______________________________________________________________________________
______________________________________________________________________________
   

   IACR Newsletter
                                       
   The newsletter of the International Association for Cryptologic
   Research.
   
   Vol. 20, No. 2, Summer 2003.
   
   Published by the International Association for Cryptologic Research
   Christian Cachin, Editor

______________________________________________________________________________
______________________________________________________________________________

   http://www.iacr.org/newsletter/

______________________________________________________________________________

   Contents
______________________________________________________________________________
   
     * Editorial
     * 2003 Elections announcement
     * IACR Fellows
     * Whit Diffie to hold 2004 IACR Distinguished Lecture
     * Eurocrypt 2004: call for papers
     * Announcements
       + Cryptologia paper competition
       + Cryptologia subscription offer
     * New books
     * New reports in the Cryptology ePrint Archive
     * Open positions
     * Calendar of events in cryptology
     * IACR contact information


______________________________________________________________________________

   Editorial
______________________________________________________________________________

   Welcome to the 15th electronic issue of the IACR Newsletter!

   Shortly before the summer is over, the "Summer" 2003 issue of the IACR
   Newsletter finally appears. I'd like to apologize for the delay in
   producing it -- not only the European summer heat wave slowed it down.
   
   Whit Diffie has been appointed to hold the IACR Distinguished Lecture
   for 2004. I'm pleased that he will come to Eurocrypt 2004 in
   Interlaken for giving his lecture. As one of the organizers of
   Eurocrypt 2004, it is a special honor for me that his talk will be
   part of the program.
   
   Please send your contributions to the Newsletter to
   
     newsletter@iacr.org
     
   The next issue of the IACR Newsletter is scheduled for publication in
   October-November 2003. However, announcements will be posted on the
   IACR Website as soon as possible.
   
   Christian Cachin
   IACR Newsletter Editor
   
   P.S. If you have not received the IACR Newsletter by email and would
   like to receive it in the future, then please make sure that the IACR
   membership directory contains your current email address. A printed
   copy of the membership list is mailed yearly to all members.


______________________________________________________________________________

   IACR 2003 Elections: Announcement and Nominations
______________________________________________________________________________

   The election committee consists of:
   
          James Hughes (chair)
          Bart Preneel
          Rebecca Wright (returning officer)
          
   Positions to be filled at this election:
        POSITION                 TERM                   CURRENTLY HELD BY
        Director        Jan 1 2004 - Dec 31 2006        Thomas Berson
        Director        Jan 1 2004 - Dec 31 2006        Yvo Desmedt
        Director        Jan 1 2004 - Dec 31 2006        Lars Knudsen

   Nominators and nominees must be regular members of IACR. Any IACR
   member can nominate another regular member and all nominations must be
   made in writing to the election chairperson.
   
   Please download and fill in the nomination form.
   
        1. http://www.iacr.org/elections/2003/nom_form.pdf
        2. http://www.iacr.org/elections/2003/nom_form.doc
       
   Nominations forms must be received by mail or fax by September 12,
   2003 at the address below.  Receipt will be acknowledged by email
   within two working days (before the deadline).  It is the
   responsibility of the candidates to ensure the nominations and
   statements are  received!  If you have any questions please contact
   the election chairperson.
   
   Election Chair
   James Hughes
   Storage Technology Corporation
   7600 Boone Ave No.
   Minneapolis, MN, 55428
   USA
   
   Fax: +1 612 677 3007
   
   Email: James_Hughes@StorageTek.com
   
   Ballots will be mailed by October 1, 2001. Ballots must be mailed to
   be received by the Returning Officer in the official envelopes by
   NOVEMBER 15, 2003.


______________________________________________________________________________

   IACR Fellows
______________________________________________________________________________

   Nominations and endorsements of IACR-Fellow candidates are due on
   December 31, 2003. Fellows are expected to be 'model citizens' of the
   cryptologic community. Most of them will have demonstrated sustained
   and significant accomplishment in both technical work and service to
   the community, but a very small number may be chosen for unique and
   crucial accomplishment in only one of the two. Complete descriptions
   of the Fellows Program and of the nomination and endorsement
   procedures can be found at http://www.iacr.org/fellows/.


______________________________________________________________________________

   Whit Diffie to hold 2004 IACR Distinguished Lecture
______________________________________________________________________________

   Whit Diffie has been appointed 2004 IACR Distinguished Lecturer. The
   lecture will be given at Eurocrypt 2004. We look forward to his
   presentation.


______________________________________________________________________________

   Call for Papers, Eurocrypt 2004, May 2-6, 2004, Interlaken, Switzerland
______________________________________________________________________________

General Information

   Original papers on all technical aspects of cryptology are solicited
   for submission to Eurocrypt 2004, the 23rd Annual Eurocrypt
   Conference. Eurocrypt 2004 is organized by the International
   Association for Cryptologic Research (IACR), in cooperation with the
   IBM Zurich Research Laboratory.
   
Instructions for Authors

   Submissions must not substantially duplicate work that any of the
   authors has published elsewhere or has submitted in parallel to any
   other conference or workshop with proceedings. The paper must be
   anonymous, with no author names, affiliations, acknowledgments, or
   obvious references. It should begin with a title, a short abstract,
   and a list of key words, and its introduction should summarize the
   contributions of the paper at a level appropriate for a non-specialist
   reader. The paper should be at most 12 pages including title page and
   abstract, but excluding the bibliography and clearly marked
   appendices, and at most 25 pages in total, using at least 11-point
   font and reasonable margins. Committee members are not required to
   read appendices; the paper should be intelligible without them.
   Submissions not meeting these guidelines risk rejection without
   consideration of their merits.
   
   Papers must be submitted electronically. A detailed description of the
   electronic submission procedure will be available by September 15,
   2003 at http://www.zurich.ibm.com/eurocrypt2004. Submissions must
   conform to this procedure and be received by November 3, 2003, 23:59
   UTC to be considered. Late submissions and non-electronic submissions
   will not be considered. Authors unable to submit electronically should
   contact the conference chairs at the address below by October 1, 2003.
   
   Notification of acceptance or rejection will be sent to authors by
   January 26, 2004. Authors of accepted papers must guarantee that their
   paper will be presented at the conference.
   
Conference Proceedings

   Proceedings will be published in Springer-Verlag's Lecture Notes in
   Computer Science and will be available at the conference. Clear
   instructions about the preparation of a final proceedings version will
   be sent to the authors of accepted papers. The final copies of the
   accepted papers will be due on March 1, 2004.
   
   Submission: November 3, 2003; Acceptance: January 26, 2004; Camera
   Ready: March 1, 2004
   
Program Committee

     Alex Biryukov (Katholieke Universiteit Leuven)
     John Black (University of Colorado at Boulder)
     Christian Cachin (IBM Research)
     Jan Camenisch (IBM Research)
     Jean-Sebastien Coron (Gemplus Card International)
     Claude Crépeau (McGill University)
     Ivan Damgård (Aarhus University)
     Juan Garay (Bell Labs - Lucent Technologies)
     Rosario Gennaro (IBM Research)
     Alain Hiltgen (UBS)
     Thomas Johansson (Lund University)
     Antoine Joux (DCSSI Crypto Lab)
     Joe Kilian (NEC Laboratories America)
     Arjen Lenstra (Citibank & Techn. Univ. Eindhoven)
     Yehuda Lindell (IBM Research)
     Anna Lysyanskaya (Brown University)
     Tsutomu Matsumoto (Yokohama National Univ.)
     Daniele Micciancio (UC San Diego)
     Omer Reingold (AT&T Research and IAS)
     Vincent Rijmen (Cryptomathic and IAIK)
     Phillip Rogaway (UC Davis & Chiang Mai Univ.)
     Igor Shparlinski (Macquarie University)
     Edlyn Teske (University of Waterloo)
     Rebecca Wright (Stevens Institute of Technology)
   
Program and General Chairs

   Christian Cachin and Jan Camenisch
   IBM Research
   Säumerstrasse 4
   CH-8803 Rüschlikon
   Switzerland
   email: eurocrypt2004@zurich.ibm.com
   
Stipends

   A limited number of stipends are available to those unable to obtain
   funding to attend the conference. Students whose papers are accepted
   and who will present the paper themselves are encouraged to apply if
   such assistance is needed. Requests for stipends should be addressed
   to eurocrypt2004@zurich.ibm.com before April 1, 2004.


______________________________________________________________________________

   Announcements
______________________________________________________________________________

** Cryptologia paper competition

   To: newsletter@iacr.org IACR Newsletter Editor
   From: Brian-Winkel@usma.edu Brian Winkel, Editor of Cryptologia
   
   Cryptologia is a unique scholarly journal devoted to all aspects of
   cryptology. This refereed quarterly began in 1977. Areas covered
   include security, history, codes and ciphers, mathematics, military
   science, espionage, cipher devices, literature, and ancient languages.
   Cryptologia features an exceptional cryptologic book review section.
   This quarterly, 96 page journal, is available for $48.00 US in the
   United States and $60.00 US outside the United States. Complete
   information can be found at the journal's web site:
   http://www.dean.usma.edu/math/pubs/cryptologia/ .
   
   We are pleased to announce two undergraduate paper competitions, each
   with a $300 cash prize and publication in Cryptologia, a refereed
   journal. Both the Annual Undergraduate Paper Competition in Cryptology
   and the Annual Greg Mellen Memorial Cryptology Scholarship Prize are
   sponsored by the journal Cryptologia to encourage the study of all
   aspects of cryptology in the undergraduate curricula. The topic may be
   in any area of cryptology -- technical, historical, and literary
   subjects. Papers must be no more than 20 typewritten pages in length,
   double spaced and fully referenced. Four copies must be submitted.
   Authors should keep one copy. Papers are to be original works that
   have not been published previously.
   
   Closing date for both papers is 31 December for the year of entry. The
   winner(s) will be announced on 1 April with publication of the winning
   paper in a later issue of CRYPTOLOGIA. Papers will be judged by the
   editors of Cryptologia. Inquiries, submissions, and subscription
   information: Cryptologia, Department of Mathematical Sciences, United
   States Military Academy, West Point NY 10996 USA; Cryptologia
   @usma.edu. Or check Cryptologia's website:
   http://www.dean.usma.edu/math/pubs/cryptologia/ .
   
   
    Brian Winkel, Editor
    Professor of Mathematical Sciences
    United States Military Academy
    West Point NY 10996 USA
    845-938-3200
    Brian-Winkel@usma.edu
    http://www.dean.usma.edu/math/people/winkel/
    
   
*** Cryptologia subscription offer

    To: newsletter@iacr.org IACR Newsletter Editor
    From: Brian-Winkel@usma.edu Brian Winkel, Editor of Cryptologia
    We would like to addend our announcement for your members to offer
    ANY IACR member FOR A NEW SUBSCRIBER ONLY an offer of half-price on
    their new one-year subscription. This means an IACR member in the US
    can send a check for $24.00 (instead of the usual $48.00) while an
    IACR membere outside the US can send us a check for $30.00 (instead
    of the usual $60.00) and get their FIRST YEAR subscription at HALF
    PRICE. Make check payable to Cryptologia and send it to Cryptologia,
    Dept of Math Sci, US Military Academy, West Point NY 10996 USA. IACR
    members should identify themselves as such when they subscribe.
    
   
    Brian Winkel, Editor
    Professor of Mathematical Sciences
    United States Military Academy
    West Point NY 10996 USA
    845-938-3200
    Brian-Winkel@usma.edu
    http://www.dean.usma.edu/math/people/winkel/


______________________________________________________________________________

   New Books
______________________________________________________________________________
                                       
   This page lists new books about cryptology, and occasionally reviews
   one.
   
Coding Theory and Cryptology

   edited by Harald Niederreiter (National University of Singapore)
   Lecture Notes Series, Institute for Mathematical Sciences, National
   University of Singapore, Vol. 1
   

The inaugural research program of the Institute for Mathematical
Sciences at the National University of Singapore took place from July to
December 2001 and was devoted to coding theory and cryptology. As part
of the program, tutorials for graduate students and junior researchers
were given by world-renowned scholars. These tutorials covered
fundamental aspects of coding theory and cryptology and were designed to
prepare for original research in these areas. The present volume
collects the expanded lecture notes of these tutorials. The topics range
from mathematical areas such as computational number theory, exponential
sums and algebraic function fields through coding-theory subjects such
as extremal problems, quantum error-correcting codes and
algebraic-geometry codes to cryptologic subjects such as stream ciphers,
public-key infrastructures, key management, authentication schemes and
distributed system security.

Contents: Extremal Problems of Coding Theory (A Barg); Analysis and
Design Issues for Synchronous Stream Ciphers (E Dawson & L Simpson);
Quantum Error-Correcting Codes (K Feng); Public Key Infrastructures (D
Gollmann); Computational Methods in Public Key Cryptology (A K Lenstra);
Detecting and Revoking Compromised Keys (T Matsumoto); Algebraic
Function Fields Over Finite Fields (H Niederreiter); Authentication
Schemes (D Y Pei); Exponential Sums in Coding Theory, Cryptology and
Algorithms (I E Shparlinski); Distributed Authorization: Principles and
Practice (V Varadharajan); Introduction to Algebraic Geometry Codes (C P
Xing).

Readership: Graduate students and researchers in number theory, discrete
mathematics, coding theory, cryptology and IT security.

460pp                     Pub. date: Dec 2002
981-238-132-5             US$58 £39
981-238-450-2(pbk)        US$28 £19

   The information is also available on our website:
   
     http://www.wspc.com/books/mathematics/5078.html


______________________________________________________________________________

   New Reports in the Cryptology ePrint Archive
______________________________________________________________________________

   (The list contains reports posted since the last newsletter issue
   appeared.)
   

   2003/182 ( PS PS.GZ PDF )
          Chosen-Ciphertext Security from Identity-Based Encryption
          Ran Canetti, Shai Halevi, and Jonathan Katz

   2003/181 ( PS PS.GZ PDF )
          On the Security of Multiple Encryption or
          CCA-security+CCA-security=CCA-security?
          Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki
          Imai

   2003/180 ( PS PS.GZ )
          Parallelizing Explicit Formula for Arithmetic in the Jacobian
          of Hyperelliptic Curves
          Pradeep Kumar Mishra and Palash Sarkar

   2003/179 ( PS PS.GZ PDF )
          VMPC one-way function
          Bartosz Zoltak

   2003/178 ( PDF )
          Constructing Optimistic Fair Exchange Protocols from Committed
          Signatures
          Huafei Zhu

   2003/177 ( PS PS.GZ PDF )
          Building Secure Cryptographic Transforms, or How to Encrypt and
          MAC
          Tadayoshi Kohno and Adriana Palacio and John Black

   2003/176 ( PS PS.GZ PDF )
          Patterson-Wiedemann Construction Revisited
          S. Gangopadhyay and P. H. Keskar and S. Maitra

   2003/175 ( PS PS.GZ PDF )
          Double-Speed Safe Prime Generation
          David Naccache

   2003/174 ( PS PS.GZ PDF )
          Relaxing Chosen-Ciphertext Security
          Ran Canetti and Hugo Krawczyk and Jesper Nielsen

   2003/173 ( PS PS.GZ )
          Domain Extender for Collision Resistant Hash Functions Using a
          Directed Acyclic Graph
          Palash Sarkar

   2003/172 ( PS PS.GZ PDF )
          NAEP: Provable Security in the Presence of Decryption Failures
          Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and
          William Whyte

   2003/171 ( PS PS.GZ PDF )
          Scalable Protocols for Authenticated Group Key Exchange
          Jonathan Katz and Moti Yung

   2003/170 ( PS PS.GZ PDF )
          HARPS: HAshed Random Preloaded Subset Key Distribution
          Mahalingam Ramkumar and Nasir Memon

   2003/169 ( PS PS.GZ PDF )
          Properties of the Transformation Semigroup of the Solitaire
          Stream Cipher
          Boris Pogorelov and Marina Pudovkina

   2003/168 ( PS PS.GZ )
          Robust discretization, with an application to graphical
          passwords
          Jean-Camille Birget and Dawei Hong and Nasir Memon

   2003/167 ( PDF )
          Identity-based Chameleon Hash and Applications
          Giuseppe Ateniese and Breno de Medeiros

   2003/166 ( PS PS.GZ PDF )
          A reduction of the space for the parallelized Pollard lambda
          search on elliptic curves over prime finite fields and on
          anomalous binary elliptic curves
          Igor Semaev

   2003/165 ( PDF )
          Commitment Capacity of Discrete Memoryless Channels
          Andreas Winter, Anderson C. A. Nascimento, Hideki Imai

   2003/164 ( PS PS.GZ PDF )
          Identity-Based Threshold Decryption
          Joonsang Baek and Yuliang Zheng

   2003/163 ( PS PS.GZ PDF )
          Multipurpose Identity-Based Signcryption : A Swiss Army Knife
          for Identity-Based Cryptography
          Xavier Boyen

   2003/162 ( PS PS.GZ PDF )
          Cryptanalysis of the Alleged SecurID Hash Function
          Alex Biryukov and Joseph Lano and Bart Preneel

   2003/161 ( PS PS.GZ PDF )
          Indifferentiability, Impossibility Results on Reductions, and
          Applications to the Random Oracle Methodology
          Ueli Maurer and Renato Renner and Clemens Holenstein

   2003/160 ( PDF )
          Tame Transformation Signatures
          Jiun-Ming Chen and Bo-Yin Yang

   2003/159 ( PS PS.GZ PDF )
          An efficient variant of the RSA cryptosystem
          Cesar Alison Monteiro Paixão

   2003/158 ( PS PS.GZ )
          Study of Domain Extension of UOWHF and Its Optimality
          Mridul Nandi

   2003/157 ( PS PS.GZ )
          Some RSA-based Encryption Schemes with Tight Security Reduction
          Kaoru Kurosawa and Tsuyoshi Takagi

   2003/156 ( PS PS.GZ )
          Efficient Proven Secure Public Key Steganography
          Tri Van Le

   2003/155 ( PDF )
          A Formal Proof of Zhu's Signature Scheme
          huafei zhu

   2003/154 ( PS PS.GZ )
          ManTiCore: Encryption with Joint Cipher-State Authentication
          Cheryl Beaver and Timothy Draelos and Richard Schroeppel and
          Mark Torgerson

   2003/153 ( PDF )
          Attack on an Identification Scheme Based on Gap Diffie-Hellman
          Problem
          Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG

   2003/152 ( PDF )
          Optimal Statistical Power Analysis
          Eric Brier and Christophe Clavier and Francis Olivier

   2003/151 ( PDF )
          Secret sharing schemes on sparse homogeneous access structures
          with rank three
          Jaume Martí-Farré and Carles Padró

   2003/150 ( PS PS.GZ PDF )
          On the random-oracle methodology as applied to
          length-restricted signature schemes
          Ran Canetti and Oded Goldreich and Shai Halevi

   2003/149 ( -- withdrawn -- )
          Forward-Secure Hierarchical ID-Based Cryptography
          Danfeng Yao and Anna Lysyanskaya

   2003/148 ( PS PS.GZ PDF )
          A Tweakable Enciphering Mode
          Shai Halevi and Phillip Rogaway

   2003/147 ( PS PS.GZ PDF )
          A Parallelizable Enciphering Mode
          Shai Halevi and Phillip Rogaway

   2003/146 ( PS PS.GZ PDF )
          Breaking and Repairing Optimistic Fair Exchange from PODC 2003
          Yevgeniy Dodis and Leonid Reyzin

   2003/145 ( PS PS.GZ )
          Symmetric Authentication Within a Simulatable Cryptographic
          Library
          Michael Backes and Birgit Pfitzmann and Michael Waidner

   2003/144 ( PS PS.GZ PDF )
          ID-based tripartite key agreement with signatures
          Divya Nalla

   2003/143 ( PS PS.GZ PDF )
          Elliptic curves suitable for pairing based cryptography
          Friederike Brezing and Annegret Weng

   2003/142 ( PS PS.GZ )
          A New Tree based Domain Extension of UOWHF
          Mridul Nandi

   2003/141 ( PS PS.GZ PDF )
          General Composition and Universal Composability in Secure
          Multi-Party Computation
          Yehuda Lindell

   2003/140 ( PS PS.GZ PDF )
          Trading-Off Type-Inference Memory Complexity Against
          Communication
          Konstantin Hypp\"onen and David Naccache and Elena Trichina and
          Alexei Tchoulkine

   2003/139 ( PDF )
          On the Randomness of the Editing Generator
          Enjian Bai and Guozhen Xiao

   2003/138 ( PS PS.GZ )
          Permutation graphs, fast forward permutations, and
          Boaz Tsaban

   2003/137 ( PS PS.GZ )
          Bernoulli numbers and the probability of a birthday surprise
          Boaz Tsaban

   2003/136 ( PS PS.GZ )
          Efficient linear feedback shift registers with maximal period
          Boaz Tsaban and Uzi Vishne

   2003/135 ( PS PS.GZ PDF )
          Collision Attack on Reduced-Round Camellia
          Wen-Ling Wu and Deng-Guo Feng

   2003/134 ( -- withdrawn -- )
          Direct Sum of Non Normal and Normal Bent Functions Always
          Produces Non Normal Bent Functions
          Sugata Gangopadhyay and Subhamoy Maitra

   2003/133 ( PS PS.GZ PDF )
          Minimum Distance between Bent and 1-resilient Boolean Functions
          Soumen Maity and Subhamoy Maitra

   2003/132 ( PS PS.GZ )
          Guaranteeing the diversity of number generators
          Adi Shamir and Boaz Tsaban

   2003/131 ( PS PS.GZ PDF )
          Homomorphic public-key systems based on subgroup membership
          problems
          Kristian Gjøsteen

   2003/130 ( PS PS.GZ PDF )
          On the Pseudorandomness of KASUMI Type Permutations
          Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa

   2003/129 ( PS PS.GZ PDF )
          Attack on Han et al.'s ID-based Confirmer (Undeniable)
          Signature at ACM-EC'03
          Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo

   2003/128 ( PS PS.GZ )
          Weak Fields for ECC
          Alfred Menezes and Edlyn Teske and Annegret Weng

   2003/127 ( PDF )
          Using Information Theory Approach to Randomness Testing
          B. Ya. Ryabko and V.A. Monarev

   2003/126 ( PS PS.GZ PDF )
          Certificateless Public Key Cryptography
          Sattam S. Al-Riyami and Kenneth G. Paterson

   2003/125 ( PS PS.GZ PDF )
          Algebraic Attacks on Combiners with Memory and Several Outputs
          Nicolas T. Courtois

   2003/124 ( PS PS.GZ )
          A General Correlation Theorem
          Kishan Chand Gupta and Palash Sarkar

   2003/123 ( PS PS.GZ PDF )
          Assessing security of some group based cryptosystems
          Vladimir Shpilrain

   2003/122 ( PDF )
          Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party
          Key Agreement Protocols
          Kyungah Shim

   2003/121 ( PS PS.GZ )
          A Cryptographically Sound Security Proof of the
          Needham-Schroeder-Lowe Public-Key Protocol
          Michael Backes and Birgit Pfitzmann

   2003/120 ( PS PS.GZ PDF )
          Physically Observable Cryptography
          Silvio Micali and Leonid Reyzin

   2003/119 ( PS PS.GZ PDF )
          How Secure Are FPGAs in Cryptographic Applications?
          Thomas Wollinger and Christof Paar

   2003/118 ( PS PS.GZ )
          Visual Crypto Displays Enabling Secure Communications
          Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring,
          Marten van Dijk

   2003/117 ( PDF )
          An identity-based ring signature scheme from bilinear pairings
          Chih-Yin Lin and Tzong-Chen Wu

   2003/116 ( PS PS.GZ PDF )
          A New ID-based Group Signature Scheme from Bilinear Pairings
          Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim

   2003/115 ( PDF )
          Cryptanalysis of ID-based Tripartite Authenticated Key
          Agreement Protocols
          Kyungah Shim

   2003/114 ( PS PS.GZ )
          Unifying Simulatability Definitions in Cryptographic Systems
          under Different Timing Assumptions
          Michael Backes

   2003/113 ( PS PS.GZ PDF )
          Security Analysis of Shim's Authenticated Key Agreement
          Protocols from Pairings
          Hung-Min Sun and Bin-Tsan Hsieh

   2003/112 ( PS PS.GZ )
          Accumulating Composites and Improved Group Signing
          Gene Tsudik and Shouhuai Xu

   2003/111 ( PDF )
          Further Cryptanalysis of some Proxy Signature Schemes
          Jiqiang Lv and Jingwei Liu and Xinmei Wang

   2003/110 ( PDF )
          Proposal on Personal Authentication System in which Biological
          Information is embedded in Cryptosystem Key
          Yukio Itakura and Shigeo Tsujii

   2003/109 ( PS PS.GZ PDF )
          Crytanalysis of SAFER++
          Alex Biryukov and Christophe De Canni\`ere and Gustaf
          Dellkrantz

   2003/108 ( PS PS.GZ )
          Novel Cyclic and Algebraic Properties of AES
          Tri Van Le

   2003/107 ( PS PS.GZ PDF )
          Fujisaki-Okamoto IND-CCA hybrid encryption revisited
          David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and
          Jorge L. Villar

   2003/106 ( PS PS.GZ PDF )
          High-speed encryption and authentication: A patent-free
          solution for 10 Gbps network devices
          Tadayoshi Kohno and John Viega and Doug Whiting

   2003/105 ( PS PS.GZ )
          On Diophantine Complexity and Statistical Zero-Knowledge
          Arguments
          Helger Lipmaa

   2003/104 ( PS PS.GZ PDF )
          New Proxy Signature, Proxy Blind Signature and Proxy Ring
          Signature Schemes from Bilinear Pairing
          Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin

   2003/103 ( PS PS.GZ PDF )
          Security analysis on Nalla-Reddy's ID-based tripartite
          authenticated key agreement protocols
          Zhongliang Chen

   2003/102 ( PDF )
          Length-Based Attacks for Certain Group Based Encryption
          Rewriting Systems
          J. Hughes, and A. Tannenbaum

   2003/101 ( -- withdrawn -- )
          Cryptanalysis of HFE
          Ilia Toli

   2003/100 ( PS PS.GZ PDF )
          Bounded-Concurrent Secure Two-Party Computation Without Set-Up
          Assumptions
          Yehuda Lindell

   2003/099 ( PS PS.GZ PDF )
          Algorithms in Braid Groups
          Matthew J. Campagna

   2003/098 ( PDF )
          Side Channel Attacks on CBC Encrypted Messages in the PKCS#7
          Format
          Vlastimil Klima and Tomas Rosa

   2003/097 ( PS PS.GZ PDF )
          Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic
          Curves
          Jan Pelzl and Thomas Wollinger and Christof Paar

   2003/096 ( PS PS.GZ PDF )
          Secure Proxy Signature Schemes for Delegation of Signing Rights
          Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi

   2003/095 ( PS PS.GZ PDF )
          Public Key Trace and Revoke Scheme Secure against Adaptive
          Chosen Ciphertext Attack
          Yevgeniy Dodis and Nelly Fazio

   2003/094 ( PS PS.GZ PDF )
          Trace Zero Subvariety for Cryptosystems
          Tanja Lange

   2003/093 ( PS PS.GZ PDF )
          More Efficient Provably Secure Steganography
          Leonid Reyzin and Scott Russell

   2003/092 ( PS PS.GZ PDF )
          Provably-Secure Enhancement on 3GPP Authentication and Key
          Agreement Protocol
          Muxiang Zhang

   2003/091 ( PS PS.GZ )
          Sequential Aggregate Signatures from Trapdoor Homomorphic
          Permutations
          Hovav Shacham

   2003/090 ( PDF )
          A Structured Multisignature Scheme from the Gap Diffie-Hellman
          Group
          Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang

   2003/089 ( PS PS.GZ PDF )
          Efficient Public Key Generation for Multivariate Cryptosystems
          Christopher Wolf

   2003/088 ( PDF )
          Elliptic Curve Point Multiplication
          A.G.Rostovtsev and E.B.Makhovenko

   2003/087 ( PS PS.GZ PDF )
          A Practical Elliptic Curve Public Key Encryption Scheme
          Provably Secure Against Adaptive Chosen-message Attack
          huafei zhu

   2003/086 ( PS PS.GZ PDF )
          On the Selection of Pairing-Friendly Groups
          Paulo S. L. M. Barreto and Ben Lynn and Michael Scott

   2003/085 ( PS PS.GZ )
          A defect of the implementation schemes of the TTM cryptosystem
          Jintai Ding, Dieter Schmidt

   2003/084 ( PS PS.GZ )
          Cryptanalysis of an implementation scheme of the Tamed
          Transformation Method cryptosystem
          Jintai Ding, Timonthy Hodges

   2003/083 ( PS PS.GZ PDF )
          A Forward-Secure Public-Key Encryption Scheme
          Ran Canetti and Shai Halevi and Jonathan Katz

   2003/082 ( PS PS.GZ PDF )
          Stronger Security Bounds for OMAC, TMAC and XCBC
          Tetsu Iwata and Kaoru Kurosawa

   2003/081 ( PDF )
          Primitive Specification for SOBER-128
          Philip Hawkes and Greg Rose

   2003/080 ( PS PS.GZ PDF )
          Non-interactive and Reusable Non-malleable Commitment Schemes
          Ivan Damgård and Jens Groth

   2003/079 ( PS PS.GZ PDF )
          Fast arithmetic on Jacobians of Picard curves
          Stéphane Flon and Roger Oyono

   2003/078 ( PS PS.GZ PDF )
          Relation between simulator-based and comparison-based
          definitions of semantic security
          Yodai Watanabe and Junji Shikata

   2003/077 ( PS PS.GZ PDF )
          An Un-Instantiable Random-Oracle-Model Scheme for a
          Hybrid-Encryption Problem
          Mihir Bellare and Alexandra Boldyreva and Adriana Palacio

   2003/076 ( PS PS.GZ PDF )
          Goldbachs Conjecture on ECDSA Protocols
          N. Vijayarangan, Nitin Agarwal, S. Kasilingam

   2003/075 ( PS PS.GZ )
          Almost Security of Cryptographic Boolean Functions
          Kaoru Kurosawa

   2003/074 ( PDF )
          Divisible Voting Scheme
          Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata

   2003/073 ( PDF )
          A Scheme for obtaining a Warrant Message from the Digital Proxy
          Signatures
          Sunder Lal and Amit K Awasthi

   2003/072 ( PDF )
          Proxy Blind Signature Scheme
          Sunder Lal and Amit K Awasthi

   2003/071 ( PS PS.GZ PDF )
          How to Protect Against a Militant Spammer
          Markus Jakobsson and John Linn and Joy Algesheimer

   2003/070 ( PS PS.GZ PDF )
          A Critique of CCM
          P. Rogaway and D. Wagner

   2003/069 ( PS PS.GZ PDF )
          A Conventional Authenticated-Encryption Mode
          M. Bellare and P. Rogaway and D. Wagner

   2003/068 ( PS PS.GZ PDF )
          On the Security of Some Proxy Signature Schemes
          Hung-Min Sun and Bin-Tsan Hsieh

   2003/067 ( PS PS.GZ PDF )
          Forking Lemmas in the Ring Signatures' Scenario
          Javier Herranz and Germ\'an S\'aez

   2003/066 ( PS PS.GZ PDF )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy

   2003/065 ( PS PS.GZ PDF )
          Hash Function Balance and its Impact on Birthday Attacks
          Mihir Bellare and Tadayoshi Kohno

   2003/064 ( PS PS.GZ PDF )
          On the Optimality of Linear, Differential and Sequential
          Distinguishers
          Pascal Junod

   2003/063 ( PS PS.GZ PDF )
          Initiator-Resilient Universally Composable Key Exchange
          Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt

   2003/062 ( PS PS.GZ )
          An n-party Key Agreement Scheme using Bilinear Map
          Rana Barua and Ratna Dutta and Palash Sarkar

   2003/061 ( PDF )
          Hidden Polynomial Cryptosystems
          Ilia Toli

   2003/060 ( PS PS.GZ PDF )
          Isomorphism Classes of Picard Curves over Finite Fields
          Jong Won Lee

   2003/059 ( -- withdrawn -- )
          A Transitive Signature Scheme Provably Secure Against Adaptive
          Chosen-message Attack
          Huafei Zhu and Bao Feng and Robert H. Deng

   2003/058 ( PS PS.GZ PDF )
          An Elliptic Curve Trapdoor System
          Edlyn Teske

   2003/057 ( PS PS.GZ )
          Secure Multiplication of Shared Secrets in the Exponent
          Mario Di Raimondo and Rosario Gennaro

   2003/056 ( PS PS.GZ PDF )
          Computing of Trust in Distributed Networks
          Huafei Zhu and Bao Feng and Robert H. Deng

   2003/055 ( PDF )
          A New Approach to Prevent Blackmailing in E-Cash
          Xiaofeng Chen and Fangguo Zhang and Yumin Wang

   2003/054 ( PS PS.GZ PDF )
          ID based Cryptosystems with Pairing on Elliptic Curve
          Ryuichi SAKAI and Masao KASAHARA

   2003/053 ( PS PS.GZ )
          Tate-pairing implementations for tripartite key agreement
          Iwan Duursma and Hyang-Sook Lee

   2003/052 ( PDF )
          Attacking RSA-based Sessions in SSL/TLS
          Vlastimil Klima and Ondrej Pokorny and Tomas Rosa

   2003/051 ( PS PS.GZ )
          How to Predict the Output of a Hardware Random Number Generator
          Markus Dichtl

   2003/050 ( PS PS.GZ PDF )
          Concealment and its Applications to Authenticated Encryption
          Yevgeniy Dodis and Jee Hea An

   2003/049 ( PS PS.GZ PDF )
          Hidden Number Problem in Small Subgroups
          Igor Shparlinski and Arne Winterhof

   2003/048 ( PS PS.GZ PDF )
          Compounding Secret Sharing Schemes
          E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera

   2003/047 ( PS PS.GZ PDF )
          A Construction of 100 bit Public-Key Cryptosystem and Digital
          Signature Scheme
          Masao KASAHARA and Ryuichi SAKAI

   2003/046 ( PS PS.GZ PDF )
          Remarks on Saeednia's Identity-based Society Oriented Signature
          Scheme with Anonymous Signers
          Guilin Wang, and Bo Zhu

   2003/045 ( PDF )
          An algorithm to obtain an RSA modulus with a large private key
          L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A.
          Queiruga Dios

   2003/044 ( -- withdrawn -- )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy

   2003/043 ( PS PS.GZ PDF )
          Parallel Signcryption with OAEP, PSS-R, and other Feistel
          Paddings
          Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish

   2003/042 ( PS PS.GZ )
          Timed Fair Exchange of Standard Signatures
          Juan A. Garay and Carl Pomerance

   2003/041 ( PS PS.GZ )
          A new statistical distinguisher for the shrinking generator
          Jovan Dj. Golic and Renato Menicocci

   2003/040 ( PS PS.GZ )
          Computing Walsh Transform from the Algebraic Normal Form of a
          Boolean Function
          Kishan Chand Gupta and Palash Sarkar

   2003/039 ( PS PS.GZ PDF )
          Torus-based cryptography
          Karl Rubin and Alice Silverberg

   2003/038 ( PS PS.GZ PDF )
          Pretty-Simple Password-Authenticated Key-Exchange Under
          Standard Assumptions
          Kazukuni Kobara and Hideki Imai

   2003/037 ( PS PS.GZ PDF )
          Strengthening Zero-Knowledge Protocols using Signatures
          Juan A. Garay and Philip MacKenzie and Ke Yang

   2003/036 ( PS PS.GZ PDF )
          Cryptanalysis of a public-key encryption scheme based on the
          polynomial reconstruction problem
          Jean-Sebastien Coron

   2003/035 ( PDF )
          On alternative approach for verifiable secret sharing
          Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk


______________________________________________________________________________

   Open Positions in Cryptology
______________________________________________________________________________

   IACR provides a listing of open positions with a focus on cryptology.
   The listing is available on the Web at [1]http://www.iacr.org/jobs/
   and also included in the [2]IACR Newsletter that is sent to members
   three times per year.
   
   To advertise your job opportunities, please send a description of no
   more than 150 words in plain ASCII text by email to jobs(at)iacr.org.
   This should include an URL and further contact information. No
   attachments or word documents, please! (Submissions in other formats
   than text will not be posted.)
   
   As this is intended to be a service to the members of IACR, it is free
   for all members. We ask that commercial enterprises who want to
   advertise their openings identify at least one of their employees who
   is a member of IACR. (IACR does not know corporate membership.) Please
   contact the membership secretariat to [3]become a member of IACR.
   
   On top of that, IACR accepts donations and is always looking for
   sponsors for its conferences.
     _________________________________________________________________
   
  Katholieke Universiteit Leuven
  
The research group COSIC of the Katholieke Universiteit Leuven has been
founded in 1979.  The group currently has 27 researchers and graduate
students (from 12 nationalities) working in the area of cryptology and
its applications.

The group wants to hire 2 PhD students who will contribute to a new European
collaborative research project in the area of privacy and identity
management.  Under the co-supervision of David Chaum, the students will
work on innovative cryptographic techniques and solutions for identity
management schemes.

We are looking for strong candidates with an undergraduate degree in computer
science or mathematics; successful candidates would have a good theoretical
background and some understanding of security applications.
We will also consider applicants at the postdoctoral level with a PhD degree
relevant to the research topic.

For further details see

  http://www.esat.kuleuven.ac.be/cosic

The closing date for applications is November 1, 2003.

   (04-Sep-03)
     _________________________________________________________________
   
  Université catholique de Louvain
  

                Université catholique de Louvain
                Two-year post-doctoral fellowship

The UCL Crypto Group has a proposal for a two-year post-doctoral
fellowship in cryptology, funded by the Région wallonne (Belgium).

The UCL Crypto Group brings together people and expertise from
Microelectronics, Telecomunications, Computer Science, Mathematics,
and Applied Mathematics, working together for research and
applications in cryptology, secure protocols and integrated
interoperable security, under the direction of Prof. J.-J. Quisquater.
For more details on the group's research activities, visit
http://www.uclcrypto.org

Candidate:
- must be less than 36
- must be resident (and of nationality) of one of the following
countries: Poland, Hungary, Romania, Bulgaria, Slovakia, Czech
Republic, Estonia, Lettonia, Lithuania, Slovenia, Bolivia, Chile,
Cuba, Haiti, Québec, Burkina Faso, Benin, Senegal, Morocco, Congo Dem.
Rep., Tunisia, Lebanon, Palestine, Israel, Vietnam, China. This
corresponds to countries the Région wallonne has concluded specific
agreements with.
- must have a Ph.D. at the date of Oct. 1st, 2003.

Note that the deadline for formal submission to the Région wallonne is
very tight: October 1st, 2003. Potential applicants are therefore
invited to express interest very quickly by contacting Prof.
Quisquater (jjq@dice.ucl.ac.be).

Further information can be obtained by J.-J. Quisquater or by F.
Koeune (fkoeune@dice.ucl.ac.be).

   (02-Sep-03)
     _________________________________________________________________
   
  Department of Informatics, University of Bergen, Norway
  

Department of Informatics, University of Bergen, Norway

The Department of Informatics has a vacant professorship in cryptology.
By "cryptology" we mean analysis of (in the information theoretic, the
coding theoretic, and the complexity theoretic sense), and design of
cryptographic systems and algorithms, including systems for
confidentiality, authentication, and key management. The successful
applicant must document an extensive research career in the field of
cryptology.

In addition to the vacant professorship, the department's coding theory
and cryptology group currently comprises 3 full professors, 2 adjunct
professors, 2 postdoctoral researchers, and 5 PhD fellows. The group was
recently organised as the Selmer Centre, which is described at

                        www.selmer.uib.no.

The group's cryptologic research is focused on the interaction between
cryptology and coding theory. It is expected that the successful
applicant will extend the group's research activity in a natural and
complementing way.

For further information contact Tor Helleseth (torh@ii.uib.no) or Øyvind
Ytrehus (oyvind@uib.no).
The closing date for applications will be September 1, 2003.

   (17-Jul-03)
     _________________________________________________________________
   
  University of Bristol
  
                Research Assistant in Computer Science :
                   Cryptography/Quantum Computation
                           (ref. 9316)

Bristol is one of the leading research based universities in the UK located
at the heart of one of Europe's largest concentrations of high-technology
industry. We are an international centre of excellence in research and have
expanded rapidly over the last five years.

The Department intends to appoint a research assistant in Computer Science
to work on the interface between Quantum Information Processing and
Cryptography. In particular the research is to investigate cryptographic
signature schemes which would remain secure in the presence of quantum
computers.

We are looking to appoint someone who has completed, or is near to
completeing, a Phd in a relevant area. Successful candidates would either
have a background in cryptography or quantum computation, however
candidates with other relevant experience in related areas of Computer
Science or Mathematics are encouraged to apply.

For applications and further details see

  http://www.cs.bris.ac.uk/Research/Vacancies/nigel.html

The closing date for applications is 01/07/03

   (07-May-03)
     _________________________________________________________________
   
  Norwegian University of Science and Technology - NTNU
  
Norwegian University of Science and Technology - NTNU
Centre for Quantifiable Quality of Service in Communication Systems
Centre of Excellence

The Centre is a Centre of Excellence under the scheme initiated by The
Research Council of Norway to enable Norwegian research groups to carry
on long-term, basic research at a high international standard. The
Centre will deal with Quality of Service issues in heterogeneous,
multilayered networks where packet switching technology is employed. The
Centre will work within the following areas: multimedia signal
processing, dependability, traffic and security as applied to multiparty
communication.

There are now vacant positions for doctoral students and postdocs.

The Centre also has openings for visiting professors and scholars, and
invites doctoral students from the EU to apply for a stay under the
auspices of Marie Curie Training Site.

For further information visit  http://www.ntnu.no/Q2S

   (22-Apr-03)


______________________________________________________________________________

   IACR Calendar of Events in Cryptology
______________________________________________________________________________
                                       
   The IACR calendar lists events (conferences, workshops, ...) that may
   be of interest to IACR members or deal with research in cryptology.
   
   If you want to have an event listed here, please send email to
   webmaster(at)iacr.org .
   
   (The current condition for being listed here is that the description
   of an event must match the word "*crypt*".)
   
  2003
  
     * [2]Second International Workshop on Trust and Privacy in Digital
       Business (TrustBus'03), September 1-5, Prague, Czech Republic.
     * [3]Workshop on Cryptographic Hardware and Embedded Systems (CHES)
       2003, September 7-10, Cologne, Germany.
     * [4]International Workshop on Cryptology and Network Security
       (CANS03), September 24-26, Miami, Florida, USA.
     * [5]Workshop on "Mathematics of Cryptology", September 26-October
       2, Leiden University, The Netherlands.
     * [6]6th Information Security Conference (ISC'03), October 1-3,
       Hewlett-Packard Laboratories, Bristol, UK.
     * [7]Fifth International Conference on Information and
       Communications Security (ICICS 2003), October 10-13, Huhehaote
       City, Inner-Mongolia, China.
     * [8]8th European Symposium on Research in Computer Security
       (ESORICS 2003), October 13-15, Gjøvik, Norway.
     * [9]1st MiAn International Conference on Applied Cryptography and
       Network Security (ACNS'03), October 16-19, Kunming, China.
     * [10]Third International Workshop for Asian PKI (IWAP2003), October
       27-29, Kokura (Kita-Kyushu), Japan.
     * [11]Internation Workshop on Digital Watermarking (IWDW2003),
       October 20-22, Seoul, S. Korea.
     * [12]ACM Workshop on Digital Rights Management (DRM 2003), October
       27, 2003 Washington DC, USA.
     * [13]10th ACM Conference on Computer and Communications Security
       (CCS 2003), October 27-30, Washington, DC, USA.
     * [14]Formal Methods in Security Engineering: From Specification to
       Code (FMSE 2003), October 30, 2003 Washington DC, USA.
     * [15]2nd Workshop on Privacy in the Electronic Society (WPES 2003),
       October 30, 2003 Washington DC, USA.
     * [16]2nd IEEE International Security in Storage Workshop (SISW
       2003), October 31, Washington, DC, USA.
     * [17]Workshop on Security of Ad Hoc and Sensor Networks (SASN '03),
       October 31, Fairfax, VA, USA.
     * [18]30th Annual Computer Security Conference and Exhibition (30th
       Annual), November 3-5, Washington, DC, USA.
     * [19]Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and
       Internal Control in Information Systems (IICIS '03), November
       13-14, Lausanne, Switzerland.
     * [20]RFID Privacy Workshop at MIT (RFIDPRIV03), November 15,
       Cambridge, Massachusetts.
     * [21]The 6th Annual International Conference on Information
       Security and Cryptology (ICISC 2003), November 27-28, Seoul,
       Korea.
     * [22]Asiacrypt 2003, November 30-December 4, Taipei, Taiwan.
     * [23]Worshop on Security of Information Technologies (WSTI'03),
       December 8-10, Algiers, Algeria.
     * [24]Fourth International Conference on Cryptology in India
       (Indocrypt 2003), December 8-10, New Delhi, India.
     * [25]Special Session on Evolutionary Computation in Computer
       Security and Cryptology (CEC2003), December 8-12, Canberra,
       Australia.
     * [26]International Conference on "Number Theory for Secure
       Communications" (icnsen2k3), December 20-21, Kumbakonam, India.
     * [27]DIMACS 2003-2006 Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.
       
  2004
  
     * [28]Advanced Course on Contemporary Cryptology, February 2-13,
       Barcelona, Spain.
     * [29]Fast Software Encryption (FSE 2004), February 5-7, New Delhi,
       India.
     * [30]Network and Distributed System Security Symposium (NDSS'04),
       February 5-7, San Diego, CA, USA.
     * [31]Theory of Cryptography Conference (TCC 2004), February 18-20,
       MIT, Cambridge, MA, USA.
     * [32]International Workshop on Practice and Theory in Public Key
       Cryptography (PKC 2004), March 1-4, Singapore.
     * [33]Eighth International Financial Cryptography Conference (FC
       '04), February 9-12, Key West, Florida, USA.
     * [34]RSA Conference 2004, Cryptographers' Track (CT-RSA '04),
       February 23-27, San Francisco, CA, USA.
     * [35]Eurocrypt 2004, May 2-6, Interlaken, Switzerland.
     * [36]2004 IEEE Symposium on Security and Privacy (IEEE S&P 2004),
       May 9-12, Berkeley, USA.
     * [37]2004 ACM Conference on Electronic Commerce, May 17-21, New
       York, USA.
     * [38]Second Conference of Applied Cryptography and Network Security
       (ACNS '04), June 8-11, Yellow Mountain, China.
     * [39]Crypto 2004, August 15-19, Santa Barbara, California, USA.
     * [40]International Conference on E-Business and Telecommunication
       Networks (ICETE'04), August 25-28, Setúbal, Portugal.
     * [41]Asiacrypt 2004, December 5-9, Jeju Island, Korea.
     * [42]DIMACS 2003-2006 Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.
       
  2005
  
     * [43]International Workshop on Practice and Theory in Public Key
       Cryptography (PKC 2005), January 23-26, Les Diablerets,
       Switzerland.
     * [44]Eurocrypt 2005, May 22-26, Aarhus, Denmark.
     * [45]Crypto 2005, August 14-18, Santa Barbara, California, USA.
     * [46]DIMACS 2003-2006 Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.
     * [47]Asiacrypt 2005, (December), Madras, India.
       
  2006
  
     * [48]Eurocrypt 2006, (May), St. Petersburg, Russia.
     * [49]DIMACS 2003-2006 Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.
       
References

   1. http://www.iacr.org/events/submit.html
   2. http://www.uni-regensburg.de/Fakultaeten/WiWi/pernul/dexa03ws/
   3. http://islab.oregonstate.edu/ches/
   4. http://cs.anu.edu.au/~Chuan.Wu/conference/cans03/
   5. http://www.lc.leidenuniv.nl/lc/web/2003/20030926/info.php3?wsid=98
   6. http://www.hpl.hp.com/conferences/isc03
   7. http://www.cstnet.net.cn/icics2003
   8. http://www.hig.no/esorics2003/
   9. http://acns2003.i2r.a-star.edu.sg/
  10. http://tcsg.csce.kyushu-u.ac.jp/iwap03/
  11. http://www.iwdw.org/
  12. http://www.acm.org/sigs/sigsac/ccs/CCS2003/drm.html
  13. http://www.acm.org/sigs/sigsac/ccs/CCS2003/
  14. http://www.zurich.ibm.com/~mbc/FMSE02
  15. http://seclab.dti.unimi.it/wpes2003/
  16. http://www.stortek.com/hughes/sisw2003
  17. http://www.cs.gmu.edu/sasn/
  18. http://gocsi.com/
  19. http://lbd.epfl.ch/e/conferences/IICIS03/
  20. http://www.rfidprivacy.org/
  21. http://www.icisc.org/
  22. http://conf.ncku.edu.tw/ac03/
  23. http://www.epita.fr/~wsti03
  24. http://www.isical.ac.in/~indocrypt/
  25. http://tracer.uc3m.es/CFP-SS-CEC2003.html
  26. http://www.sastra.edu/icnsen2k3
  27. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  28. http://www.crm.es/ContemporaryCryptology
  29. http://www.isical.ac.in/~fse2004
  30. http://www.isoc.org/isoc/conferences/ndss/04/
  31. http://www-cse.ucsd.edu/users/mihir/tcc/tcc04/
  32. http://pkc2004.lit.org.sg/
  33. http://ifca.ai/fc04/
  34. http://www.rsasecurity.com/rsalabs/cfp_ct_rsa04.html
  35. http://www.zurich.ibm.com/eurocrypt2004/
  36. http://www.ieee-security.org/TC/SP-Index.html
  37. http://research.microsoft.com/acmec04
  38. http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/acns.htm
  39. http://www.iacr.org/conferences/crypto2004/
  40. http://www.icete.org/
  41. http://www.iacr.org/conferences/asiacrypt2004/
  42. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  43. http://www.iacr.org/workshops/pkc2005/
  44. http://www.iacr.org/conferences/eurocrypt2005/
  45. http://www.iacr.org/conferences/crypto2005/
  46. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  47. http://www.iacr.org/conferences/asiacrypt2005/
  48. http://www.iacr.org/conferences/eurocrypt2006/
  49. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/


______________________________________________________________________________

   IACR Contact Information
______________________________________________________________________________


                  Officers and Directors of the IACR (2003)

Officers and directors of the IACR are elected for three year terms. If you
are a member and wish to contact IACR regarding an address change or similar
matter, you should contact the membership services at [iacrmem(at)iacr.org].
See http://www.iacr.org/iacrmem/ for more information.

The numbers in parentheses give the terms of service in calendar years. The
terms of service for conference chairs expire at the end of the calendar
year of the conference.

                                  Officers

  Andrew J. Clark                       Bart Preneel
  President (2002-2004)                 Vice President (2002-2004)
  P.O. Box 743                          Department of Electrical
  Brighton                              Engineering
  East Sussex                           Katholieke Universiteit Leuven
  BN1 5HS                               Kasteelpark Arenberg 10
  United Kingdom                        B-3001 Heverlee
  Tel: +44 1273 270752                  BELGIUM
  Fax: +44 1273 276558                  Tel: +32 16 32 11 48
  Email: president(at)iacr.org          Fax: +32 16 32 19 86
                                        Email: vicepresident(at)iacr.org

  Josh Benaloh                          Susan Langford
  Secretary (2002-2004)                 Treasurer (2002-2004)
  Microsoft Research                    1275 Poplar Ave #101
  One Microsoft Way                     Sunnyvale, CA 94086
  Redmond, WA 98052                     USA
  USA                                   Tel: +1 408 732 4305
  Tel: +1 425 703 3871                  Email: treasurer(at)iacr.org
  Fax: +1 425 936 7329
  Email: secretary(at)iacr.org

                                  Directors

  Don Beaver                            Thomas Berson
  Membership Secretary (2003-2005)      Director (2001-2003)
  Seagate                               Anagram Labs
  Email: donald.beaver(at)seagate.com   P.O. Box 791
                                        Palo Alto CA, 94301
                                        USA
                                        Tel: +1 650 324 0100
                                        Email: berson(at)anagram.com

  Eli Biham                             Christian Cachin
  Director (2002-2004)                  Editor, IACR Newsletter (2002-2004)
  Computer Science Department           IBM Zurich Research Laboratory
  Technion                              Säumerstrasse 4
  Haifa 32000                           CH-8803 Rüschlikon
  Israel                                Switzerland
  Tel: +972 4 8294308                   Tel: +41 1 724 8989
  Fax: +972 4 8294308                   Fax: +41 1 724 8953
  Email: biham(at)cs.technion.ac.il     Email: newsletter(at)iacr.org

  Jan Camenisch                         Alan Chin-Chen Chang
  Eurocrypt 2004 General Chair          Asiacrypt 2003 General Chair
  IBM Zurich Research Laboratory        Department of Computer Science and
  Säumerstrasse 4                       Information Engineering
  CH-8803 Rüschlikon                    National Chung Cheng University
  Switzerland                           160, San-Hsing
  Tel: +41 1 724 8279                   Min-Hsiung, Chiayi
  Fax: +41 1 724 8953                   Taiwan 621
  Email: jca(at)zurich.ibm.com          Tel: +886-5-272-0411, ext. 33100,
                                        23103
                                        Fax: +886-4-232-77425
                                        Email: asiacrypt2003(at)iacr.org

  Ed Dawson                             Yvo Desmedt
  Director (2003-2005)                  Director (2001-2003)
  Director, Information Security        Department of Computer Science
  Research Centre                       Florida State University
  Queensland University of Technology   PO Box 4530, 206 Love Building
  GPO Box 2434                          Tallahassee, FL 32306-4530
  Brisbane, Qld 4001                    USA
  AUSTRALIA                             Tel: +1 850 644 9298
  Tel: +61 7 3864 1919                  Fax: +1 850 644 0058
  Fax: +61 7 3221 2384                  Email: desmedt(at)nu.cs.fsu.edu
  Email: e.dawson(at)qut.edu.au

  Jerzy Gawinecki                       James Hughes
  Eurocrypt 2003 General Chair          Crypto 2004 General Chair
  Institute of Mathematics and          Storage Technology Corp.
  Operations Research                   7600 Boone Avenue North
  Military University of Technology     Brooklyn Park, MN
  Kaliskiego Str. 2, 00-908 Warsaw      USA
  Poland                                Tel: +1 763 424 1676
  Tel: +48 22 6839556                   Fax: +1 763 424 1776
  Fax: +48 22 6839719                   Email: james_hughes(at)stortek.com
  Email:
  j.gawinecki(at)imbo.wat.waw.pl or
  eurocrypt2003(at)iacr.org

  Kwangjo Kim                           Lars Knudsen
  Asiacrypt 2004 General Chair          Director (2001-2003)
  School of Engineering                 Technical University of Denmark
  Information and Communications        Dept. of Mathematics
  Univ.                                 Building 303
  58-4 Hwaam-dong Yusong-ku             DK-2800 Lyngby
  Taejon, 305-348                       DENMARK
  KOREA                                 Tel: +45 4525 3048
  Tel: +82 42 866 6118                  Fax: +45 4588 1399
  Fax: +82 42 866 6154                  Email: knudsen(at)mat.dtu.dk
  Email: kkj(at)icu.ac.kr

  Tsutomu Matsumoto                     Ueli Maurer
  Director (2002-2004)                  Editor-in-Chief, Journal of
  Graduate School of Environment and    Cryptology (2002-2005)
  Information Sciences                  Department of Computer Science
  Yokohama National University          ETH Zürich
  79-7 Tokiwadai, Hodogaya, Yokohama    CH-8092 Zürich
  240-8501, Japan                       Switzerland
  Tel: +81-45-339-4133                  Tel: +41 1 632 7420
  Fax: +81-45-339-4338                  Fax: +41 1 632 1172
  Email:                                Email: maurer(at)inf.ethz.ch or
  tsutomu(at)mlab.jks.ynu.ac.jp         jofc(at)iacr.org

  Kevin S. McCurley                     Jean-Jacques Quisquater
  Director (2002-2004)                  Director (2003-2005)
  6721 Tannahill Drive                  Université catholique de Louvain
  San Jose, CA 95120                    Microelectronic laboratory
  USA                                   Place du Levant, 3
  Tel: +1 408 927 1838                  1348 Louvain-la-Neuve
  Email: mccurley(at)swcp.com           BELGIUM
                                        Tel: +32 10 47 25 41
                                        Fax: +32 10 47 25 98
                                        Email: jjq(at)dice.ucl.ac.be

  Greg Rose                             Rebecca Wright
  Crypto 2003 General Chair             Director (2003-2005)
  Qualcomm Australia                    Department of Computer Science
  Level 3, 230 Victoria Road            Stevens Institute of Technology
  Gladesville NSW 2111                  Castle Point on Hudson
  Australia                             Hoboken, NJ 07030
  Tel: +61 2 9817 4188                  USA
  Fax: +61 2 9817 5199                  Tel: +1 201 216-5328
  Email: crypto2003(at)iacr.org         Fax: +1 201 216-8249
                                        Email:
                                        rwright(at)cs.stevens-tech.edu

  ------------------------------------------------------------------------

                        Other People Working for IACR

 Hilarie Orman
 Archivist
 Email: archive(at)iacr.org

______________________________________________________________________________

   About the IACR Newsletter
______________________________________________________________________________
                                       
   The IACR Newsletter is published three times a year (usually in
   February, June, and October) and only available electronically. It is
   sent to IACR members by email (as a flat ASCII text) and published on
   the web at
   
     http://www.iacr.org/newsletter/
     
   If you are a member of IACR and wish to receive the newsletter, you
   need to make sure that we know your email address! To update your
   email address in the IACR member database, please contact the
   membership services at iacrmem(at)iacr.org .
   
   Contributions, announcements, book announcements or reviews, calls for
   papers ... are most welcome! Please include a URL and/or e-mail
   addresses for any item submitted (if possible). For things that are
   not on the Web, please submit a one-page ASCII version. Send your
   contributions to newsletter(at)iacr.org
   
The next issue

   Deadline for submissions to the next newsletter issue is October 31,
   2003. However, many items will be posted on the website as soon as
   possible.

______________________________________________________________________________

End of IACR Newsletter, Vol. 20, No. 2, Summer 2003.
______________________________________________________________________________