______________________________________________________________________________
______________________________________________________________________________
   

   IACR Newsletter

   Vol. 16, No. 3, Fall 1999. 

   Published by the International Association for Cryptologic Research
   Christian Cachin, Editor

______________________________________________________________________________
______________________________________________________________________________

   http://www.iacr.org/newsletter/

______________________________________________________________________________
   
   Contents
______________________________________________________________________________

     * Editorial
     * Eurocrypt 2000 - Call for Papers
     * Crypto '99 Rump Session
     * 1999 Elections: Candidates
     * IACR Cryptology e-Print Server Announcement
     * Minutes of the BoD Meeting at Eurocrypt '99
     * Announcements
       + SIGINT in Europe During the Cold War
       + DIMACS Workshop on the Management of Digital IP
       + New Reports in the Theory of Cryptography Library
     * New Books
     * Open Position
     * Calender of Events in Cryptology
     * IACR Contact Information

______________________________________________________________________________
   
   Editorial
______________________________________________________________________________

   Welcome to the fourth electronic issue of the IACR Newsletter!

   The biggest news in this issue, at least in my view, is the
   announcement of the ``IACR Cryptology e-Print Server.'' This service
   will make research results accessible faster and increase interaction
   and exchange of ideas in the field.
   
   I may also direct your attention to the current IACR elections and
   upcoming conferences. Next year will be the first year with three
   IACR-sponsored cryptography conferences:
     * Eurocrypt in Bruges/Brugge (Belgium), May 14-18;
     * Crypto in (Santa Barbara) , August 20-24;
     * Asiacrypt in Kyoto (Japan), December 3-7.
       
   Conferences in 2001: Eurocrypt will be held in Innsbruck, Austria
   (tentatively, May 6-10); program chair is Birgit Pfitzmann
   (pfitzmann@cs.uni-sb.de) and general chair is Reinhard Posch
   (Reinhard.Posch@iaik.at). For Crypto 2001 (tentatively, August 19-23),
   the program chair is Joe Kilian and general chair is Dave Balenson.
   
   For more information about upcoming workshops and confereneces, check
   the Calendar section or www.iacr.org/events/!
   
   If you have not received the IACR Newsletter by Email and would like
   to receive it in the future, then check out your Email address in the
   IACR member list that has been mailed in February 1999.
   
   IACR can only provide you with accurate information if you contribute
   your input. Please send in announcements of workshops, conferences,
   calls for papers, or any other item of interest to IACR members. The
   address for all submissions to the Newsletter and Calendar is
   
     newsletter@iacr.org
     
   The next issue of the IACR Newsletter is scheduled for publication in
   February. However, announcements will be posted on the IACR Website as
   soon as possible.
   
   Christian Cachin
   IACR Newsletter Editor

______________________________________________________________________________
   
   Eurocrypt 2000
______________________________________________________________________________

   E U R O C R Y P T     2 0 0 0
   Bruges (Brugge), Belgium, May 14-18, 2000
 
                              CALL FOR PAPERS
                                      
   General Information:    Original papers on all technical aspects of
   cryptology are solicited for submission to Eurocrypt 2000, the 19th
   Annual Eurocrypt Conference. Eurocrypt 2000 is organized by the
   International Association for Cryptologic Research (IACR). For more
   information, access http://www.iacr.org/.
   
   Instructions for authors:    Authors are strongly encouraged to submit
   their papers electronically. A detailed description of the electronic
   submission procedure will appear by September 15, 1999 at
   http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/. Electronic
   submissions must conform to this procedure and be received by November
   3, 1999, 17:00 MET in order to be considered. Authors unable to submit
   electronically are invited to send a cover letter and 20 copies of an
   anonymous paper (double-sided copies preferred) to the Program Chair
   at the postal address below. Submissions must be received by the
   Program Chair on or before November 3, 1999 (or postmarked by October
   26, 1999, and sent via airmail or courier). Late submissions and
   submissions by fax will not be considered. The cover letter should
   contain the paper's title and the names and affiliations of the
   authors, and should identify the contact author including e-mail and
   postal addresses.
   
   Submissions must not substantially duplicate work that any of the
   authors has published elsewhere or has submitted in parallel to any
   other conference or workshop with proceedings. The paper must be
   anonymous, with no author names, affiliations, acknowledgments, or
   obvious references. It should begin with a title, a short abstract,
   and a list of key words, and its introduction should summarize the
   contributions of the paper at a level appropriate for a non-specialist
   reader. The paper should be at most 12 pages excluding the
   bibliography and clearly marked appendices, and at most 20 pages in
   total, using at least 11-point font and reasonable margins. Committee
   members are not required to read appendices; the paper should be
   intelligible without them. Submissions not meeting these guidelines
   risk rejection without consideration of their merits. Notification of
   acceptance or rejection will be sent to authors by January 26, 2000.
   Authors of accepted papers must guarantee that their paper will be
   presented at the conference.
   
   Conference Proceedings:    Proceedings will be published in
   Springer-Verlag's Lecture Notes in Computer Science and will be
   available at the conference. Clear instructions about the preparation
   of a final proceedings version will be sent to the authors of accepted
   papers. The final copies of the accepted papers will be due on March
   1, 2000.
   
   Submission: November 3, 1999 Acceptance: January 26, 2000 Proceedings
   version: March 1,2000
   
   Program Committee:
   Simon Blackburn (Royal Holloway Univ. of London, UK)
   Dan Boneh (Stanford Univ., USA)
   Christian Cachin (IBM Research, Switzerland)
   Don Coppersmith (IBM Research, USA)
   Ronald Cramer (ETH Zurich, Switzerland)
   Hans Dobbertin (BSI, Germany)
   Markus Jakobsson (Bell Laboratories, USA)
   Thomas Johansson (Lund Univ., Sweden)
   Joe Kilian (NEC Research Institute, USA)
   Lars Knudsen (Univ. of Bergen, Norway) Mitsuru Matsui (Mitsubishi,
   Japan)
   Alfred Menezes (Univ. of Waterloo, Canada)
   Moni Naor (Weizmann Institute of Science, Israel)
   Kaisa Nyberg (Nokia Research Center, Finland)
   Paul van Oorschot (Entrust Technologies, Canada)
   Torben Pedersen (Cryptomathic, Denmark)
   David Pointcheval (ENS, France)
   Bart Preneel (chair) (K.U.Leuven, Belgium)
   Moti Yung (Certco, USA)
   
   Address for non-electronic submissions:
   
   Bart Preneel Program Chair, Eurocrypt 2000
   Katholieke Universiteit Leuven
   Dept. Electrical Engineering-ESAT
   Kard. Mercierlaan 94
   B-3001 Leuven, BELGIUM
   Phone: +32 16 32 11 48
   Fax: +32 16 32 19 86
   E-mail: bart.preneel@esat.kuleuven.ac.be
   For other information contact:
   
   Joos Vandewalle, General Chair, Eurocrypt 2000
   Katholieke Universiteit Leuven
   Dept. Electrical Engineering-ESAT
   Kard. Mercierlaan 94
   B-3001 Leuven, BELGIUM
   Phone: +32 16 32 10 50
   Fax: +32 16 32 19 69
   E-mail: eurocrypt2000@esat.kuleuven.ac.be
   
   Conference
   URL:   http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/
   
   Stipends:    A limited number of stipends are available to those
   unable to obtain funding to attend the conference. Students whose
   papers are accepted and who will present the paper themselves are
   encouraged to apply if such assistance is needed. Requests for
   stipends should be addressed to the General Chair.


______________________________________________________________________________
   
   Crypto '99 Rump Session Schedule
______________________________________________________________________________

  Stuart Haber Presiding
  
  Session I
  
   7:00 Introduction
          Stuart Haber
          
   7:03 Prize awards for Hasty Pudding analysis
          Rich Schroeppel
          
   7:10 Belgian remarks on U.S. pudding
          Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen
          
   7:14 An attack on ISO 9786-1
          Don Coppersmith, Shai Halevi, Charanjit Jutla
          
   7:21 FPGA: A practical tool for cryptanalysis with running examples
          F. Koeune, J.-J. Quisquater, R. Sebastien, J.-P. David, T.
          Gilmont, J.-D. Legat
          
   7:25 Quadruple DES
          Paul Kocher
          
   7:28 Crypto law & export control update
          John Gilmore (& Cindy Cohn)
          
   7:35 Fast precomputation for discrete logarithm cryptosystems
          C.P. Schnorr
          
   7:40 Issues in tamper resistance
          Benjamin Jun
          
   7:44 Random number generator failure in provably secure encryption
          schemes
          William Whyte, Burt Kaliski
          
   7:50 (1) Arms export: Blazonry for dummies (2) Oenocryptology
          Don Beaver
          
   7:56-8:10 Break
          
  Session II
  
   8:10 Fun with cryptography: How not to set a final exam question
          G. Agnew
          
   8:15 Signature schemes based on the strong RSA assumption
          Ronald Cramer, Victor Shoup
          
   8:19 Constructions of universal hash families from algebraic curves
          over finite fields
          Chaoping Xing, Huaxiong Wang, Kwok Yan Lam
          
   8:26 What is the PGP key of Bill Gates? A practical experiment with
          key servers J.-J. Quisquater
          
   8:30 How to solve a system of equations inside IDEA
          E.G. Giessmann, G. Lassmann
          
   8:32 Keeping secrets using .o files
          Steve Meyer
          
   8:37 Computer license plates
          Thomas Cusick
          
   8:41 A probabilistic poly-time framework for protocol analysis
          P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrov
          
   8:46 Cross-encryption
          Rosario Gennaro, Shai Halevi, Tal Rabin
          
   8:52 New forgeries with Rabin-like cryptosystems
          J.-S. Coron, M. Joye, J.-J. Quisquater
          
   8:57 Cracking Kryptos (well, almost)
          Jim Gillogly
          
   9:01 Introducing the T-class of SOBER stream ciphers
          Greg Rose, Philip Hawkes
          
   9:06 Studying cycles in RC4
          Chris Hall
          
   9:11 Next-generation mobile phone algorithms
          Greg Rose
          
   9:15-9:30 Break
          
  Session III
  
   9:30 The P-problem: a solved instance and its implications
          Detlef Huehnlein
          
   9:33 Player elimination in distributed protocols: Can resilience be
          for free?
          Martin Hirt, Ueli Maurer, Bartosz Przydatek
          
   9:39 Efficient separable fair contract signing schemes based on
          standard signatures
          Jan Camenisch, Markus Michels
          
   9:45 Consistency concerns for fair exchange
          Paul Syverson
          
   9:51 OEF using a successive extension
          Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
          
   9:54 Tricks for a better efficiency of authentication protocols
          Marc Girault
          
   9:58 Public-key cryptography and password protocols: The multi-user
          case
          Maurizio Boyarsky (presented by Cynthia Dwork)
          
   10:03 Correlated coins and applications to game theory
          Yevgeniy Dodis, Shai Halevi, Tal Rabin
          
   10:09 Complete characterization of security notions for probabilistic
          private-key encryption
          Jonathan Katz, Moti Yung
          
   10:14 Non-malleable non-interactive zero knowledge and adaptive
          chosen-ciphertext security
          Amit Sahai
          
   10:16 A secure e-mail voting scheme with trusted authorities for one
          occasion
          Jozsef Lukovics
          
   10:19 Riffle-shuffle and gray-code as block cipher components
          Jayant Shukla
          
   10:22 A new blind signature scheme
          Pascal Paillier
          
   10:26 Efficient dynamic traitor tracing
          Omer Berkman, Michal Parnas, Jiri Sgall
          
   10:31 On full linear (k, n) traceability schemes
          K. Kurosawa, M. Burmester, Y. Desmedt
          
   10:35 A new measure of cryptanalytic strength
          Bruce Schneier
          
   10:38 Towards a simple distributed undeniable method of achieving
          robustly threshold-untraceable indistinguishability
          Michael Richardson
          
   10:40 END


______________________________________________________________________________
   
   1999 Elections: Candidates
______________________________________________________________________________
       
  Gilles Brassard
       (no statement)
       
  Kwangjo Kim
       Based on my previous experiences as a program co-chair of
       Asiacrypt '96 and program committee member of eleven international
       conferences, I will establish the coming IACR-sponsored Asiacrypt
       to be as prestigious as Crypto and Eurocrypt, and do my best to
       promote and vitalize cryptologic research activities throughout
       the world.
       
  Ueli Maurer
       I will continue to focus on all scientific aspects relevant to
       IACR (conferences, publications, electronic and conventional),
       helping IACR to improve its scientific standing. I will further
       contribute to the promotion of a good relationship between
       academic research and the commercial world.
       
  Bart Preneel
       Having first been a member of the IACR in 1988, I would like to
       continue serving as a Director with the objective of promoting
       research, stimulating young people to enter our fascinating field,
       and balancing the interests of research and applied cryptology.
       See www.esat.kuleuven.ac.be/~preneel for a longer statement.
       
  Jean-Jacques Quisquater
       (no statement)
       
  Serge Vaudenay
       I am willing to serve IACR in order to promote academic research
       in cooperation with industry.

______________________________________________________________________________
   
   IACR Nominations Committee (see www.iacr.org/bod.html for addresses):
   Eli Biham
   Matt Franklin (Chair)
   Peter Landrock (Returning Officer)
   
   Positions for this Election:
        3 Directors January 2000 - December 2002 

   Incumbents:
        Gilles Brassard
        Ueli Maurer
        Bart Preneel
   
   Ballots will be mailed by OCTOBER 1, 1999.
   Ballots must be mailed to be received by the Returning Officer in the
   official envelopes by NOVEMBER 15, 1999.
   
______________________________________________________________________________
   
   IACR Cryptology e-Print Server Announcement
______________________________________________________________________________

  Background
  
   So far IACR's publishing activities included the Journal of Cryptology
   and the Crypto/Eurocrypt conference volumes. The journal represents
   the oldest and most established form of scientific publication;
   conferences and their proceedings have the advantage of faster
   publication. For IACR and cryptology, however, the publication delay
   for a new result can easily be half a year or more. This will soon
   change with the introduction of the IACR cryptology e-print server.
   
   In the recent years, many people have started to publish work on their
   personal webpages, either as a supplement to the conventional methods
   or uniquely publishing work in this way. Other societies have also
   started electronic servers for preprints, the largest of which is the
   Los Alamos ``XXX e-print archive'' (xxx.lanl.gov), started by
   physicists. A small preprint server for cryptology exists since 1996
   (the ``Theory of Cryptology Library'', started by Oded Goldreich,
   currently hosted at UCSD).
   
  The IACR Cryptology e-Print Server
  
   The IACR board of directors has decided at their meeting at Crypto '99
   to set up a preprint server for cryptology. It will be called the IACR
   cryptology e-print server.
   
   ``e-print server'' stands for the new features of papers published
   there: electronically distributed, rapidly published, recent work,
   immediately accessible. However, an e-print server is different from
   other scientific forms of publishing because work is placed there by
   the authors and does undergo almost no refereeing. Work is only
   superficially checked to fall in the areas of interest.
   
   Mihir Bellare at UCSD has kindly volunteered to host the eprint server
   at UCSD. He and Bennett Yee have been hosting the ``Theory of
   Cryptology Library'' at UCSD; the current plan is to integrate this
   library in the new server. We are about to set up the software and it
   is expected that the server is operational later this year. The URL
   will be http://eprint.iacr.org. In any case, check out
   http://www.iacr.org for more information!
   
   Christian Cachin

______________________________________________________________________________
   
   Minutes of the BoD Meeting at Eurocrypt '99
______________________________________________________________________________

Board of Directors Meeting
EuroCrypt '99
Prague
2 May 1999

Preface:

On 20 March 1999, Journal Editor Feigenbaum brought to the attention of the
Board a problem wherein papers accepted for a special issue of the Journal
far
exceeded the normal page count for a single issue.  Following a discussion
by  e-mail, the Board approved the following proposal submitted by
Feigenbaum by a
vote of 10 to 2 with 1 abstention.

I propose that the Board approve the expenditure of $20,000 for an
exceptionally  long "special issue" of the Journal of Cryptology.  This
issue will probably be  one of the four issues of volume 13 (2000), but
there is a chance that it will be  the last issue of volume 12 (1999).  It
will be roughly the size of three normal  issues (perhaps slightly larger).
The rest of the issues in volume 13 (or 12)  will be normal-sized issues.

The subject of the special issue is secure multi-party function evaluation,
and the editorial board member in charge of it is Oded Goldreich.  The
$20,000  covers all production, printing, and mailing costs and will thus
have no effect  on the price that Springer charges subscribers, including
libraries, for J.  Cryptology.
________________________________________________________________________

The Board President called the meeting to order at 10:06am.

Present were Benaloh, Berson, Biham, Cachin, Clark, Franklin, Hruby,
Landrock,  Maurer, McCurley, E. Okamoto, Preneel, Upton, and Van Oorschot.

Proxies were held for Beaver by McCurley, for Feigenbaum by Upton, for T.
Okamoto  by Maurer, and for Vandewalle by Preneel.

It was noted that there would be no report this meeting from Journal Editor
Feigenbaum but a report was promised for the Board meeting in August.

************************************************************************
Minutes of the 23 August 1998 meeting were approved with modifications.
Motion  by Preneel seconded by Berson carried 9 to 0.
************************************************************************
________________________________________________________________________

EuroCrypt '99 General Chair Hruby reported on the conference.  The
conference  budget was within expected bounds.  The budget anticipated 380
attendees.  At  that point, 373 had registered.  [Final registration was
383.]  Data was provided  for 375 registrants (sic) among whom 315 were full
charge (146 early and 169  late) and 60 were student rate (38 early and 22
late).

$23,000 had been advanced by the IACR, of which $10,000 was returned to the
IACR,  $10,000 was used for Program Committee expenses, and $2,400 was used
for booking  the concert.  Clark asked about totals and was told that the
$10,000 returned to  the IACR was borrowed at a rate of approximately 30
Czech Koruna per U.S. Dollar  and returned to the IACR at a rate of
approximately 35 Czech Koruna per U.S.  Dollar but that the conference was
expected to produce s surplus of approximately  $10,000.

Clark praised ITC (local arrangements company) for their promptness and
general  competence at organization.  All agreed with applause.  The quality
of the local  organization precluded any need for a visit from the
Secretariat and thereby  reduced costs.

Upton asked whether the student registration count was typical and was told
that  10% students was the normal count.

McCurley expressed concern about the lack of growth in attendance numbers
over  recent years.
________________________________________________________________________

A EuroCrypt 2000 status report was given by Preneel.

The conference will be held in Bruges, Belgium, 14-18 May 2000.  Joos
Vandewalle  will be the General Chair and Bart Preneel will be the Program
Chair.

Two sheets of information were distributed on planning and budget.  Some
information can be obtained at
http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/ and at
http://www.brugge.be/  and http://www.brugge.be/toerisme/en/meetinge.htm.
[Note the last URL is  corrected from the information sheet.]

The conference sessions will be in a flat lecture room with a 500-person
capacity.  All hotels will be in the old city within walking distance from
the  conference site.  The city has 1500 hotel rooms that generally have no
vacancy in  May. 300 three and four star hotel rooms have already been
booked.  200 two star  hotel and bed & breakfast rooms are in the process of
being booked.  Advanced  payment of first night's hotel will be necessary.

A professional conference organizer is now doing the work for $15 per
participant  and a fixed fee of $3,000 rather than the typical fee of 8% on
hotel bookings.   There are a variety of hotel booking and payment options
for participants.   Landrock suggested that individuals handle their own
booking.  McCurley seconded  this but expressed concern that some
participants might find no hotels available.   Clark suggested that the
Secretariat can co-ordinate booking.  Upton expressed  that the intent was
to have central booking.  Van Oorschot questioned the effect  on the
registration forms.  Upton suggested offloading work to the secretariat
whenever possible.  Landrock suggested budgeting for 400 participants.

Preneel suggested pre-booking Hotel Montanus for Board members and
encouraged all  Board members to stay at this hotel.
________________________________________________________________________

AsiaCrypt Steering Committee Chair E. Okamoto presented details on upcoming
AsiaCrypt conferences.

AsiaCrypt '99 will be in Singapore.  It is not sponsored by the IACR.  Hotel
costs will be approximately $80 per night and registration will be
approximately  $400.

AsiaCrypt 2000 will be held in Kioto Japan, 3-7 Dec 2000.  It is sponsored
by the  IACR, and details will be forthcoming at the Crypto meeting in
August.

AsiaCrypt 2001 is being recommended for Taiwan together with possible
General  Chair and Program Chair recommendations.

McCurley questioned when final decisions could be made for the General Chair
and  Program Chair for AsiaCrypt 2001.  Consensus was that the current
timing should  be continued.
________________________________________________________________________

A report on EuroCrypt 2001 proposals was given by Clark.

There are no active proposals for EuroCrypt 2001.

A planned proposal for Villach, Austria (which was later moved to Vienna
because  of logistic concerns) was withdrawn two days prior to the board
meeting.  It was  conjectured that the organizers were dissatisfied with the
apparent requirement  that the venue be changed from Villach to Vienna.

Clark discussed plans to solicit bids from potential organizers in Italy,
U.K.  (Bath), Greece, Sweden, Norway, U.K. (Scotland), Ireland, Netherlands,
and  Poland.

McCurley suggested that the IACR web site resume the (discontinued)
solicitation  of proposals for EuroCrypt hosts.

Clark promised to vigorously pursue the U.K.-Bath option and expressed
concerns  that the Santa Barbara meeting might be too late to commit to a
site.

McCurley wondered if a permanent conference coordinator position within the
Board  would make sense.

Berson suggested that European Board members take the lead in this regard.

Landrock and Clark agreed to serve as primary Board contacts for proposals.

Clark asked for Board consensus that proposals must be able to accommodate
500  participants and that hotel accommodations should be near the
conference venue.

Berson asked whether Israel is, for these purposes, part of Europe.  The
consensus was that it is.

McCurley urged that the local organizer be a regular member of the crypto
"community".

McCurley asked whether the Board should appoint the Program Chair for
EuroCrypt  independent of the selection of the local venue.

Maurer urged that the Board should select the Program Chair.

Landrock agreed to make a presentation at the Business Meeting to solicit
proposals.

Van Oorschot suggested that the Board consider Program Chair proposals as
part of  any bids but that such proposals not be required and that the same
be true for  AsiaCrypt.  [Clarification:  We should make it clear that
submitters of bids are  expected to honor their commitment even if their
recommendation for Program Chair  is rejected.]

It was requested that an announcement be made to all EuroCrypt participants
that  the Business Meeting would immediately follow the final technical talk
on  Wednesday.

McCurley suggested that discussion of Program Chairs be held at the Santa
Barbara  Board meeting.
________________________________________________________________________

Preneel initiated a discussion about the relationship between the Fast
Software  Encryption Workshop (FSE) and the IACR.  He asked that the IACR
hold copyrights  for FSE publications and asked whether FSE might enjoy the
same relationship with  the IACR that used to be enjoyed by AsiaCrypt.

McCurley asked to what extent the IACR should affiliate with other
conferences  and with how many other conferences.  He also asked about the
intellectual  content responsibility for copyrights owned by the IACR.

Berson observed that copyright ownership does not imply endorsement of
content.

Landrock suggested that the IACR support FSE and that other conferences be
considered on a case-by-case basis.

McCurley told of meeting with Springer-Verlag regarding the contract for the
Journal but that no contract yet exists for IACR proceedings.  He said that
the  IACR owns copyrights for EuroCrypt '99 papers and that Springer-Verlag
would have  exclusive publication rights for the first three years and
non-exclusive rights  thereafter.

Biham noted that the current copyright agreements do not mention journal
publication of related results.

McCurley expressed a dislike for "duplicate" publication.

Biham suggested that the IACR not enforce its copyright against journals.

Benaloh asked whether the IACR should pledge to not enforce copyrights
against  journals.

Cachin urged that no such pledge be included within the copyright form.

Biham asked how much a publication must be changed to constitute a new work.

Clark expressed a preference to not make any explicit licensing policy and
suggested that licensing is the correct alternative to copyright
re-assignment.

Berson voiced the intent of IACR to be a benevolent copyright holder.

************************************************************************
The proposal that IACR be willing to become the copyright holder for FSE
publications was made by Preneel and seconded by Maurer.  It carried 15 to
0.
************************************************************************
________________________________________________________________________

Berson asked that IACR strategic planning include the long-term
relationships  between the IACR and other conferences.

McCurley disapproved of the IACR taking direct responsibilities for other
conferences asserting that the purpose of the IACR is to support the
scientific  activities of its members by maintaining the current
conferences, journal, and  newsletter.

Clark offered that strategic planning is beyond this kind of operational
planning  and should include long-term goals and directions of the IACR.

Berson suggested considering the formation of an organizing committee and
seeking  better used of technologies such as conference calling to
facilitate Board  discussions.

McCurley expressed the opinion that the Board has dealt effectively with
these  matters in the past with the current structure.
________________________________________________________________________

At this point the meeting recessed for lunch.
________________________________________________________________________

During and after lunch, various strategic items and topics of interest to
individual members were discussed, and new Board members were asked to tell
what  issues were most important to them.

McCurley stated his view of IACR's mission was to make sure that conferences
run  smoothly and to maintain scientific integrity.  He also indicated his
strong  interest in moving towards electronic publishing.

Cachin expressed an interest in having an electronic preprint server for
cryptographic publications.

McCurley voiced potential problems with copyrights of materials on a
preprint  server and questioned who would manage it.  He also questioned the
utility of  having yet another place to search for papers.

Cachin expressed an opinion that administration would be minimal but
acknowledged  possible complications with respect to anonymous submissions
and copyrights.

Maurer asked how we can best support the field.

Benaloh asked whether we should accept more papers and noted that the
original  purpose of anonymity was to avoid favoritism.

Clark suggested a triage of papers into three categories:  archival papers,
recent papers (about one year old), and late-breaking papers, and he
suggested  that different mechanisms might be best suited for each category.

Maurer suggested considering bifurcating crypto into a Theoretical
Cryptography  conference and applied conferences.

Preneel expressed a preference against this kind of specialization.

McCurley asked that there be a concrete proposal on a preprint server.

Cachin recounted many of the disparate issues that this touches upon.
________________________________________________________________________

A discussion then followed on the topic of anonymous submissions.

McCurley noted that in a recent Business meeting, the membership voted to
maintain the anonymous submission policy.

Preneel said that a recent poll among Program Committee members was nearly
evenly  divided on the issue.

Biham asked what obligations the authors had to not announce their results
during  the Program Committee review process.

After discussion of some extreme examples (such as e-mailing an unsolicited,
non-anonymous copy of a submission to all Program Committee members),
Preneel  suggested a "push versus pull" distinction wherein authors should
feel free to  post copies of their work on web pages, preprint servers, and
the like but should  not mail out unsolicited copies to Committee members.

Upton urged that we make clear that we don't discourage non-anonymous
distribution of submissions.

Berson suggested that anonymous submissions may no longer be practical.

Clark offered a proposal that we clarify the Program Committee guidelines to
specify that we do not discourage distribution and re-visit the issue of
anonymous submissions at the next EuroCrypt Board meeting.

McCurley expressed concerns about changing the policy back and forth and
agreed  to put the topic on the agenda for the Santa Barbara Board meeting.
________________________________________________________________________

Biham then raised the issue of creating a server for making technical
reports  available for fast distribution.

McCurley asserted that Springer-Verlag would object to this.

Cachin expressed the opinion that such a server would be helpful to the
research  community.
________________________________________________________________________

Franklin listed important issues to him as maintaining IACR excellence,
abolishing anonymous submissions, and observing the experiences of other
institutions with regard to electronic publishing and distribution with an
eye  towards updating IACR policies.

Hruby offered that a publications server would facilitate updates to
publications.
________________________________________________________________________

Benaloh listed maintenance of IACR excellence as his paramount issue and
expressed some concerns over the Board's recent decision-making processes.

Clark suggested that the decision-making processes need refinement and that
e-mail is often the wrong medium.

________________________________________________________________________

McCurley suggested that the Board form a sub-committee to look more
carefully at  publishing issues.

A sub-committee was formed consisting of McCurley, Biham, Cachin, and
(pending  her consent) Feigenbaum and charged with delivering a report at
the Santa Barbara  Board meeting.
________________________________________________________________________

Preneel then raised the issue of awards and honors.  He said that he had
found no  consensus on whether to establish best paper awards and urged that
we should  establish clear mechanisms for inviting IACR Distinguished
Lectures.

Maurer asked whether the Board should decide on Distinguished Lecturers.

Preneel asserted that clear and regular procedures are paramount.

Van Oorschot said that we need to know what procedures, if any, exist.

Maurer suggested that Preneel should prepare a formal proposal for the Santa
Barbara Board meeting.

Benaloh expressed the opinion that only the Board should award Distinguished
Lecture awards.  This was confirmed as the consensus of the Board, and
Maurer  agreed to include this conclusion in the Program Chair guidelines.

McCurley suggested that we have an IACR Distinguished Lecture at AsiaCrypt
2000  as part of the first IACR sponsored AsiaCrypt.

************************************************************************
A proposal was offered by Preneel and seconded by Berson that candidates for
IACR  Distinguished Lecturer be nominated and submitted to the IACR
president by August  1 of each year and that the Board may make a selection
from among those  nominated.  The proposal carried 15 to 0.
************************************************************************
________________________________________________________________________

McCurley then raised the issue of IACR elections.

Clark suggested that the Secretariat can and should handle the distribution
and  collection of election ballots.

Landrock, Biham, and Franklin agreed to serve on the election committee.

Benaloh asked whether is was necessary to vote on the By-Laws again to
correct  problems introduced by printing errors in last year's amendments.
The consensus  of the Board was that another vote was unnecessary.

Preneel asked that the By-Laws be maintained in ASCII format.
________________________________________________________________________

McCurley then raised the issue of how to best use and oversee the job of
IACR  Membership Secretary.

Clark volunteered to serve as liaison to co-ordinate Board issues with the
Membership Secretary.

Upton expressed the view that we need closer contact with the Membership
Secretary and suggested that the Membership Secretary either be a member of
the  Board or be directly overseen by a single member of the Board.

Clark commented that Y2K compliance was going well but that updated versions
of  Access software would be necessary to achieve compliance.

Benaloh offered to obtain and deliver copies of Access 2000 to Clark,
Preneel,  and the Membership Secretary.
________________________________________________________________________

Upton then presented a financial report stating that both the EuroCrypt and
Crypto conferences returned surpluses of between $10,000 and $20,000 in
1998,  that total IACR reserves were now in excess of $200,000, and that
1998 tax filing  was underway.  Upton stated that he did not anticipate
recommending an increase  in IACR member dues.

McCurley asked that a more detailed report of IACR finances be published in
the  Newsletter.
________________________________________________________________________

Cachin then reported on the Newsletter.

McCurley noted that Cachin had assumed administration of the IACR Web Site.
Congratulations were given by all.

Cachin reported that the Newsletter has been moved to the Web Site and
solicited  conference reports for the Newsletter.

Clark asked how many paper copies of the Newsletter were being distributed.

Cachin answered that anyone who wishes may ask the Membership Secretary to
print  and mail a copy of the Newsletter.

Clark expressed the opinion that the Membership Secretary has provided good
service to the IACR and noted the importance of members keeping their
addresses  current with the Membership Secretary.

Hruby stated that 10% of this year's EuroCrypt announcements were returned
by the  postal service as undeliverable.

McCurley offered thanks to Cachin for his efforts.  Applause was given by
all.

McCurley offered thanks to Upton for his efforts.  Applause was given by
all.
________________________________________________________________________

Since Beaver was absent, no report on Crypto '99 was presented.

Cachin noted that no Call For Participation had yet been distributed for
Crypto  '99.

[Beaver subsequently said that he was following the usual schedule by not
sending  out registration materials too early.]
________________________________________________________________________

Franklin reported that Crypto 2000 planning was proceeding uneventfully.
________________________________________________________________________

McCurley suggested that there be an integrated discussion at the Santa
Barbara  Board meeting to decide on Program Chair lists and other issues for
EuroCrypt,  Crypto, and AsiaCrypt in 2001.
________________________________________________________________________

McCurley then gave an update on the status of the CD-ROM of past Crypto and
EuroCrypt proceedings.  He said that after much work, the CD-ROM was
complete and  had been delivered to Springer-Verlag for reproduction and
distribution and that  copies would be available for sale during this
conference.  He said that  Springer-Verlag had agreed to send out two copies
to everyone who had ordered one  in recompense for the production delays.

Clark noted that the address labels had become out of date and urged that
updates  be sent to iacrmem@iacr.org by May 12 to ensure that the CD-ROMs
are sent to  current addresses.

Clark also noted the outstanding, "super-human" work done by McCurley on the
CD-ROM.  Applause was given by all.

Clark also asked that Springer-Verlag be urged to make the CD-ROM available
to  IACR members at the original IACR discounted price.

In addition, Clark noted that CD-ROM sales through Amazon.com obtained via
an  IACR link could be eligible for a 5-15% kickback to IACR.  He also
suggested that  one of the copies available for sale be held for a quality
control check.

[Note:  It was subsequently discovered that there were problems with the
CD-ROMs  on some platforms, and correction before distribution was
anticipated.  Also  Clark obtained a commitment from Springer-Verlag to
offer the CD-ROMs for sale at  a discounted price.]

************************************************************************
A proposal was offered by Van Oorschot and seconded  by Upton that decisions
made  by e-mail should be included in the following Board meeting minutes.
The  proposal carried 15 to 0.
************************************************************************
________________________________________________________________________

A brief discussion then followed about items to be included in the Business
meeting.
Berson asked that attendees be reminded that they are, unless they've
specifically asked not to be, IACR members.

McCurley stated that he would remind members of the general IACR functions,
announce upcoming conferences and meetings, update members on the CD-ROM and
the  May 12 deadline for updating addresses, remind members of the
Newsletter  submission deadline of May 31, report that both IACR sponsored
conferences  produced surpluses during the prior year, and tell new members
how they could  receive membership for the 1999 calendar year.
________________________________________________________________________

Action items noted by McCurley included EuroCrypt 2001 site selection,
upcoming  IACR elections, and distribution of the CD-ROM.
________________________________________________________________________

McCurley then moved to adjourn.  The motion was seconded by Clark and
carried  unanimously at 4:49pm.

Respectfully submitted
Josh Benaloh
IACR Secretary


______________________________________________________________________________
   
   Announcements
______________________________________________________________________________


SIGINT in Europe During the Cold War
===========================================================================

More and more students of the Cold War begin to realize that the
intelligence communities played an important role during the Cold War. In
recent years in particular the importance of Signals Intelligence (SIGINT)
has been stressed and especially the capabilities and possibilities of
reading and deciphering diplomatic, military, commercial and other
Communications of other nations.

This growing awareness of the importance of intelligence applies not only
to the activities of the big services but also to those of the smaller
nations like for example the Netherlands. For this exact reason a couple of
years ago the Netherlands Intelligence Studies Association (NISA) was
established in which academics and (former and still active) members of the
Netherlands intelligence community work together in order to promote
research into the history of Dutch intelligence communities. This growing
interest had led in Holland to publications dealing with the history of the
Dutch internal security service (1995), the Dutch Navy Intelligence (1997)
and the Netherlands foreign intelligence service (November 1998).

As honorary secretary of the NISA it is my pleasure to announce that the
NISA will host an international conference dealing with

THE IMPORTANCE OF SIGINT IN WESTERN EUROPE IN THE COLD WAR

This conference with a particular emphasis on Sigint and the Northwestern
European nations will take place on Saturday November 27 in Amsterdam.

The line up of the program is as follows:
                

SPEAKERS:

09.45:  Opening of the Conference and Welcome to the
                speakers and participants

10.00:  Matthew Aid (United States, historian)
                Introduction on the importance of SIGINT in the Cold War

10.45:  coffee

11.00:  Richard Aldrich (United Kingdom, University of Nottingham)
                GCHQ and Sigint in the Cold War

11.45:          Erich Schmidt-Eenboom (Germany, Forschungsinstitut fur
Friendenspolitik)
                The BND, German Military Forces and Sigint in the Cold War

12.30:  lunch

13.30:          Alf Jacobsen (Norway, NRK)
                Scandinavia, Sigint and the Cold War

14.15:          Cees Wiebes (Netherlands, NISA)
                The history of the WKC (Dutch NSA/GCHQ)

15.00:  Tea

15.30:          Wies Platje (Netherlands, NISA)
                Dutch Sigint and the conflict with Indonesia, 1950 - 62

16.15:          Round Table discussion
                The importance of Sigint during the Cold War
                
17.00:  Closing Remarks + Reception

Since the number of seats is strictly limited to 100, you are requested to
submit your registration as soon as possible. Places will be attributed on
a first registered-first served basis. The conference rate is US $ 80
including lunch and drinks at the reception. Please register as quickly as
possible by sending an E-mail or letter to the honorary secretary of the
NISA, Dr. Cees Wiebes, at the following address:

Dr. Cees Wiebes
Honorary secretary NISA
P.O. Box 18 210
1001 ZC Amsterdam
The Netherlands
E-mail: WIEBES@PSCW.UVA.NL




DIMACS Workshop on the Management of Digital IP
===========================================================================


          DIMACS  Workshop on the Management of Digital IP

            April 17-18, 2000, Rutgers, New Jersey, USA

                         CALL FOR PARTICIPATION

Critical to the development of e-commerce is the management of digital
intellectual property (IP).  Technology has challenged the status quo of
IP management in many ways.  Widespread use of personal computers and
Internet communication creates vast opportunities for producers, distributors,
and consumers of digital works of all forms, but it also threatens to render
copying and modification of these works completely uncontrollable.  DIMACS
will sponsor a two-day series of technical talks and "position statements"
on the design, development, and deployment of IP-management technology that
strikes the right balance between the need to control copying and modification
and the desire to foster innovative uses of digital works that have been
enabled by computing and communication advances.

Speakers are encouraged to address all technical, legal, and business aspects
of digital IP management.  Companies offering relevant products and services
are encouraged to participate and to submit abstracts or papers outlining
their approach.

Topics appropriate for this workshop include, but are not limited to:

    * Intellectual property protection.
    * Anti piracy techniques.
    * Legal issues in the protection of digital rights.
    * New business models for managing digital rights.
    * Passive content protection, e.g. watermarking, tracing traitors.
    * Active content protection, e.g. software tamper resistance.
    * Hardware solutions to content protection.


WORKSHOP URL:    http://crypto.stanford.edu/DIMACS/


                        INSTRUCTIONS FOR AUTHORS

Authors are strongly encouraged to send their submission electronically.
Authors unable to submit electronically are invited to send a cover letter
and 4 copies of a submission (double-sided copies preferred) to the
postal address below. Submissions must be received on or before
January 17, 2000 (or postmarked by January 5, 2000, and sent via airmail
or courier). The cover letter should contain the submission's title and
the names and affiliations of the authors and should identify the contact
author including e-mail and postal addresses.

Authors are invited to submit a one-page abstract or a full-length
paper or position statement.

(1) Abstract submissions should contain a title, list of authors, and
    an abstract describing the proposed talk.  The abstract should
    indicate whether the authors intend to submit a full-length paper
    in case the abstract is accepted.

(2) Full-length submissions should begin with a title, list of authors, and
    a short abstract.  The introduction should summarize the
    contributions of the work at a level appropriate for a
    non-specialist reader. The submission should be at most 12 pages
    excluding the bibliography and clearly marked appendices,
    using at least 11-point font and reasonable margins. The organizers do
    not guarantee that they will read appendices; so submissions should be
    intelligible without them.

Notification of acceptance or rejection will be sent to authors by
February 14, 2000.


                          CONFERENCE PROCEEDINGS

We will decide whether to publish a proceedings for the workshop based on
the number of full-length submissions.  If the number and quality of
full-length submissions are sufficient, proceedings will be published
by the American Mathematical Society as a volume in the DIMACS series.

CONFIRMED SPEAKERS:
(1) Paul Kocher, Cryptography Research.
(2) Stuart Haber, InterTrust.
(3) Narayanan Shivakumar, Univ. Washington
(4) Jon Callas, Kroll-O'Gara

DATES:
        SUBMISSION: January 17, 2000
        ACCEPTANCE: February 14, 2000
        Pre-PROCEEDINGS VERSION: March 24, 2000

ORGANIZING COMMITTEE:
        Dan Boneh, Stanford University, USA
        Joan Feigenbaum, AT&T Labs -- Research
        Ramarathnam Venkatesan, Microsoft Research

ADDRESS FOR ELECTRONIC SUBMISSIONS:
        dabo@cs.stanford.edu

ADDRESS FOR NON-ELECTRONIC SUBMISSIONS:
        Dan Boneh, DIMACS workshop,
        Gates 475,
        Stanford, CA, 94304-9045
        U.S.A
        Phone: (1) 650-725-3897    Fax:   (1) 650-725-4671
        E-mail: dabo@cs.stanford.edu

STIPENDS: A limited number of stipends are available to those unable
to obtain funding to attend the workshop.  Students giving talks
at the workshop are encouraged to apply if such assistance is
needed. Requests for stipends should be addressed to Joan Feigenbaum
at jf@research.att.com or 973 360-8442.



New Reports in the Theory of Cryptography Library
===========================================================================

   The library is currently located at http://philby.ucsd.edu/cryptolib/.
   
LIST OF NEW PAPERS (June 15 -- October 1st, 1999)

99-14: I. Damgard, Concurrent Zero-Knowledge is Easy in Practice , June
       1999. Revised July 1999.

99-15: O. Goldreich, S. Goldwasser and S. Micali, Interleaved Zero-Knowledge
       in the Public-Key Model , June 1999. Revised July 1999.

99-16: M. Bellare and S. Miner, A forward-secure digital signature scheme,
       July 1999.

99-17: V. Shoup, A composition theorem for universal one-way hash functions,
       July 1999.

99-18: M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence
       between Two Notions, and an Indistinguishability-Based Characterization,
       July 1999.

99-19: J. Hastad and M. Naslund, Security of all RSA and Discrete Log Bits,
       August 1999.

99-20: S. Micali and L. Reyzin, Improving the Exact Security of Digital
       Signature Schemes, August 1999.

99-21: M. Boyarsky, Public-Key Cryptography and Password Protocols: The
       Multi-User Case, September 1999.


______________________________________________________________________________
   
   New Books
______________________________________________________________________________

   This page lists new books about cryptology. We are looking for
   reviewers!
   
Elliptic Curves in Cryptography

   Ian F. Blake, Gadiel Seroussi, and Nigel P. Smart
   Hewlett-Packard Laboratories Palo Alto, California and Bristol, U.K.
   Cambridge University Press, Cambridge, 1999
   ISBN: 0521653746
   
   Description In the past few years elliptic curve cryptography has
   moved from a fringe activity to a major challenger to the dominant
   RSA/DSA systems. Elliptic curves offer major advances on older systems
   such as increased speed, less memory and smaller key sizes. As digital
   signatures become more and more important in the commercial world the
   use of elliptic curve-based signatures will become all pervasive. This
   book summarizes knowledge built up within Hewlett-Packard over a
   number of years, and explains the mathematics behind practical
   implementations of elliptic curve systems. Due to the advanced nature
   of the mathematics there is a high barrier to entry for individuals
   and companies to this technology. Hence this book will be invaluable
   not only to mathematicians wanting to see how pure mathematics can be
   applied but also to engineers and computer scientists wishing (or
   needing) to actually implement such systems.
   
   For more information, see
   http://www.hpl.hp.com/research/itc/csl/vcd/infotheory/ellipbook.htm

   _________________________________________________________________
   
Elliptic Curves and Their Applications to Cryptography: An Introduction

   Andreas Enge
   Institut fuer Mathematik, Universitaet Augsburg, Germany
   
   Kluwer Academic Publishers, Boston
   Hardbound, ISBN 0-7923-8589-6
   August 1999, 184 pp.
   NLG 235.00 / USD 115.00 / GBP 74.75
   
   Since their invention in the late seventies, public key cryptosystems
   have become an indispensable asset in establishing private and secure
   electronic communication, and this need, given the tremendous growth
   of the Internet, is likely to continue growing. Elliptic curve
   cryptosystems represent the state of the art for such systems.
   
   "Elliptic Curves and Their Applications to Cryptography: An
   Introduction" provides a comprehensive and self-contained introduction
   to elliptic curves and how they are employed to secure public key
   cryptosystems. Even though the elegant mathematical theory underlying
   these cryptosystems is considerably more involved than for other
   systems, this text requires the reader to have only an elementary
   knowledge of basic algebra. The text nevertheless leads to problems at
   the forefront of current research, featuring chapters on point
   counting algorithms and security issues. The adopted unifying approach
   treats with equal care elliptic curves over fields of even
   characteristic, which are especially suited for hardware
   implementations, and curves over fields of odd characteristic, which
   have traditionally received more attention.
   
   "Elliptic Curves and Their Applications: An Introduction" has been
   used successfully for teaching advanced undergraduate courses. It will
   be of greatest interest to mathematicians, computer scientists, and
   engineers who are curious about elliptic curve cryptography in
   practice, without losing the beauty of the underlying mathematics.
   
   For more information, see  http://www.wkap.nl/book.htm/0-7923-8589-6.

   _________________________________________________________________
   
Crypto-related Books from Springer

   Springer Verlag maintains a list of books in cryptology at
   [3]http://www.springer.de/comp/lncs/crypto.html. As Springer is not
   unknown to IACR members, it may be worthwile to check the site
   occasionally.

   _________________________________________________________________
   
   Please send your new book announcements to the newsletter editor at
   newsletter at iacr.org

______________________________________________________________________________
  
   Open Position
______________________________________________________________________________
                                       
   A major consumer electronics research laboratory in New York State
   asks that we seek for regular employment a person with formal training
   in cryptography, preferably with some course work in cryptanalysis.
   Current work focuses on conditional access and copy protection for
   network digital interfaces and for audio.
   
   Requirement - PhD, or Masters with several years relavent experience.
   Newly graduating doctorates will be considered.
   
   A second opening exists for someone with the same general background
   who may be completing a masters degree. Any work experience will be
   helpful.
   
   U.S. residence is not a requirement for either position.
   
   Interested persons may contact Sid Lasky by email at
   lasky2@airmail.net, telephone 214-826-8450, or fax 214-823-1628.

______________________________________________________________________________
   
   IACR Calender of Events in Cryptology
______________________________________________________________________________
                                       
   The IACR calendar lists events (conferences, workshops, ...) that may
   be of interest to IACR members or deal with research in cryptology.
   
   If you want to have an event listed here, please send email to
   webmaster(at)iacr.org .
   
  1999
  
     * [1]FOCS '99, October 17-19, 1999, New York City, NY.
     * [2]3rd Workshop on Elliptic Curve Cryptography (ECC '99), November
       1-3, 1999, University of Waterloo, Waterloo, Canada.
     * [3]6th ACM Conference on Computer and Communications Security (ACM
       CCS '99), November 1-4, 1999, Singapore.
     * [4]Midwest Arithmetical Geometry in Cryptography (MAGC), November
       5-7, 1999, University of Illinois at Urbana-Champaign, USA.
     * [5]Information Security Workshop (ISW '99), November 6-7, 1999,
       Kuala Lumpur, Malaysia.
     * [6]ICICS '99, 2nd International Conference on Information and
       Communication Security, November 9-11, 1999, Sydney, Australia.
     * [7]Asiacrypt '99, November 15-18, 1999, Singapore.
     * [8]CQRE [Secure], November 30-December 2, 1999, Duesseldorf,
       Germany.
     * [9]ICISC'99, The 2nd International Conference on Information
       Security and Cryptology, December 9-10, 1999, Korea University ,
       Seoul, Korea
     * [10]Seventh IMA International Conference on Cryptography and
       Coding, December 20-22, 1999, Royal Agricultural College,
       Cirencester, UK.
       
  2000
  
     * [11]RSA Conference 2000, January 16-20, San Jose Convention
       Center, San Jose, USA.
     * [12]PKC2000, International Workshop on Practice and Theory in
       Public Key Cryptography, January 18-20, 2000, Melbourne, Australia
     * [13]Financial Cryptography '00, February 21-24, 2000, Anguilla,
       BWI.
     * [14]Network and Distributed Systems Security Symposium (NDSS
       2000), February 2-4, 2000, San Diego, California, USA.
     * [15]RSA Conference 2000 Europe, April 10-13, Hilton Munchen Park,
       Munich, Germany.
     * [16]Fast Software Encryption Workshop (FSE2000), April 10-12,
       2000, New York, USA.
     * [17]Third AES Candidate Conference (AES3), April 13-14, 2000, New
       York, USA.
     * [18]DIMACS Workshop on the Management of Digital IP, April 17-18,
       2000, Rutgers, New Jersey, USA.
     * [19]Eurocrypt 2000, May 14-18, Bruges/Brugge, Belgium.
     * [20]IEEE Symposium on Security and Privacy, May 14-17, 2000,
       Oakland, California, USA.
     * [21]Fifth Australasian Conference on Information Security and
       Privacy, July 10-12, 2000, Brisbane, Australia
     * [22]PODC 2000, 19th Symposium on Principles of Distributed
       Computing, July 16-19, 2000, Portland, Oregon, USA.
     * [23]9th USENIX Security Symposium, August 14-17, 2000, Denver, CO,
       USA.
     * Crypto 2000, August 20-24, 2000, Santa Barbara, California, USA.
     * [24]Asiacrypt 2000, December 3-7, Kyoto, Japan.
       
  2001
  
     * Eurocrypt 2001, (tentatively: May 6-10), 2001, Innsbruck, Austria.
     * Crypto 2001, (tentatively: August 19-23), 2001, Santa Barbara,
       California, USA.
       

References

   1. http://www.cs.washington.edu/FOCS99/
   2. http://www.cacr.math.uwaterloo.ca/conferences/1999/ecc99/
        ecc99-announce.html
   3. http://www.isi.edu/ccs99/
   4. http://www.math.uiuc.edu/~boston/magc.html
   5. http://www.musm.edu.my/BusIT/isw99/
   6. http://www.cit.nepean.uws.edu.au/icics99/
   7. http://www.comp.nus.edu.sg/~asia99
   8. http://www.secunet.de/forum/cqre.html
   9. http://onyx.yonsei.ac.kr/icisc99/
  10. http://www.ima.org.uk/mathematics/conferences.htm
  11. http://www.rsasecurity.com/rsa2000
  12. http://www.pscit.monash.edu.au/pkc2k/
  13. http://fc00.ai/
  14. http://www.isoc.org/ndss2000/
  15. http://www.rsasecurity.com/rsa2000/europe
  16. http://www.counterpane.com/fse.html
  17. http://csrc.nist.gov/encryption/aes/round2/conf3/aes3conf.htm
  18. http://www.iacr.org/events/pages/dimacs.html
  19. http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/
  20. http://www.bell-labs.com/user/reiter/sp2000/
  21. http://www.isrc.qut.edu.au/acisp2K/
  22. http://www.podc.org/podc2000/
  23. http://www.usenix.org/events/sec00/
  24. http://www.ee.kagu.sut.ac.jp/www/staff/hangai/ac2000/

______________________________________________________________________________
   
   IACR Contact Information
______________________________________________________________________________

Officers and Directors of the IACR (1999)

Officers and directors of the IACR are elected for three year terms. If you
are a member and wish to contact IACR regarding an address change or similar
matter, you should contact the membership services at [iacrmem(at)iacr.org].
See http://www.iacr.org/iacrmem/ for more information.

                                     Officers

  Kevin S. McCurley                       Andrew J. Clark
  President                               Vice President
  6721 Tannahill Drive                    P.O. Box 743
  San Jose, CA 95120                      Brighton
  USA                                     East Sussex
  Phone: (408) 927-1838                   BN1 5HS
  Email: [president(at)iacr.org]          United Kingdom
                                          Phone: +44 1273 270752
                                          Fax: +44 1273 276558
                                          Email: [vicepresident(at)iacr.org]

  Josh Benaloh                            Jimmy Upton
  Secretary                               Treasurer
  Microsoft Research                      Certicom
  One Microsoft Way                       25801 Industrial Blvd
  Redmond, WA 98052                       Hayward, CA 94545
  USA                                     USA
  Phone: (425) 703-3871                   Phone: (510)780-5440
  Fax: (425) 936-7329                     Fax: (510)780-5401
  Email: [secretary(at)iacr.org]          Email: [treasurer(at)iacr.org]

                                     Directors

  Don Beaver                              Thomas Berson
  Crypto '99 General Chair                Anagram Labs
  Certco Inc.                             P.O. Box 791
  55 Broad Street, 22nd Floor             Palo Alto CA, 94301
  New York, NY 10004                      USA
  USA                                     Phone: (415) 324-0100
  Phone: (212) 709-8900                   Email: [berson(at)anagram.com]
  Fax: (212) 709-6754
  Email: crypto99(at)iacr.org

  Eli Biham                               Gilles Brassard
  Computer Science Department             Departement IRO
  Technion                                Universite de Montreal
  Haifa 32000                             C.P. 6128, succursale centre-ville
  Israel                                  Montreal, Quebec H3C 3J7
  Email: [biham(at)cs.technion.ac.il]     Canada
  Voice: +972-4-8294308                   Email: [brassard(at)iro.umontreal.ca]
  Fax: +972-4-8221128

  Christian Cachin                        Whitfield Diffie
  IACR Newsletter Editor                  Sun Microsystems, MPK15-214
  IBM Zurich Research Laboratory          901 San Antonio Road
  Saumerstrasse 4                         Palo Alto, California 94303
  CH-8803 Ruschlikon                      phone: +1 650-786-6359
  Switzerland                             fax: +1 650-786-6445
  Email: [cachin(at)acm.org]              Email:
  Phone: +41-1-724-8989                   [whitfield.diffie(at)eng.sun.com]
  Fax: +41-1-724-8953

  Joan Feigenbaum                         Matt Franklin
  Editor-in-Chief, Journal of Cryptology  Crypto '2000 General Chair
  AT&T Labs Research                      Xerox PARC
  Room C203                               3333 Coyote Hill Road
  180 Park Avenue                         Palo Alto, CA 94304
  Florham Park, NJ 07932-0971             (W) 650-812-4228
  USA                                     (fax) 650-812-4471
  Email: [jf(at)research.att.com]         Email: crypto2000(at)iacr.org
  [jofc(at)iacr.org]
  Phone: +1 973 360-8442
  Fax: +1 973 360-8178

  Jaroslav Hruby                          Peter Landrock
  Eurocrypt '99 General Chair             Mathematics Institute
  GCUCMP Praha                            Aarhus University
  PO Box 21/OST                           Ny Munkegade
  170 34 Prague 7                         8000 Aarhus C
  Czech Republic                          Denmark
  Email: [eurocrypt99(at)iacr.org]        Email:
  Phone: 420 2 6143 5524                  [landrock(at)cryptomathic.aau.dk]
  Fax: 420 2 324450

  Tsutomu Matsumoto                       Ueli Maurer
  Div. of Electrical and Computer Eng.    Department of Computer Science
  Yokohama National University            ETH Zurich
  156 Tokiwadai, Hodogaya-ku              CH-8092 Zurich
  Yokohama, 240, Japan                    Switzerland
  Tel: +81-45-335-1451 (Ext. 2898, 2904)  Email: [maurer(at)inf.ethz.ch]
  Fax: +81-45-338-1157
  Email: tsutomu(at)mlab.dnj.ynu.ac.jp    Tel-1: +41-1-632 7420
                                          Tel-2: +41-1-632 7371
                                          Fax : ++41-1-632 1172

  Bart Preneel                            Tatsuaki Okamoto
  Department of Electrical Engineering    NTT Labs
  Katholieke Universiteit Leuven          1-1 Kikarinooka
  Kardinaal Mercierlaan 94                Yokosuka-Shi 239
  B-3001 Heverlee                         Japan
  Belgium                                 USA
  Email:                                  Phone: 81-468-59-2511
  [bart.preneel(at)esat.kuleuven.ac.be]   Fax: 91-468-59-3858
  Phone: +32 16 32 11 48                  Email: [okamoto(at)sucaba.isl.ntt.jp]
  Fax: +32 16 32 19 86

  Paul C. Van Oorschot                    Joos Vandewalle
  Entrust Technologies                    Eurocrypt '2000 General Chair
  750 Heron Road, Suite E08               Electrical Engineering Department
  Ottawa, Ontario                         (ESAT)
  K1V 1A7                                 Katholieke Universiteit Leuven
  Canada                                  Kard. Mercierlaan 94
  Email: [paulv(at)entrust.com]           B-3001 Heverlee
                                          Belgium
                                          Fax: 32/16/32.19.70
                                          Phone: 32/16/32.10.52
                                          email :
                                          Joos.Vandewalle(at)esat.kuleuven.ac.be


______________________________________________________________________________

   About the IACR Newsletter
______________________________________________________________________________
                                       
   The IACR Newsletter is published three times a year and only available
   electronically. It is sent to IACR members by email (as a flat ASCII
   text) and published on the web at
   
     http://www.iacr.org/newsletter/
     
   If you are a member of IACR and wish to receive the newsletter, you
   need to make sure that we know your email address! To update your
   email address in the IACR member database, please contact the
   membership services at 
     iacrmem(at)iacr.org
   
   Contributions, announcements, book announcements or reviews, calls for
   papers ... are most welcome! Please include a URL and/or e-mail
   addresses for any item submitted (if possible). For calls for papers,
   please submit a one page ASCII version. Send your contributions to
     newsletter(at)iacr.org

   Deadline for submissions to the next newsletter issue is January 31,
   2000. However, many items will be posted on the website as soon as
   possible.

   The IACR Newsletter is copyright (c) 1999, International Association
   for Cryptologic Research. 

______________________________________________________________________________

End of IACR Newsletter, Vol. 16, no. 3, Fall 1999.
______________________________________________________________________________