______________________________________________________________________________
______________________________________________________________________________
   

   IACR Newsletter
                                       
   Vol. 19, No. 1, Winter 2002.

   Published by the International Association for Cryptologic Research
   Christian Cachin, Editor

______________________________________________________________________________
______________________________________________________________________________

   http://www.iacr.org/newsletter/

______________________________________________________________________________

   Contents
______________________________________________________________________________
   
     * Editorial
     * IACR 2001 election results
     * Ueli Maurer appointed Editor-in-Chief, Journal of Cryptology
     * Eurocrypt 2002 program
     * Announcements
       + Computers & Security
     * New reports in the Cryptology ePrint Archive
     * New books
     * Open positions
     * Calender of events in cryptology
     * IACR contact information


______________________________________________________________________________

   Editorial
______________________________________________________________________________

   Welcome to the 11th electronic issue of the IACR Newsletter!

   The IACR Newsletter is scheduled to appear three times per year, every
   four months, with issues in February, June, and October. I usually try
   hard to produce it before the end of the month, but there has been
   some delay last month for which I must apologize. This is the reason
   why the current issue appears in March only ... but perhaps I was just
   waiting for more input from you, readers?!?
   
   Anyway, important events for IACR have been announced on the website
   as usual. This includes also the results of last year's IACR election,
   in which four new officers and three new directors have been elected.
   
   Don't forget to register for Eurocrypt 2002 in Amsterdam, which is
   held April 28-May 2 and approaching fast!
   
   You are welcome to send your contributions to the Newsletter to
   
     newsletter@iacr.org
     
   The next issue of the IACR Newsletter is scheduled for publication in
   June 2002. However, announcements will be posted on the IACR Website
   as soon as possible.
   
   Christian Cachin
   IACR Newsletter Editor
   
   P.S. If you have not received the IACR Newsletter by email and would
   like to receive it in the future, then please make sure that the IACR
   membership directory contains your current email address. A printed
   copy of the membership list is mailed yearly to all members.


______________________________________________________________________________

   IACR 2001 Election Results
______________________________________________________________________________
                                      
   The Election Committee is pleased to report the results of the 2001
   Election. We thank all the candidates, whether they were successful or
   not, for their significant support of IACR. People such as these, who
   are willing to accept an office and to then give generously of their
   time and expertise, are vital to the smooth working of our
   all-volunteer community. We also thank all who voted.
   
   Those elected are:
   
   PRESIDENT Andrew Clark
   VICE-PRESIDENT Bart Preneel
   SECRETARY Josh Benaloh
   TREASURER Susan Langford
   DIRECTOR Eli Biham
   Tsutomu Matsumoto
   Kevin McCurley
   
   Their terms will expire on 31 December 2004.
   
   We declare the above information to be true and correct.
   --Election Committee     --Witnesses
   Tom Berson               Tracie Hlavka
   Yvo Desmedt              Tri V. Le
   Rebecca Wright           Boyko Mirchev

   The detailed results are also available on 
        http://www.iacr.org/elections/2001/details.html

______________________________________________________________________________

   Ueli Maurer appointed Editor-in-Chief of the Journal of Cryptology
______________________________________________________________________________
                                       
   At the last IACR board of directors meeting, Ueli Maurer has been
   appointed the new editor in chief of the Journal of Cryptology. For
   a one-year transition period during the calendar year 2002, he shares
   the position with the past editor-in-chief, Joan Feigenbaum.
   
   We wish Ueli a successful term in his position, with lots of
   high-quality submissions and timely referee reports!

______________________________________________________________________________

   Announcements
______________________________________________________________________________

** Computers & Security - Sample Offer

   Computers & Security is one of the most respected journals in the IT
   security field. Now in its 21st year, with a new Editor-in-Chief - Dr
   Eugene Schultz of Purdue University, each issue includes features on
   specific security topics, refereed papers, a security views section by
   the Academic Editor - Professor E Spafford, abstracts of recent
   literature and more. Recent coverage has included hybrid key escrow
   systems, encryption in cyberspace, novel authentication methods, PKI,
   and legal controls of cryptography systems.
   
   We would like to offer the members of the IACR the opportunity to
   assess the content of the journal for themselves. If you would like to
   obtain a free sample copy of Computers & Security, please contact us,
   and a recent copy will be sent to you immediately.
   
   
    Matthew Smaldon
    Email: m.smaldon@elsevier.co.uk
    Fax: +44 (0) 1865 843971
    
   Please quote Computers & Security in your request.

______________________________________________________________________________

   New Reports in the Cryptology ePrint Archive
______________________________________________________________________________

2002/030 ( PS PS.GZ )
     Adaptive chi-square test and its application to some cryptographic
     problems.
     Boris Ryabko
2002/029 ( PS PS.GZ PDF )
     Efficient Computation Modulo a Shared Secret with Application to the
     Generation of Shared Safe-Prime Products
     Joy Algesheimer and Jan Camenisch and Victor Shoup
2002/028 ( PS PS.GZ PDF )
     A Universal Forgery of Hess's Second ID-based Signature against the
     Known-message Attack
     Jung Hee Cheon
2002/027 ( PS PS.GZ PDF )
     Efficient and Non-Malleable Proofs of Plaintext Knowledge and
     Applications
     Jonathan Katz
2002/026 ( PS PS.GZ )
     Generic Groups, Collision Resistance, and ECDSA
     Daniel R. L. Brown
2002/025 ( PS PS.GZ PDF )
     Making Mix Nets Robust For Electronic Voting By Randomized Partial
     Checking
     Markus Jakobsson and Ari Juels and Ron Rivest
2002/024 ( PS PS.GZ PDF )
     Timed Release of Standard Digital Signatures
     Juan Garay and Markus Jakobsson
2002/023 ( PS PS.GZ PDF )
     Almost Optimal Hash Sequence Traversal
     Don Coppersmith and Markus Jakobsson
2002/022 ( PS PS.GZ PDF )
     From Identification to Signatures via the Fiat-Shamir Transform:
     Minimizing Assumptions for Security and Forward-Security
     Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip
     Namprempre
2002/021 ( PS PS.GZ )
     Spectral Analysis of Boolean Functions under Non-uniformity of
     Arguments
     Kanstantsin Miranovich
2002/020 ( PS PS.GZ PDF )
     Cryptanalysis of stream ciphers with linear masking
     Don Coppersmith and Shai Halevi and Charanjit Jutla
2002/019 ( PS PS.GZ PDF )
     Scream: a software-efficient stream cipher
     Shai Halevi and Don Coppersmith and Charanjit Jutla
2002/018 ( PS PS.GZ )
     An Identity-Based Signature from Gap Diffie-Hellman Groups
     Jae Choon Cha and Jung Hee Cheon
2002/017 ( PS PS.GZ PDF )
     The Cramer-Shoup Strong-RSA Signature Scheme Revisited
     Marc Fischlin
2002/016 ( PDF )
     Content Extraction Signatures
     Ron Steinfeld and Laurence Bull and Yuliang Zheng
2002/015 ( PDF )
     Security proofs of cryptographic protocols
     Eva Jencusova
2002/014 ( PS PS.GZ PDF )
     Better than BiBa: Short One-time Signatures with Fast Signing and
     Verifying
     Leonid Reyzin and Natan Reyzin
2002/013 ( PS PS.GZ PDF )
     Generic Lower Bounds for Root Extraction and Signature Schemes in
     General Groups
     Ivan Damgard and Maciej Koprowski
2002/012 ( PS PS.GZ PDF )
     Exponent Group Signature Schemes and Efficient Identity Based Signature
     Schemes Based on Pairings
     F. Hess
2002/011 ( PS PS.GZ )
     Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length
     Messages
     Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier,
     David Pointcheval and Christophe Tymen
2002/010 ( PS PS.GZ )
     Cut and Paste Attacks with Java
     Serge Lefranc and David Naccache
2002/009 ( PS PS.GZ PDF )
     Tree-based Group Key Agreement
     Yongdae Kim and Adrian Perrig and Gene Tsudik
2002/008 ( PS PS.GZ PDF )
     Efficient Algorithms for Pairing-based Cryptosystems
     Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott
2002/007 ( PS PS.GZ PDF )
     Parallel scalar multiplication on general elliptic curves over
     $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
     Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and
     Jean-Pierre Seifert
2002/006 ( PDF )
     The best and worst of supersingular abelian varieties in cryptology
     Karl Rubin and Alice Silverberg
2002/005 ( PS PS.GZ )
     Cryptanalysis of Stream Cipher COS (2,128) Mode I
     Hongjun Wu and Feng Bao
2002/004 ( PS PS.GZ PDF )
     ID-based Signatures from Pairings on Elliptic Curves
     Kenneth G. Paterson
2002/003 ( PS PS.GZ )
     Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
     Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
2002/002 ( PS PS.GZ PDF )
     Extracting Witnesses from Proofs of Knowledge in the Random Oracle
     Model
     Jens Groth
2002/001 ( PS PS.GZ PDF )
     Fractal Hash Sequence Representation and Traversal
     Markus Jakobsson

  ------------------------------------------------------------------------

2001/113 ( PDF )
     Efficient Revocation of Anonymous Group Membership
     Jan Camenisch and Anna Lysyanskaya
2001/112 ( PS PS.GZ PDF )
     A Proposal for an ISO Standard for Public Key Encryption
     Victor Shoup
2001/111 ( PS PS.GZ )
     An Identity Based Authenticated Key Agreement Protocol Based on the
     Weil Pairing
     N.P. Smart
2001/110 ( PS PS.GZ )
     RSA hybrid encryption schemes
     Louis Granboulan
2001/109 ( PDF )
     New Notions of Soundness and Simultaneous Resettability in the
     Public-Key Model
     Yunlei ZHAO
2001/108 ( PS PS.GZ PDF )
     Design and Analysis of Practical Public-Key Encryption Schemes Secure
     against Adaptive Chosen Ciphertext Attack
     Ronald Cramer and Victor Shoup
2001/107 ( PS PS.GZ PDF )
     Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
     Yehuda Lindell
2001/106 ( PS PS.GZ PDF )
     Cryptanalysis of the COS (2,128) Stream Ciphers
     Steve Babbage
2001/105 ( PS PS.GZ )
     Universal Arguments and their Applications
     Boaz Barak and Oded Goldreich
2001/104 ( PS PS.GZ )
     Concurrent Zero-Knowledge With Timing, Revisited
     Oded Goldreich
2001/103 ( PS PS.GZ PDF )
     Countermeasures against Side-Channel Attacks for Elliptic Curve
     Cryptosystems
     Antonio Bellezza
2001/102 ( PS PS.GZ PDF )
     An Extended Quadratic Frobenius Primality Test with Average Case Error
     Estimates
     Ivan Damg{\aa}rd and Gudmund Frandsen
2001/101 ( PDF )
     Quasi-Efficient Revocation of Group Signatures
     Giuseppe Ateniese and Gene Tsudik
2001/100 ( PS PS.GZ )
     A Short Note on Girault's Self-Certified Model
     Shahrokh Saeednia
2001/099 ( PS PS.GZ )
     Linear Code Implies Public-Key Traitor Tracing
     Kaoru Kurosawa and Takuya Yoshida
2001/098 ( PS PS.GZ PDF )
     Fast hashing onto elliptic curves over fields of characteristic 3
     Paulo S. L. M. Barreto and Hae Yong Kim
2001/097 ( PS PS.GZ )
     An Efficient MAC for Short Messages
     Sarvar Patel
2001/096 ( PS PS.GZ )
     Constructing elliptic curves with a given number of points over a
     finite field
     Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
2001/095 ( PS PS.GZ PDF )
     Secure Vickrey Auctions without Threshold Trust
     Helger Lipmaa and N. Asokan and Valtteri Niemi
2001/094 ( PS PS.GZ )
     Slope packings and coverings, and generic algorithms for the discrete
     logarithm problem
     M. Chateauneuf and A.C.H. Ling and D.R. Stinson
2001/093 ( PS PS.GZ PDF )
     Threshold Cryptosystems Based on Factoring
     Jonathan Katz and Moti Yung
2001/092 ( PS PS.GZ PDF )
     BDD-based Cryptanalysis of Keystream Generators
     Matthias Krause
2001/091 ( PS PS.GZ PDF )
     Perfect Hiding and Perfect Binding Universally Composable Commitment
     Schemes with Constant Expansion Factor
     Ivan Damgård and Jesper B. Nielsen
2001/090 ( PS PS.GZ PDF )
     Identity Based Encryption From the Weil Pairing
     Dan Boneh and Matthew Franklin


______________________________________________________________________________

   New Books
______________________________________________________________________________

   This page lists new books about cryptology, and occasionally reviews
   one.
   
** The Design of Rijndael

   J. Daemen, Proton World International (PWI), Belgium; V. Rijmen,
   Cryptomathic NV, Leuven, Belgium
   
   The Design of Rijndael
   
   AES - The Advanced Encryption Standard
   
   Foreword by Ronald L. Rivest
   
   In October 2000, the US National Institute of Standards and Technology
   selected the block cipher Rijndael as the Advanced Encryption Standard
   (AES). AES is expected to gradually replace the present Data
   Encryption Standard (DES) as the most widely applied data encryption
   technology. This book by the designers of the block cipher presents
   Rijndael from scratch. The underlying mathematics and the wide trail
   strategy as the basic design idea are explained in detail and the
   basics of differential and linear cryptanalysis are reworked.
   Subsequent chapters review all known attacks against the Rijndael
   structure and deal with implementation and optimization issues.
   Finally, other ciphers related to Rijndael are presented. This book is
   THE authoritative guide to the Rijndael algorithm and AES.
   Professionals, researchers, and students active or interested in data
   encryption will find it a valuable source of information and
   reference.
   
   2002. XVII, 238 pp. Hardcover ISBN 3-540-42580-2
   
   Please find detailed information on this title and on the Springer
   series "Information Security and Cryptography" at:
   http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42580-2.
   
   
    Springer-Verlag
    Heidelberg/Berlin
    http://www.springer.de
    orders@springer.de
    Tel. +49 6221 345 0
    Fax +49 6221 345 217
    New York
    http://www.springer-ny.com
    orders@springer-ny.com
    Tel./Fax 1 800 SPRINGER
   
 
** Introduction to Cryptography

   H. Delfs, H. Knebl, University of Applied Sciences, Nürnberg, Germany
   
   Introduction to Cryptography
   
   Principles and Applications
   
   Due to the rapid growth of digital communication and electronic data
   exchange, information security has become a crucial issue in industry,
   business, and administration. Modern cryptography provides essential
   techniques for securing information and protecting data. This book
   presents the key concepts of cryptography on an undergraduate level,
   from encryption and digital signatures to cryptographic protocols,
   such as electronic elections and digital cash. In the second part,
   probability theory is applied to make basic notions precise, such as
   the security of cryptographic schemes. More advanced topics are also
   addressed, such as the bit security of one-way functions and
   computationally perfect pseudo random bit generators. Typical examples
   of provably secure encryption and signature schemes and their security
   proofs are given. Though particular attention is given to the
   mathematical foundations, no special background in mathematics is
   presumed.
   
   2002. XIV, 314 pp. Hardcover ISBN 3-540-42278-1
   
   Please find detailed information on this title and on the Springer
   series "Information Security and Cryptography" at:
   http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42278-1.
   
   
    Springer-Verlag
    Heidelberg/Berlin
    http://www.springer.de
    orders@springer.de
    Tel. +49 6221 345 0
    Fax +49 6221 345 217
    New York
    http://www.springer-ny.com
    orders@springer-ny.com
    Tel./Fax 1 800 SPRINGER


   Please send your new book announcements to the newsletter editor at
   newsletter@iacr.org


______________________________________________________________________________

   Open Positions in Cryptology
______________________________________________________________________________

   IACR provides a listing of open positions with a focus on cryptology.
   The listing is available on the Web at http://www.iacr.org/jobs/
   and also included in the IACR Newsletter that is sent to members
   three times per year.
   
   To advertise your job opportunities, please send a description of no
   more than 150 words in plain ASCII text by email to jobs(at)iacr.org.
   This should include an URL and further contact information. No
   attachments or word documents, please! (Submissions in other formats
   than text will not be posted.)
   
   As this is intended to be a service to the members of IACR, it is free
   for all members. We ask that commercial enterprises who want to
   advertise their openings identify at least one of their employees who
   is a member of IACR. (IACR does not know corporate membership.) Please
   contact the membership secretariat to become a member of IACR.
   
   On top of that, IACR accepts donations and is always looking for
   sponsors for its conferences.

     _________________________________________________________________
   

  Ruhr-University Bochum, Germany
  
The Ruhr-University Bochum, Germany, has recently established an

                  Institute for IT Security

The Institute is a Center of Excellence for the theoretical and
practical aspects of IT security, providing high quality research and
education. At the Institute's core are three chaired professorships in
IT security. The chair for Communication Security, headed by Prof.
Christof Paar, in the Department of Electrical Engineering and
Information Sciences has now an opening for an

         Assistant Professor in Applied Data Security

This is a newly created Juniorprofessor position. Those positions are
quite similar to US assistant professorships. The duration of the
position is a maximum of six years. It will be possible to apply for
associate or full professor position in the same department for
candidates who build a strong research record.

An ideal candidate would be interested in doing research in one of the
following areas:

·       Efficient software algorithms for crypto algorithms
·       Hardware architectures for crypto algorithms
·       Network security, especially for embedded and ad-hoc networks
·       Cryptographic protocols

The Institute for IT Security offers a multitude of exciting research
cooperation within the University of Bochum (e.g., with the group of
Prof. Hans Dobbertin or with the to-be-filled third chair), and with the
many outstanding researchers at nearby universities (e.g., University of
Essen). Due the exceptional funding situation of the Institute, there is
an excellent research infrastructure (WRT computer equipment, staff
support, office space, lecture and seminar offerings) and highly
motivated and talented graduate students. Our group also offers a very
pleasant and collegial atmosphere.

Due to the international character of the Institute, we especially
welcome applicants from outside Germany. From non-native speakers it
will be expected that after a transition period of two years lectures
will also be held in German.

Please mail your application by April 5,2002, to:

Prof. Dr.-Ing. Johann Friedrich Boehme
Dean, Department of Electrical Engineering and Information Sciences
Ruhr-Universitaet Bochum
D 44780 Bochum
Germany

Should you need more information about the position, you are welcome to
contact Prof. Christof Paar (cpaar@crypto.ruhr-uni-bochum.de)

   (13-mar-02)
     _________________________________________________________________
   
  Internship Opening at NTT Multimedia Communications Laboratories
  
> From: "Anand Desai" <desai@nttmcl.com>

NTT Multimedia Communications Laboratories, Palo Alto CA, USA

Internship Opening

We are looking for graduate students studying cryptography and/or security and
interested in spending this summer working with us in our Palo Alto labs. We
have several ongoing research projects on cryptographic algorithms and
protocols and on Internet and Wireless Security technologies.

For more information see,

http://www.nttmcl.com/sec/Info/

   (04-feb-02)
     _________________________________________________________________
   
  Cryptology Software Engineers
  
Sr. level developers for S. California position.
Relocation assistance available.

Please contact:
Greg Post
Executive Recruiter
LJ Kushner & Associates
greg.post@ljkushner.com
www.ljkushner.com
970-349-0864

   (31-dec-01)
     _________________________________________________________________
   
  University of Bergen, Norway
  
Researcher position

There is a vacant one-year research position at the University of
Bergen (UiB), Department of Informatics, Bergen, Norway, in the area of
cryptology. The position is part of the EU-project: NESSIE (New
European Schemes for Signature, Integrity and Encryption),
which started early 2000 and is running until
the end of 2002. See www.cryptonessie.org for more information and
for the results of the project so far.

It is anticipated that UiB will appoint a researcher to work on this
project starting January 1st, 2002 for a term of 12 months. You will be
based in Bergen under the direction of Professor Lars R. Knudsen.
Yearly salary is about NOK 350,000.

The successful applicant must have a doctorate in informatics or
mathematics or corresponding qualifications.

For more information, see
      http://www.ii.uib.no/~larsr/position

Lars R. Knudsen

   (10-nov-01)
     _________________________________________________________________
   
  University of North Carolina at Charlotte, USA
  
University of North Carolina at Charlotte
Department of Software and Information Systems
Tenure-Track Faculty Positions in

      INFORMATION SECURITY

The Department of Software and Information Systems at UNC
Charlotte has open tenure-track faculty positions. The department
offers degrees at all levels including Bachelor, Masters and PhD. It
is one of the 23 NSA designated Center of Academic Excellence in
Information Assurance Education. Current faculty members have
strong research programs, with substantial funding from both
federal agencies and industrial partners. Salary for new faculty will
be highly competitive. Applicants must have a Ph.D. in Computer
Science, Information Technology, or a related field, and a strong
commitment to teaching and research. We are especially interested
in faculty whose research expertise falls into the areas of Network
security, Software engineering, Security risk assessment and
management, Systems security, Systems survivability, Computer
assisted collaborative work, and Pervasive computing. For further
details please visit      www.sis.uncc.edu

Application review will start  in Jan 2002.
Please send detailed CV together with four references,
copies of scholarly publications and other support material to

Dr Yuliang Zheng,
Chair of Search Committee,
Department of Software and Information Systems,
UNC Charlotte,
9201 University City Blvd,
Charlotte, NC 28223.
Email: yzheng@uncc.edu,  Tel: 704-687-5492.

UNC Charlotte is an equal opportunity/affirmative action employer.

   (6-nov-01)

   
______________________________________________________________________________

   IACR Calendar of Events in Cryptology
______________________________________________________________________________
                                       
   The IACR calendar lists events (conferences, workshops, ...) that may
   be of interest to IACR members or deal with research in cryptology.
   
   If you want to have an event listed here, please send email to
   webmaster(at)iacr.org .
   
  2002
  
     * [1]Financial Cryptography '02, March 11-14, Southampton, Bermuda.
     * [2]Workshop on Privacy Enhancing Technologies (PET 2002), April
       14-15, San Francisco, California, USA.
     * [3]Eurocrypt 2002, April 28-May 2, Amsterdam, Netherlands.
     * [4]IEEE Symposium on Security and Privacy, May 12-15, Oakland,
       California, USA.
     * [5]Yet Another Conference on Cryptography (YACC'02), June 3-7,
       Porquerolles Island, France.
     * [6]15th IEEE Computer Security Foundations Workshop, June 24-26,
       Cape Breton, Nova Scotia, Canada.
     * [7]2002 IEEE International Symposium on Information Theory, June
       30-July 5, Lausanne, Switzerland.
     * [8]Seventh Australasian Conference on Information Security and
       Privacy, July 3-5, Melbourne, Australia.
     * [9]Foundations of Computer Security (satellite workshop of LICS at
       FLoC'02), July 26, Copenhagen, Denmark.
     * [10]Workshop on Cryptographic Hardware and Embedded Systems 2002
       (CHES 2002), August 13-15, Hotel Sofitel, San Francisco Bay,
       Redwood City, USA.
     * [11]11th USENIX Security Symposium, August 5-9, San Francisco,
       USA.
     * [12]Workshop on Selected Areas in Cryptography (SAC 2002), August
       15-16, St. John's, Newfoundland, Canada.
     * [13]Crypto 2002, August 18-22, Santa Barbara, California, USA.
     * [14]3rd International Workshop on Information Security
       Applications (WISA2002), August 28-30, 2002, Jeju Island, Korea
     * [15]Workshop on Trust and Privacy in Digital Business, September
       4-5, Aix en Provence, France.
     * [16]VII Spanish Meeting on Cryptology and Information Security,
       September 5-7, Asturias, Espana.
     * [17]6th Workshop on Elliptic Curve Cryptography (ECC 2002),
       September 23-25, University of Essen, Germany.
     * [18]International Workshop on Cryptology and Network Security
       (CNS02), September 26-28, San Francisco, California, USA.
     * [19]Information Security Conference '02, September 30-October 2,
       Sao Paulo, Brazil.
     * [20]Infrastructure Security Conference 2002 (InfraSec 2002)
       October 1-3, 2002, Bristol,UK.
     * [21]9th ACM Conference on Computer and Communications Security,
       November 17-21, Washington, DC, USA.
     * [22]2002 ACM Workshop on Digital Rights Management, November 18,
       Washington, DC, USA.
     * [23]Fifth Smart Card Research and Advanced Application Conference
       (CARDIS '02), November 20-22, San Jose, USA.
     * [24]Asiacrypt 2002, December 1-5, Queenstown, New Zealand.
     * [25]Fourth International Conference on Information and
       Communications Security (ICICS 02), December 9-12, Kent Ridge
       Digital Labs, Singapore.
     * [26]Third International Conference on Cryptology in India
       (Indocrypt 2002), December 15-18, Hyderabad, India.
       

References

   1. http://fc02.ai/
   2. http://www.pet2002.org/
   3. http://www.ec2002.tue.nl/
   4. http://www.ieee-security.org/TC/SP02/sp02index.html
   5. http://www.univ-tln.fr/~grim/YACC/
   6. http://www.csl.sri.com/csfw/csfw15/
   7. http://isit02.epfl.ch/
   8. http://www.cm.deakin.edu.au/ACISP'02
   9. http://floc02.diku.dk/FCS/
  10. http://www.chesworkshop.org/
  11. http://www.usenix.org/events/sec02/
  12. http://www.engr.mun.ca/~sac2002/
  13. http://www.iacr.org/conferences/crypto2002/
  14. http://icns.ewha.ac.kr/wisa2002
  15. http://www.wi-inf.uni-essen.de/~dexa02ws/
  16. http://enol.etsiig.uniovi.es/viirecsi/
  17. http://www.exp-math.uni-essen.de/~weng/ecc2002.html
  18. http://cs.anu.edu.au/~Chuan.Wu/conference/cns02_cfp.html
  19. http://www.ime.usp.br/~isc2002
  20. http://www.infrasec-conf.org/
  21. http://www.acm.org/sigs/sigsac/ccs/
  22. http://crypto.stanford.edu/DRM2002/
  23. http://www.usenix.org/events/cardis02/
  24. http://www.commerce.otago.ac.nz/infosci/asiacrypt/
  25. http://www.krdl.org.sg/General/conferences/icics/Homepage.html
  26. http://www.isical.ac.in/~indocrypt/

______________________________________________________________________________

   IACR Contact Information
______________________________________________________________________________

                  Officers and Directors of the IACR (2002)

Officers and directors of the IACR are elected for three year terms. If you
are a member and wish to contact IACR regarding an address change or similar
matter, you should contact the membership services at [iacrmem(at)iacr.org].
See http://www.iacr.org/iacrmem/ for more information.

                                  Officers

  Andrew J. Clark                  Bart Preneel
  President                        Vice President
  P.O. Box 743                     Department of Electrical Engineering
  Brighton                         Katholieke Universiteit Leuven
  East Sussex                      Kasteelpark Arenberg 10
  BN1 5HS                          B-3001 Heverlee
  United Kingdom                   BELGIUM
  Tel: +44 1273 270752             Email:
  Fax: +44 1273 276558             [bart.preneel(at)esat.kuleuven.ac.be]
  Email: [president(at)iacr.org]   Tel: +32 16 32 11 48
                                   Fax: +32 16 32 19 86

  Josh Benaloh                     Susan Langford
  Secretary                        Treasurer
  Microsoft Research               Certicom
  One Microsoft Way                25801 Industrial Blvd
  Redmond, WA 98052                Hayward, CA 94545
  USA                              USA
  Tel: +1 425 703 3871             Tel: +1 510 780 5422
  Fax: +1 425 936 7329             Fax: +1 510 780 5401
  Email: [secretary(at)iacr.org]   Email: [treasurer(at)iacr.org]

                                  Directors

  Don Beaver                       Thomas Berson
  Membership Secretary             Director
  Certco Inc.                      Anagram Labs
  55 Broad Street, 22nd Floor      P.O. Box 791
  New York, NY 10004               Palo Alto CA, 94301
  USA                              USA
  Tel: +1 212 709 6719             Tel: +1 650 324 0100
  Fax: +1 212 709 6754             Email: [berson(at)anagram.com]
  Email: don.beaver(at)attbi.com

  Eli Biham                        Christian Cachin
  Director                         Editor, IACR Newsletter
  Computer Science Department      IBM Zurich Research Laboratory
  Technion                         Säumerstrasse 4
  Haifa 32000                      CH-8803 Rüschlikon
  Israel                           Switzerland
  Email:                           Tel: +41 1 724 8989
  [biham(at)cs.technion.ac.il]     Fax: +41 1 724 8953
  Tel: +972 4 8294308              Email: [cachin(at)acm.org]
  Fax: +972 4 8294308

  Professor Chin-Chen Chang        Yvo Desmedt
  Asiacrypt 2003 General Chair     Director
                                   Department of Computer Science
                                   Florida State University
                                   PO Box 4530, 206 Love Building
                                   Tallahassee, FL 32306-4530
                                   USA
                                   Tel: +1 850 644 9298
                                   Fax: +1 850 644 0058
                                   Email: desmedt(at)nu.cs.fsu.edu

  Joan Feigenbaum                  Jerzy Gawinecki
  Editor-in-Chief, Journal of      Eurocrypt 2003 General Chair
  Cryptology                       Institute of Mathematics and Operations
  Department of Computer Science   Research
  Yale University                  Military University of Technology
  P. O. Box 208285                 Kaliskiego Str. 2, 00-908 Warsaw
  New Haven, CT 06520-8285         Poland
  USA                              Tel: (48)(22) 6839556
  Email:                           Fax: (48)(22) 6839719
  joan.feigenbaum(at)yale.edu or   Email: j.gawinecki(at)imbo.wat.waw.pl
  [jofc(at)iacr.org]
  Tel: +1 203 432 6432
  Fax: +1 203 432 0593

  Kwangjo Kim                      Lars Knudsen
  Director                         Director
  School of Engineering            Technical University of Denmark
  Information and Communications   Dept. of Mathematics
  Univ.                            Building 303
  58-4 Hwaam-dong Yusong-ku        DK-2800 Lyngby
  Taejon, 305-348                  DENMARK
  KOREA                            Tel: +45 4525 3048
  Tel: +82 42 866 6118             Fax: +45 4588 1399
  Fax: +82 42 866 6154             Email: knudsen(at)mat.dtu.dk
  Email: kkj(at)icu.ac.kr

  Tsutomu Matsumoto                Ueli Maurer
  Director                         Director and Editor-in-Chief, Journal
  Graduate School of Environment   of Cryptology
  and Information Sciences         Department of Computer Science
  Yokohama National University     ETH Zürich
  79-7 Tokiwadai, Hodogaya,        CH-8092 Zürich
  Yokohama 240-8501, Japan         Switzerland
  Tel: +81-45-339-4133             Email: [maurer(at)inf.ethz.ch] or
  Fax: +81-45-339-4338
  Email:                           [jofc(at)iacr.org]
  tsutomu(at)mlab.jks.ynu.ac.jp    Tel: +41 1 632 7420
                                   Fax: +41 1 632 1172

  Kevin S. McCurley                Greg Rose
  Director                         Crypto 2003 General Chair
  6721 Tannahill Drive             Qualcomm Australia
  San Jose, CA 95120               Level 3, 230 Victoria Road
  USA                              Gladesville NSW 2111
  Tel: +1 408 927 1838             Australia
  Email: mccurley(at)swcp.com      Phone +61 2 9817 4188
                                   Fax +61 2 9817 5199
                                   Email: ggr(at)qualcomm.com

  Berry Schoenmakers               Henry Wolfe
  Eurocrypt 2002 General Chair     Asiacrypt 2002 General Chair
  technische universiteit          Information Science Department
  eindhoven                        School of Business
  /department of mathematics and   University of Otago
  computing science                P.O. Box 56
  HG 9.85, P.O. Box 513            Dunedin, New Zealand
  5600 MB Eindhoven, The           Tel: +64 3 479 8141
  Netherlands                      Fax: +64 3 479 8311
  Tel: +31 40 247 4769             Email: hwolfe(at)commerce.otago.ac.nz
  Fax: +31 40 243 5810
  Email: berry(at)win.tue.nl

  Rebecca Wright
  Crypto 2002 General Chair
  AT&T Labs Research
  Room A213
  P.O. Box 971
  180 Park Avenue
  Florham Park, NJ 07932-0971
  USA
  Tel: +1 973 360 8346
  Fax: +1 973 360 8970
  Email:
  rwright(at)research.att.com


______________________________________________________________________________

   About the IACR Newsletter
______________________________________________________________________________
                                       
   The IACR Newsletter is published three times a year (in February,
   June, and October) and only available electronically. It is sent to
   IACR members by email (as a flat ASCII text) and published on the web
   at
   
     http://www.iacr.org/newsletter/
     
   If you are a member of IACR and wish to receive the newsletter, you
   need to make sure that we know your email address! To update your
   email address in the IACR member database, please contact the
   membership services at iacrmem(at)iacr.org .
   
   Contributions, announcements, book announcements or reviews, calls for
   papers ... are most welcome! Please include a URL and/or e-mail
   addresses for any item submitted (if possible). For things that are
   not on the Web, please submit a one-page ASCII version. Send your
   contributions to newsletter(at)iacr.org
   
The Next Issue

   Deadline for submissions to the next newsletter issue is January 31,
   2002. However, many items will be posted on the website as soon as
   possible.


______________________________________________________________________________

End of IACR Newsletter, Vol. 19, No. 1, Winter 2002.
______________________________________________________________________________