Chair: TBD
   
______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________


                               Asiacrypt '99
                       November 14-18, 1999 Singapore
                              Call For Papers
                                      
   General Information
   Nowadays, Asiacrypt becomes one of three major events in security and
   cryptography in the world. Original papers on all technical aspects of
   cryptology and information security are solicited for ASIACRYPT '99.
   ASIACRYPT '99, the fifth annual ASIACRYPT conference will be held in
   Singapore from November 14 to 18, 1999. ASIACRYPT '99 is sponsored by
   [1]CSSR (Centre for Systems Security, National University of
   Singapore), ASC (Asiacrypt Steering Committee), in co-operation with
   [2]IACR (the International Association for Cryptologic Research).
   
   Instructions for Authors
   Authors are invited to send a cover letter and 17 copies of an
   anonymous paper to the Program Co-Chair at the post address stated
   below. Submissions must reach the Program Co-Chair no later than May
   10, 1999. Late submissions and submissions by other mediums will not
   be considered.
   
   The cover letter should contain the title, and the authors' names,
   e-mail and postal addresses. The paper must be anonymous. It should
   not have the authors' names, affiliations, acknowledgments or obvious
   references. The paper should begin with the title, a short abstract
   and a list of keywords. An introduction is also required to summarize
   the contributions of the paper. The paper should be at most 15 pages
   including the bibliography and appendices.
   
   Only original research contributions will be considered. Submissions
   must not substantially duplicate work that any of the authors have
   published elsewhere or have submitted in parallel to any other
   conferences or workshops that have proceedings.
   
   Notification of acceptance or rejection will be sent to authors by
   July 25, 1999.
   
   Conference Proceedings
   Proceedings will be published in [3]Springer-Verlag's Lecture Notes in
   Computer Science and will be available at the conference. Clear
   instructions about the final copy will be sent to the authors of
   accepted papers.
   
   Important Dates
   Submission Deadline: May 10, 1999
   Acceptance Notification: July 25, 1999
   Proceedings Version: August 25, 1999
   
   Address for Submission                                      For
   enquiries, please contact
   Dr. Kwok Yan Lam                                                 Dr.
   Chaoping Xing,
   Program Co-Chair Asiacrypt '99                           Organizing
   Chair Asiacrypt '99
   School of Computing
   Department of Mathematics
   National University of Singapore                      National
   University of Singapore
   Kent Ridge Crescent, Singapore,119260         Kent Ridge Crescent,
   Singapore, 119260
   Tel: (65) 8746613                                                 Tel:
   (65) 8746747
   Fax: (65) 7794580                                                Fax:
   (65) 7795452
   [4]lamky@comp.nus.edu.sg
   [5]xingcp@comp.nus.edu.sg
   
   Program Co-Chairs
   Kwok Yan Lam, National University of Singapore
   Eiji Okamoto, JAIST, Japan
   
   General Chair
   Yongfei Han, Gemplus, Singapore
   
   Program Committee
   Colin Boyd, Queensland University of Technology, Australia
   Micheal Burmester, University of London, UK
   Chin-Chen Chang, National Chung Cheng University, Taiwan
   Cunsheng Ding, National University of Singapore, Singapore
   Markus Jakobsson, Bell Labs, USA
   Kwangjo Kim, Information and Communications University, Korea
   Kwok Yan Lam, National University of Singapore, Singapore (Co-Chair)
   Pil-Joong Lee, Postech, Korea
   Ueli Maurer, ETH, Zurich
   Mitsuru Matsui, Mitsubishi Electronic Corp., Japan
   David Naccache, Gemplus, France
   Harald Niederreiter, Austrian Academy of Sciences, Austria
   Andrew Odlyzko, AT&T Research Lab, USA
   Eiji Okamoto, JAIST, Japan (Co-Chair)
   Dingyi Pei, Chinese Academy of Science, China
   Jacques Stern, ENS, France
   Guozhen Xiao, Xidian University, China
   Yuliang Zheng, Monash University, Australia

References

   1. http://www.comp.nus.edu.sg/~lamky/css.html

______________________________________________________________________________
   ________________________________________________________________________
______________________________________________________________________________




______________________________________________________________________________

   Officers and Directors of the IACR (1999)
______________________________________________________________________________


Officers and directors of the IACR are elected for three year terms. If you
are a member and wish to contact IACR regarding an address change or similar
matter, you should contact the membership services at [iacrmem(at)iacr.org].
See http://www.iacr.org/iacrmem/ for more information.


                                     Officers

  Kevin S. McCurley                        Andrew J. Clark
  President                                Vice President
  6721 Tannahill Drive                     P.O. Box 743
  San Jose, CA 95120                       Brighton
  USA                                      East Sussex
  Phone: (408) 927-1838                    BN1 5HS
  Email: [president(at)iacr.org]           United Kingdom
                                           Phone: +44 1273 270752
                                           Fax: +44 1273 276558
                                           Email: [vicepresident(at)iacr.org]

  Josh Benaloh                             Jimmy Upton
  Secretary                                Treasurer
  Microsoft Research                       Uptronics Incorporated
  One Microsoft Way                        298 S. Sunnyvale Ave, Suite 211
  Redmond, WA 98052                        Sunnyvale, CA 94086-6245
  USA                                      USA
  Phone: (425) 703-3871                    Phone: (408) 774-6202
  Fax: (425) 936-7329                      Fax: (408) 774-6201
  Email: [secretary(at)iacr.org]           Email: [treasurer(at)iacr.org]

                                     Directors

  Don Beaver                               Thomas Berson
  Crypto '99 General Chair                 Anagram Labs
  Certco Inc.                              P.O. Box 791
  55 Broad Street, 22nd Floor              Palo Alto CA, 94301
  New York, NY 10004                       USA
  USA                                      Phone: (415) 324-0100
  Phone: (212) 709-8900                    Email: [berson(at)anagram.com]
  Fax: (212) 709-6754
  Email: crypto99(at)iacr.org

  Eli Biham                                Gilles Brassard
  Computer Science Department              Département IRO
  Technion                                 Université de Montréal
  Haifa 32000                              C.P. 6128, succursale centre-ville
  Israel                                   Montréal, Québec H3C 3J7
  Email: [biham(at)cs.technion.ac.il]      Canada
  Voice: +972-4-8294308                    Email: [brassard(at)iro.umontreal.ca]
  Fax: +972-4-8221128

  Christian Cachin                         Whitfield Diffie
  IACR Newsletter Editor                   MTV01-40
  IBM Zurich Research Laboratory           Sun Microsystems
  Säumerstrasse 4                          2550 Garcia Avenue
  CH-8803 Rüschlikon                       Mountain View, CA 94043
  Switzerland                              USA
  Email: [cachin(at)acm.org]               Email:
  Phone: +41-1-724-8989                    [whitfield.diffie(at)eng.sun.com]
  Fax: +41-1-724-8953

  Joan Feigenbaum                          Matt Franklin
  Editor-in-Chief, Journal of Cryptology   Crypto '2000 General Chair
  AT&T Labs Research                       Xerox PARC
  Room C203                                3333 Coyote Hill Road
  180 Park Avenue                          Palo Alto, CA 94304
  Florham Park, NJ 07932-0971              (W) 650-812-4228
  USA                                      (fax) 650-812-4471
  Email: [jf(at)research.att.com]          Email: crypto2000(at)iacr.org
  [jofc(at)iacr.org]
  Phone: +1 973 360-8442
  Fax: +1 973 360-8178

  Jaroslav Hruby                           Peter Landrock
  Eurocrypt '99 General Chair              Mathematics Institute
  GCUCMP Praha                             Aarhus University
  PO Box 21/OST                            Ny Munkegade
  170 34 Prague 7                          8000 Aarhus C
  Czech Republic                           Denmark
  Email: [eurocrypt99(at)iacr.org]         Email:
  Phone: 420 2 6143 5524                   [landrock(at)cryptomathic.aau.dk]
  Fax: 420 2 324450

  Ueli Maurer                              Bart Preneel
  Department of Computer Science           Department of Electrical Engineering
  ETH Zürich                               Katholieke Universiteit Leuven
  CH-8092 Zürich                           Kardinaal Mercierlaan 94
  Switzerland                              B-3001 Heverlee
  Email: [maurer(at)inf.ethz.ch]           Belgium
  Tel-1: +41-1-632 7420                    Email:
  Tel-2: +41-1-632 7371                    [bart.preneel(at)esat.kuleuven.ac.be]
  Fax : ++41-1-632 1172                    Phone: +32 16 32 11 48
                                           Fax: +32 16 32 19 86

  Tatsuaki Okamoto                         Paul C. Van Oorschot
  NTT Labs                                 Entrust Technologies
  1-1 Kikarinooka                          750 Heron Road, Suite E08
  Yokosuka-Shi 239                         Ottawa, Ontario
  Japan                                    K1V 1A7
  USA                                      Canada
  Phone: 81-468-59-2511                    Email: [paulv(at)entrust.com]
  Fax: 91-468-59-3858
  Email: [okamoto(at)sucaba.isl.ntt.jp]

  Prof.Joos Vandewalle
  Eurocrypt '2000 General Chair
  Electrical Engineering Department
  (ESAT)
  Katholieke Universiteit Leuven
  Kard. Mercierlaan 94
  B-3001 Heverlee
  Belgium
  Fax: 32/16/32.19.70
  Phone: 32/16/32.10.52
  email :
  Joos.Vandewalle(at)esat.kuleuven.ac.be

______________________________________________________________________________

   About the IACR Newsletter
______________________________________________________________________________
                                       
   The IACR Newsletter is published three times a year and only available
   electronically. It is sent to IACR members by email (as a flat ASCII
   text) and published on the web at
   
     http://www.iacr.org/newsletter/
     
   If you are a member of IACR and wish to receive the newsletter, you
   need to make sure that we know your email address! To update your
   email address in the IACR member database, please contact the
   membership services at 
     iacrmem(at)iacr.org
   
   Contributions, announcements, book announcements or reviews, calls for
   papers ... are most welcome! Please include a URL and/or e-mail
   addresses for any item submitted (if possible). For calls for papers,
   please submit a one page ASCII version. Send your contributions to
     newsletter(at)iacr.org

   Deadline for submissions to the next newsletter issue is May 31,
   1999. However, many items will be posted on the website as soon as
   possible.

   The IACR Newsletter is copyright (c) 1999, International Association
   for Cryptologic Research. 

______________________________________________________________________________

End of IACR Newsletter, Vol. 16, no. 1, Winter 1999.
______________________________________________________________________________