______________________________________________________________________________ ______________________________________________________________________________ IACR Newsletter The newsletter of the International Association for Cryptologic Research. Vol. 21, No. 1, Winter 2004. Published by the International Association for Cryptologic Research Christian Cachin, Editor ______________________________________________________________________________ ______________________________________________________________________________ http://www.iacr.org/newsletter/ ______________________________________________________________________________ Contents ______________________________________________________________________________ * Editorial * President's Message * IACR Fellows * CD-ROM of IACR Conference Proceedings 1998-2003 * Eurocrypt 2004 - Preliminary program * PKC 2005 - Call for Papers * New books + Guide to Elliptic Curve Cryptography * Announcements + First Conference on Email and Anti-Spam (CEAS) - Call for Papers + TISSEC EIC Search * New reports in the Cryptology ePrint Archive * Open positions * Calendar of events in cryptology * IACR contact information ______________________________________________________________________________ Editorial ______________________________________________________________________________ Welcome to the 17th electronic issue of the IACR Newsletter! The first six IACR Fellows have just been announced; congratulations to all! Their designation marks an important step for our community and for IACR, showing that cryptology has enough history so that fundamental contributions can be recognized in this form. Together with Jan Camenisch, I invite you to come to Switzerland for Eurocrypt 2004 - it will be an exciting conference in a beautiful location. The preliminary program is now available. Keep in mind that the deadline for early registration is April 1st, and the deadline for hotel registration is even earlier: March 16th. We look forward to seeing you in Interlaken! Please send your contributions to the Newsletter to newsletter@iacr.org The next issue of the IACR Newsletter is scheduled for publication in June 2004. However, announcements will be posted on the IACR Website as soon as possible. Christian Cachin IACR Newsletter Editor ______________________________________________________________________________ President's Message ______________________________________________________________________________ Dear Fellow Members of IACR. This year sees the Association continuing to expand its promotion of research into cryptology into new areas with a variety of initiatives and activities. Election You will have seen from our last newsletter the results of the 2003 election. Nine candidates stood for the three open positions of Director. Those elected were Arjen Lenstra, Tom Berson and Lars Knudsen. My personal thanks go to them for standing for election and being elected to serve the membership. On that note, please remember that the Board is elected to serve the interests of the Association's members - all of the Board members' details are on our web site, and any of them will be happy to hear from you if you wish to discuss IACR matters. Conferences I was able to attend both Eurocrypt and Crypto in 2003. Both were very well organised and provided the usual high quality programme and stimulating environment for the discussion of research in the field of cryptology. Many of you will have attended our last sponsored conference of the year (Asiacrypt in Taipei). Although I was unable to attend, I was delighted that our Vice-President, Bart Preneel, was able to be there and represent the Board of IACR. He reported that the conference was well attended and well organised. Asiacrypt is a very important conference for IACR as it provides our members in the Asia Pacific areas with a natural focus for presenting their research and meeting other researchers in the field. Running three full conferences (Eurocrypt, Crypto and Asiacrypt) is a major undertaking for the Association. We rely heavily on each of the conference's General Chair and our Secretariat at UCSB to make sure that things run smoothly. You can all help that process by registering for our conferences well before the late payment deadline and save yourselves money in the process. Workshops As well as our three flagship conferences, IACR sponsors workshops in specific areas of cryptology. This year we are pleased to welcome CHES 2004 to our sponsored list. This list is now PKC, FSE and CHES. These are all important workshops that maintain a lower profile than the full conferences, but really do focus on their particular area of interest and provide an ideal forum for publication of leading edge research. I commend our workshops to you and encourage you to attend them if you can. IACR Fellows In 2002 we established the IACR Fellows Program to "recognize outstanding IACR members for technical and professional contributions that: * Advance the science, technology, and practice of cryptology and related fields; * Promote the free exchange of ideas and information about cryptology and related fields; * Develop and maintain the professional skill and integrity of individuals in the cryptologic community; * Advance the standing of the cryptologic community in the wider scientific and technical world and promote fruitful relationships between the IACR and other scientific and technical organizations." I am pleased to report that the Fellows Selection Committee has served us well in selecting the first six IACR Fellows. Their identities and details of their citations are stated elsewhere in this Newsletter. I am looking forward to presenting each of them formally with their awards at the Eurocrypt 2004 banquet in Interlaken. I hope that many of you will take the opportunity to be there and join in the celebration. I would like to thank the Fellows Selection Committee for their diligent work in selecting very worthy individuals to hold this title. And Finally As I prepare the initial working papers for our Board of Directors meeting in Interlaken I realise that the posts of President, Vice-President, Secretary and Treasurer will all be up for election at the end of this year. It really feels a lot less than two years ago that you elected me to be your President. In these two years we have accomplished a great deal with the sponsorship of our workshops, renegotiation of our publishing contract with Springer-Verlag and early work on our own archive and web servers. Mihir Bellare and Christian Cachin continue to maintain the ePrint Archive that is a positive wealth of material for the cryptologic community to digest and is planned to move to our own web servers in due course. Notwithstanding all these efforts, there is still much to be done and I thank you all for your continued support. I look forward to seeing you in Interlaken in May, bringing you up to date on our plans and progress and sharing with you the presentations to our first IACR Fellows. Uf Widerluege in Interlaken! Andy Clark President ______________________________________________________________________________ IACR Fellows ______________________________________________________________________________ The 2004 IACR Fellows are: Tom Berson For visionary and essential service to the IACR and for numerous valuable contributions to the technical, social, and commercial development of cryptology and security. David Chaum For numerous seminal contributions to security and privacy research and for visionary leadership in the role of IACR founder. Don Coppersmith For numerous foundational and highly influential contributions to the theory and practice of cryptosystem design and analysis. Whitfield Diffie For the invention of public-key cryptography. Ron Rivest For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security. Adi Shamir For breakthrough research contributions and for sustained leadership in the technical, educational, and commercial development of cryptology and security. The awards will be presented on May 5, 2004, during Eurocrypt 2004 in Interlaken, Switzerland. ______________________________________________________________________________ CD-ROM of IACR Conference Proceedings 1998-2003 ______________________________________________________________________________ Together with the printed proceedings, the attendees of a Eurocrypt, Crypto or Asiacrypt conference in 2004 will receive a CD-ROM containing the electronic versions of the IACR conference proceedings from 1998 until 2002/2003. The details are still being discussed with Springer-Verlag, but the content may also include some of the recent FSE or PKC workshops. It is planned to make the CD-ROM also available to IACR members who are not attending any of the conferences. Details will be announced at Eurocrypt 2004. ______________________________________________________________________________ Eurocrypt 2004 - Preliminary program ______________________________________________________________________________ Eurocrypt 2004, May 2-6, 2004, Interlaken, Switzerland www.zurich.ibm.com/eurocrypt2004/ All events take place at the Casino Kursaal congress center, except for the rump session and the excursion . *** Sunday, May 2, 2004 17:00-20:00 Registration 19:00-20:30 Welcome Reception *** Monday, May 3, 2004 08:00 Registration 08:50-09:00 Opening Christian Cachin and Jan Camenisch *** Session 1: Private Computation ** Chair: Christian Cachin 09:00-09:25 Efficient Private Matching and Set Intersection Michael J. Freedman and Kobbi Nissim and Benny Pinkas 09:25-09:50 Positive Results and Techniques for Obfuscation Benjamin Lynn and Manoj Prabhakaran and Amit Sahai 09:50-10:15 Secure Computation of the k'th-Ranked Element Gagan Aggarwal and Nina Mishra and Benny Pinkas 10:15-10:45 Coffee Break *** Session 2: Signatures I 10:45-11:10 Short Signatures Without Random Oracles Dan Boneh and Xavier Boyen 11:10-11:35 Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham *** Session 3: IACR Distinguished Lecture ** Chair: Andy Clark 11:35-12:25 tba Whitfield Diffie 12:30-14:00 Lunch *** Session 4: Unconditional Security* 14:15-14:40 On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard and Thomas Pedersen and Louis Salvail 14:40-15:05 The Exact Price for Unconditionally Secure Asymmetric Cryptography Renato Renner and Stefan Wolf 15:05-15:30 On Generating the Initial Key in the Bounded-Storage Model Stefan Dziembowski and Ueli Maurer 15:30-16:00 Coffee Break *** Session 5: Distributed Cryptography 16:00-16:25 Practical Large-scale Distributed Key Generation John Canny and Stephen Sorkin 16:25-16:50 Optimal Communication Complexity of Generic Multicast Key Distribution Daniele Micciancio and Saurabh Panjwani *** Session 6: Foundations I 16:50-17:15 An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem Mihir Bellare and Alexandra Boldyreva and Adriana Palacio 17:15-17:40 Black-Box Composition Does Not Imply Adaptive Security Steven Myers *** Tuesday, May 4, 2004 *** Session 7: Identity-Based Encryption 08:35-09:00 Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti and Shai Halevi and Jonathan Katz 09:00-09:25 Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles Dan Boneh and Xavier Boyen *** Session 8: Elliptic Curves 09:25-09:50 Construction of Secure Random Curves of Genus 2 over Prime Fields Pierrick Gaudry and Éric Schost 09:50-10:15 Projective Coordinates Leak David Naccache and Nigel P. Smart and Jacques Stern 10:15-10:45 Coffee Break *** Session 9: Signatures II 10:45-11:15 Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare and Chanathip Namprempre and Gregory Neven 11:15-11:40 Concurrent Signatures Liqun Chen and Caroline Kudla and Kenneth G. Paterson 11:40-12:05 The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin and Satoshi Obana and Moti Yung 12:10-13:40 Lunch *** Excursion 14:00-18:00 Excursion to Kleine Scheidegg Departs from train station "Interlaken Ost" *** Rump Session ** Chair: Arjen Lenstra 19:00-23:00 Rump Session Buffet opens 19:00, Program starts 19:30. The details will be determined during the conference. *** Wednesday, May 5, 2004 *** Session 10: Public-Key Cryptography 09:00-09:25 Public-Key Steganography Luis von Ahn and Nicholas J. Hopper 09:25-09:50 Immunizing Encryption Schemes from Decryption Errors Cynthia Dwork and Moni Naor and Omer Reingold 09:50-10:15 Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro and Hugo Krawczyk and Tal Rabin 10:15-10:45 Coffee Break *** Session 11: Foundations II 10:45-11:10 On Simulation-Sound Trapdoor Commitments Philip MacKenzie and Ke Yang 11:10-11:35 Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare and Tadayoshi Kohno *** Session 12: Invited Talk ** Chair: Jan Camenisch 11:35-12:25 Paradigms for Multiparty Computation Ivan Damgaard 12:30-14:00 Lunch *** Session 13: Multiparty Computation 14:15-14:40 Multi-Party Computation with Hybrid Security Matthias Fitzi and Thomas Holenstein and Jürg Wullschleger 14:40-15:05 On the Hardness of Information-Theoretic Multiparty Computation Yuval Ishai and Eyal Kushilevitz 15:05-15:30 Dining Cryptographers Revisited Philippe Golle and Ari Juels 15:30-16:00 Coffee Break *** Session 14: Cryptanalysis* 16:00-16:25 Algebraic Attacks and Decomposition of Boolean Functions Willi Meier and Enes Pasalic and Claude Carlet 16:25-16:50 Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron *** Session 15: IACR 16:50-17:50 IACR Membership Meeting Andy Clark 19:30-23:00 Banquet *** Thursday, May 6, 2004 *** Session 16: New Applications 09:00-09:25 Public-Key Encryption with Keyword Search Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano 09:25-09:50 Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data Yevgeniy Dodis and Leonid Reyzin and Adam Smith *** Session 17: Algorithms & Implementation 09:50-10:15 Merkle Tree Traversal in Log Space and Time Michael Szydlo 10:15-10:40 Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 Phong Q. Nguyen 10:40-11:10 Coffee Break *** Session 18: Anonymity 11:10-11:35 Traceable Signatures Aggelos Kiayias and Yiannis Tsiounis and Moti Yung 11:35-12:00 Handcuffing Big Brother: An Abuse-Resilient Transaction Escrow Scheme Stanislaw Jarecki and Vitaly Shmatikov 12:00-12:25 Anonymous Identification in Ad-Hoc Groups Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup 12:25-12:35 Adjourn Christian Cachin and Jan Camenisch 12:35-14:00 Lunch ______________________________________________________________________________ PKC 2005 - Call for Papers ______________________________________________________________________________ PKC 2005 January 23-26, 2005 in "Les Diablerets" Switzerland http://lasecwww.epfl.ch/pkc05/index.html Call for papers Background: For the last few years the International Workshop on Practice and Theory in Public-Key Cryptography has been the main annual workshop focusing on research on all aspects of public-key cryptography. The first workshop was organized in 1998 in Japan. Other PKCs have taken place in Australia, France, Japan, South Korea, Singapore, and USA. Since 2003, PKC is an IACR workshop. PKC has attracted papers from world-renowned scientists in the area. The proceedings of PKC'05 will be published by Springer-Verlag in the Lecture Notes in Computer Science (LNCS) series. Topics of interest: The topics of interest are all aspects of public-key cryptography including theory, design, analysis, implementation, and applications of public-key cryptography. Instructions for Authors: The paper must start with a title, an abstract and keywords. It should be followed by a succinct statement appropriate for a non-specialist reader specifying the subject addressed, its background, the main achievements, and their significance to public-key cryptology. Technical details directed to the specialist should then follow. If accepted, one of the authors is expected to present the paper at the workshop. Submission instructions: Abstracts that have been or will be submitted in parallel to other conferences and workshops that have proceedings are not eligible for submission. A sharp limit of 18 pages in total using the standard LNCS format is placed on all submissions. The submission receipt deadline is August 26, 2004. To submit a paper, email to [mail.png] with: * Submission letter in ASCII text format including the title, author names, address and phone number of the corresponding author, and the abstract. * Source files of the paper submission as well as the final PS or PDF file. It must be a full anonymous paper following the standard LNCS author instructions which can be found at http://www.springer.de/comp/lncs/authors.html Submissions not meeting these guidelines risk rejection without consideration of their merits. Acknowledgment of submissions: An acknowledgment email will be sent to the corresponding author upon receiving each submission. The authors are advised to contact us by email [mail.png] if they do not receive the acknowledgment by August 29. This is to rescue the loss of submission due to the lower and lower reliability of email. Important Dates: Submission Deadline August 26, 2004 Acceptance/Rejection Notification October 28, 2004 Camera Ready Copy November 14, 2004 Program Committee: Carlisle Adams (University of Ottawa, Canada) Feng Bao (Institute for Infocomm Research, Singapore) Yvo Desmedt (Florida State University, USA) Juan Garay (Bell Labs -- Lucent Technologies, USA) Martin Hirt (ETH Zurich, Switzerland) Kwangjo Kim (Information and Communications University, Korea) Kaoru Kurosawa (Ibaraki University, Japan) Anna Lysyanskaya (Brown University, USA) Wenbo Mao (HP Labs Bristol, United Kingdom) David Naccache (Gemplus, France) Kaisa Nyberg (Nokia, Finland) Tatsuaki Okamoto (NTT Labs, Japan) Josef Pieprzyk (Macquarie University, Australia) David Pointcheval (CNRS-ENS, France) Reihaneh Safavi-Naini (University of Wollongong, Australia) Kazue Sako (NEC, Japan) Claus-Peter Schnorr (University of Frankfurt am Main, Germany) Berry Schoenmakers (Technische Universiteit Eindhoven, Netherlands) Nigel Smart (University of Bristol, United Kingdom) Edlyn Teske (University of Waterloo, Canada) Serge Vaudenay (EPFL, Switzerland) Moti Yung (University of Columbia, USA) Yuliang Zheng (University of North Carolina at Charlotte, USA) Program Chair: Prof. Serge Vaudenay, EPFL, LASEC, CH-1015 Lausanne, Switzerland General Chairs: Prof. Serge Vaudenay, EPFL, LASEC, CH-1015 Lausanne, Switzerland Jean Monnerat, EPFL, LASEC, CH-1015 Lausanne, Switzerland ______________________________________________________________________________ New Books ______________________________________________________________________________ This page lists new books about cryptology, and occasionally reviews one. Guide to Elliptic Curve Cryptography Guide to Elliptic Curve Cryptography Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone Springer Professional Computing Series ISBN: 0-387-95273-X, 332pp, published January 2004 US$ 59.95, EUR 72,98 After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Contents 1 Introduction and Overview 2 Finite Field Arithmetic 3 Elliptic Curve Arithmetic 4 Cryptographic Protocols 5 Implementation Issues Appendix A Sample Parameters Appendix B ECC Standards Appendix C Software Tools Bibliography Index Author web site: http://www.cacr.math.uwaterloo.ca/ecc/ _________________________________________________________________ Please send your new book announcements to the newsletter editor at newsletter at iacr.org ______________________________________________________________________________ Announcements ______________________________________________________________________________ ** The First Conference on Email and Anti-Spam (CEAS) - Call for Papers The First Conference on Email and Anti-Spam (CEAS) Preliminary Call for Papers July 30, 31 and August 1, 2004 Mountain View, CA Immediately Follows AAAI 2004 http://www.ceas.cc In Cooperation with AAAI and IEEE Technical Committee on Security and Privacy General Conference Chair: David Heckerman (Microsoft Research) Program Co-Chairs: * Tom Berson (Anagram Laboratories) * Joshua Goodman (Microsoft Research) * Andrew Ng (Stanford University) The Conference on Email and Anti-Spam invites the submission of papers for its first meeting, held in cooperation with AAAI (the American Association for Artificial Intelligence) and the IEEE Technical Committee on Security and Privacy. Papers are invited on all aspects of email and spam, including research papers, industry reports, and law and policy papers. + Research: Computer science oriented academic-style research + Industry: Descriptions of important or innovative products + Law and Policy: Legal and policy papers Research papers include experimental or theoretical, academic-style papers on all aspects of email and spam, including but not limited to: + Techniques for stopping spam, including # Machine learning techniques # Postage techniques (HIPs or computation, possibly in response to a challenge) # Disposable email addresses # Protocols for sender authentication and verification # Digital signatures # Proof of group membership # Role and significance of spam as a malware vector # Spam traceback + New features for email systems # Automatic foldering # Sorting, clustering, or searching email, including both machine learning techniques and user interface research. # Advanced calendaring and scheduling # Digital rights management research as applied to email # Public Key Infrastructure in an email environment Industry papers describe products or systems (commercial or open source) and matters of commercial or practical interest. Papers claiming excellent results should include good experimental or theoretical evidence supporting the claims. Example topics include + Industry cooperation for stopping spam + New standards and interoperability # For spam # For calendaring and scheduling # Public key infrastructure for encryption and identity # Digital rights management + New products, especially those with novel features Legal and policy papers focus on topics such as + What new laws or social institutions are most appropriate for spam or other email topics? + Legal strategies for stopping spam + The CAN-SPAM act and potential FTC regulations + International legal approaches + What can and should be done about Phisher scams and other email scams? + The economics of spam + Email and identity: who should control it? + Email and privacy, email at work. In all three areas, submissions closely related to email, such as instant messaging, chat rooms, usenet groups, and mailing lists will also be given full consideration. KEY DATES: Paper Submission Deadline: April 16 Notification of acceptance: June 1 Final camera-ready version of papers: July 1 Main Conference: July 30 and 31 Workshops: August 1 REQUIREMENTS: Papers may be of one of two types: extended abstracts (two pages) or full papers (at most 8 pages, including appendices and bibliography). Work may not have been previously published in any conference or journal, and simultaneous submissions are not allowed. Papers will be reviewed by a committee from academic and industrial research centers. Papers should be 11 point in single column format. Accepted papers will be made freely available on the web, and will be published on CD-ROM. Authors will retain copyright of their work. A call for workshop proposals will follow this call for papers. Suggestions for panel discussions are also welcome, and should be sent to the Program Chairs at information@ceas.cc . PROGRAM COMMITTEE: Click for current list CONTACT: information@ceas.cc ** TISSEC EIC Search TISSEC EIC Search Nominations are invited for the next Editor-in-Chief of ACM Transactions on Information and System Security. Self-nominations are welcome. Candidates should be well-established researchers in Computer Security who have sufficient experience serving on program committees and journal editorial boards. Candidates are asked to send a current curriculum vita and a brief (one to three pages) statement of vision for TISSEC to: Gul Agha, Chair, ACM TISSEC EIC Search Committee, , by April 20, 2004. Nominations received after April 20 will be considered up until the position has been filled. ______________________________________________________________________________ New Reports in the Cryptology ePrint Archive ______________________________________________________________________________ (The list contains reports posted since the last newsletter issue appeared.) 2004/074 ( PS PS.GZ PDF ) Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael Liam Keliher and Henk Meijer and Stafford Tavares 2004/073 ( PS PS.GZ ) Index calculus for abelian varieties and the elliptic curve discrete logarithm problem Pierrick Gaudry 2004/072 ( PS PS.GZ PDF ) Asymmetric Cryptography: Hidden Field Equations Christopher Wolf and Bart Preneel 2004/071 ( PS PS.GZ PDF ) An IBE Scheme to Exchange Authenticated Secret Keys Benits Jr, Waldyr and Terada, Routo 2004/070 ( PS PS.GZ PDF ) Easy decision-Diffie-Hellman groups Steven D Galbraith and Victor Rotger 2004/069 ( PS PS.GZ ) A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai 2004/068 ( PDF ) Synthesis of Secure FPGA Implementations Kris Tiri and Ingrid Verbauwhede 2004/067 ( PDF ) Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis Kris Tiri and Ingrid Verbauwhede 2004/066 ( PDF ) A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC's. Kris Tiri and Ingrid Verbauwhede 2004/065 ( PS PS.GZ PDF ) Refinements of Miller's Algorithm for Computing Weil/Tate Pairing Ian Blake, Kumar Murty, and Guangwu Xu 2004/064 ( PS PS.GZ ) Pairing-Based Cryptography : A Survey Ratna Dutta and Rana Barua and Palash Sarkar 2004/063 ( PS PS.GZ ) Computationally Private Information Retrieval with Quasilogarithmic Total Communication Helger Lipmaa 2004/062 ( PS PS.GZ PDF ) On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions John Black and Martin Cochran and Thomas Shrimpton 2004/061 ( PS PS.GZ PDF ) Rank Attacks and Defence in Tame-Like Multivariate PKC's Bo-Yin Yang and Jiun-Ming Chen 2004/060 ( PS PS.GZ PDF ) Positive Results and Techniques for Obfuscation Benjamin Lynn and Manoj Prabhakaran and Amit Sahai 2004/059 ( PS PS.GZ ) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library Michael Backes and Birgit Pfitzmann 2004/058 ( PS PS.GZ PDF ) Generating more MNT elliptic curves Michael Scott and Paulo S.L.M Barreto 2004/057 ( PS PS.GZ PDF ) On Multiple Linear Approximations Alex Biryukov and Christophe De Canni\`ere and Michael Quisquater 2004/055 ( PS PS.GZ PDF ) Redundant Trinomials for Finite Fields of Characteristic $2$ Christophe Doche 2004/054 ( PS PS.GZ PDF ) Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng 2004/053 ( PS PS.GZ PDF ) Efficient and Universally Composable Committed Oblivious Transfer and Applications Juan Garay and Philip MacKenzie and Ke Yang 2004/052 ( PS PS.GZ PDF ) The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin and Satoshi Obana and Moti Yung 2004/051 ( PS PS.GZ PDF ) Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang and Michael Mitzenmacher 2004/050 ( PS PS.GZ PDF ) Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1 Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen 2004/049 ( PS PS.GZ ) Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm Christophe Clavier 2004/048 ( PS PS.GZ PDF ) Tail-MAC Scheme for Stream Ciphers and Example Application with VMPC Bartosz Zoltak 2004/047 ( PS PS.GZ ) On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes Yodai Watanabe 2004/046 ( PS PS.GZ PDF ) Tractable Rational Map Cryptosystem Lih-Chung Wang and Fei-Hwang Chang 2004/045 ( PS PS.GZ PDF ) Lower Bounds and Impossibility Results for Concurrent Self Composition Yehuda Lindell 2004/044 ( PS PS.GZ PDF ) Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing 2004/043 ( PS PS.GZ PDF ) Multi-sequences with d-perfect property Xiutao Feng, Quanlong Wang and Zongduo Dai 2004/042 ( PDF ) Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge Joseph K. Liu and Victor K. Wei and Duncan S. Wong 2004/041 ( PS PS.GZ ) Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries Cheng-Kang Chu and Wen-Guey Tzeng 2004/040 ( PS PS.GZ PDF ) Cryptanalysis of a timestamp-based password authentication scheme Lizhen Yang, Kefei Chen 2004/039 ( PDF ) A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups Victor K. Wei 2004/038 ( PS PS.GZ PDF ) Chameleon Hashing without Key Exposure Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim 2004/037 ( PS PS.GZ ) A Provably Secure Scheme for Restrictive Partially Blind Signatures Fuw-Yi Yang and Jinn-Ke Jan 2004/036 ( PS PS.GZ PDF ) Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang 2004/035 ( PDF ) Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance Phillip Rogaway and Thomas Shrimpton 2004/034 ( PDF ) s(n) An Arithmetic Function of Some Interest, and Related Arithmetic Gideon Samid 2004/033 ( PS PS.GZ PDF ) New Approaches to Password Authenticated Key Exchange based on RSA Muxiang Zhang 2004/032 ( PS PS.GZ PDF ) Compressed Pairings Michael Scott and Paulo S. L. M. Barreto 2004/031 ( PS PS.GZ PDF ) Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev 2004/030 ( PDF ) Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$. Colin Stahlke 2004/029 ( PDF ) Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar 2004/028 ( PDF ) Verifiable Encryption in Anonymous Ad Hoc Groups Joseph K. Liu and Victor K. Wei and Duncan S. Wong 2004/027 ( PDF ) Linkable and Anonymous Signature for Ad Hoc Groups Joseph K. Liu and Victor K. Wei and Duncan S. Wong 2004/026 ( PS PS.GZ PDF ) The CSQUARE Transform Tom St Denis 2004/025 ( PDF ) Clarifying Obfuscation: Improving the Security of White-Box Encoding Hamilton E. Link and William D. Neumann 2004/024 ( PS PS.GZ PDF ) Exponential S-boxes Sergey Agievich and Andrey Afonenko 2004/023 ( PDF ) RDS: Remote Distributed Scheme for Protecting Mobile Agents Asnat Dadon-Elichai 2004/022 ( PS PS.GZ PDF ) Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin and William R. Cheswick 2004/021 ( PS PS.GZ PDF ) Externalized Fingerprint Matching Claude Barral and Jean-S\'{e}bastien Coron and David Naccache 2004/020 ( PS PS.GZ PDF ) Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish 2004/019 ( PS PS.GZ PDF ) New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms Tetsu Iwata and Tadayoshi Kohno 2004/018 ( PS PS.GZ PDF ) Corrections of the NIST Statistical Test Suite for Randomness Song-Ju Kim and Ken Umeno and Akio Hasegawa 2004/017 ( PS PS.GZ ) Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints M. Scott 2004/016 ( PS PS.GZ PDF ) A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer Dennis Hofheinz and Joern Mueller-Quade 2004/015 ( PDF ) An AGM-type elliptic curve point counting algorithm in characteristic three Trond St{\o}len Gustavsen and Kristian Ranestad 2004/014 ( PS PS.GZ PDF ) Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions Sugata Gangopadhyay and Subhamoy Maitra 2004/013 ( PS PS.GZ PDF ) Cryptanalysis of a Provably Secure Cryptographic Hash Function Jean-Sebastien Coron and Antoine Joux 2004/012 ( PS PS.GZ PDF ) Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Maria Isabel Gonzalez Vasco and Rainer Steinwandt 2004/011 ( PDF ) Known-Plaintext Attack Against a Permutation Based Video Adam J. Slagell 2004/010 ( PDF ) Fast Pseudo-Hadamard Transforms Tom St Denis 2004/009 ( PS PS.GZ PDF ) Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay and Philip MacKenzie and Ke Yang 2004/008 ( PS PS.GZ PDF ) The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols Mihir Bellare and Adriana Palacio 2004/007 ( PS PS.GZ PDF ) Traceable Signatures Aggelos Kiayias and Yiannis Tsiounis and Moti Yung 2004/006 ( PS PS.GZ ) Protocol Initialization for the Framework of Universal Composability Boaz Barak and Yehuda Lindell and Tal Rabin 2004/005 ( PDF ) Universal Undeniable Signatures Huafei Zhu 2004/004 ( PS PS.GZ PDF ) Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo 2004/003 ( PS PS.GZ ) On the Role of the Inner State Size in Stream Ciphers Erik Zenner 2004/002 ( PS PS.GZ PDF ) Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation Yuichi Komano and Kazuo Ohta 2003/265 ( PS PS.GZ ) Concurrent Zero-Knowledge with Concurrent Soundness in the Bare Public-Key Model Yunlei ZHAO 2003/264 ( PS PS.GZ ) Inversion of Several Field Elements: A New Parallel Algorithm Pradeep Kumar Mishra and Palash Sarkar 2003/263 ( PS PS.GZ PDF ) Security Analysis of Lal and Awasthi's Proxy Signature Schemes Manik Lal Das and Ashutosh Saxena and V P Gulati 2003/262 ( PS PS.GZ PDF ) A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow 2003/261 ( PS PS.GZ PDF ) A provably secure ID-based ring signature scheme Javier Herranz and Germ\'an S\'aez 2003/260 ( PDF ) An Improved ID-based Authenticated Group Key Agreement Scheme Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang 2003/259 ( PS PS.GZ PDF ) Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang and Xiaofeng Chen 2003/258 ( PDF ) Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices. Marcin Rogawski 2003/257 ( PS PS.GZ PDF ) Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery 2003/256 ( PDF ) On the Security of a Multi-Party Certified Email Protocol Jianying Zhou 2003/255 ( PS PS.GZ PDF ) Improved Constructions for Universal Re-encryption. Peter Fairbrother 2003/254 ( PDF ) Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner and Amir Herzberg ______________________________________________________________________________ Open Positions in Cryptology ______________________________________________________________________________ IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web at http://www.iacr.org/jobs/ and also included in the IACR Newsletter that is sent to members three times per year. To advertise your job opportunities, please send a description of no more than 150 words in plain ASCII text by email to jobs(at)iacr.org. This should include an URL and further contact information. No attachments or word documents, please! (Submissions in other formats than text will not be posted.) As this is intended to be a service to the members of IACR, it is free for all members. We ask that commercial enterprises who want to advertise their openings identify at least one of their employees who is a member of IACR. (IACR does not know corporate membership.) Please contact the membership secretariat to become a member of IACR. On top of that, IACR accepts donations and is always looking for sponsors for its conferences. _________________________________________________________________ Katholieke Universiteit Leuven The research group COSIC of the Katholieke Universiteit Leuven has been founded in 1979. The group currently has 27 researchers and graduate students (from 12 nationalities) working in the area of cryptology and its applications. The group wants to hire 2 PhD students who will contribute to a new European collaborative research project in the area of privacy and identity management. Under the co-supervision of David Chaum, the students will work on innovative cryptographic techniques and solutions for identity management schemes. We are looking for strong candidates with an undergraduate degree in computer science or mathematics; successful candidates would have a good theoretical background and some understanding of security applications. We will also consider applicants at the postdoctoral level with a PhD degree relevant to the research topic. For further details see http://www.esat.kuleuven.ac.be/cosic The closing date for applications is May 14, 2004. (14-Mar-04) _________________________________________________________________ Technical University of Denmark, Copenhagen Associate/assistant professorship in cryptology The Department of Mathematics (www.mat.dtu.dk) at the Technical University of Denmark is looking for a dynamic faculty member to participate in teaching and research in mathematics and its applications. The position can be filled immediately. Through the position the University seeks to strengthen the research within cryptology. This applies both to the mathematical aspects of the field (cryptography and cryptanalysis) and applications in information technology. More details are available at http://www.adm.dtu.dk/job/sos0104-2_e.htm For more information please contact Professor Lars R. Knudsen, http://www.ramkilde.com/ (24-Feb-04) _________________________________________________________________ University of Waterloo, CANADA Postdoctoral Position in Cryptography at the University of Waterloo, Canada Applications are invited for one-year or two-year postdoctoral positions in any area of cryptography. The starting date of the appointment is open. A Ph.D. and proven ability, or the potential, for excellent research is required. Successful candidates will be joining a substantial research and training centre in cryptography at the Centre for Applied Cryptographic Research (CACR). Information about CACR personnel and activities can be found at www.cacr.math.uwaterloo.ca Interested individuals should send a curriculum vitae, research plan, 2 or 3 selected reprints/preprints, and the names of three references to: Cryptography PDFs Department of Combinatorics and Optimization Faculty of Mathematics University of Waterloo Waterloo, Ontario, Canada N2L 3G1 email: combopt@math.uwaterloo.ca Closing date for the receipt of applications is May 31, 2004. Some applications may be processed as they are received. ============================================================================ (24-Feb-04) _________________________________________________________________ Microsoft Corp. Architect/Program Manager (NGSCB - Hardware Security) Come work on exciting new initiatives at Microsoft! The security compliance program manager builds a framework to promote good 3rd party implementations of our security technology. Specifically, you will be defining technical requirements for hardware partners who are helping to build the Next Generation Secure Computing Base (NGSCB, http://www.microsoft.com/ngscb). We're looking for an experienced technical Program Manager with at least an undergraduate degree in computer science and a minimum of three years working on the Windows client platform and PC architecture, including involvement shipping hardware product. In addition to having a strong technical background, this person must be a self-starter, a strong written and oral communicator, and able to work effectively across organizations. You will be required to travel ~20% of the time (mostly domestic). Please send your resume to sec_jobs@microsoft.com if you would like top apply. (17-Feb-04) _________________________________________________________________ Microsoft Corp. Program Manager (Rights Management) Come join the effort to build the next generation of digital asset protection technology! You support two initiatives: software-based Windows Rights Management (RM) and the hardware-based Next Generation Secure Computing Base (NGSCB, ). Your role is to help our partners who write to our platform build highly secure software implementations against these technologies. Were looking for an experienced technical PM with at least an undergraduate degree in computer science and a minimum of three years working on the Windows client platform in PCs, including actually shipping product. Familiarity with Win32 APIs preferred. In addition to having a strong technical background, this person must be a self-starter, a strong written and oral communicator, and able to work effectively across organizations. Please send your resume to sec_jobs@microsoft.com if you would like to apply. (17-Feb-04) _________________________________________________________________ University of Bergen, Norway Post doc in Cryptography at University of Bergen, Norway The Department of Informatics, University of Bergen, Norway, has a vacant position as a post-doc researcher in cryptography. The position will be for 2 years with possibilities for a one year extension. The post-doc researcher will work on the research project "Advanced Cryptographic Techniques", which will focus on cryptographic techniques in order to construct and analyze cryptographic algorithms and protocols. In particular the project aims to develop methods that also involve the interaction between coding theory and cryptography. The post-doc. researcher will work at the Selmer Center, a research center in reliable and secure communication, consisting of the coding/crypto group at the Department of Informatics. The research group has 5 professors, 1 adjunct professor, 3 post-docs, and 5 dr.scient. students. For more information of the group and ongoing research one should consult http://www.selmer.uib.no/ Further information about the position can be obtained from Professor Tor Helleseth, The Selmer Center, on phone (+47) 55 58 41 60 (or e-mail Tor.Helleseth@ii.uib.no). The application should be submitted in 3 (three) copies, and must contain a complete overview of education, degrees, previous positions and other professional activities, published scientific papers and a complete list of those. The application should be sent to Department of Informatics, University of Bergen, PB 7800, N-5020 Bergen, Norway, before March 1, 2004. (29-Jan-04) _________________________________________________________________ NISlab, Gjøvik University College, Norway NISlab, Gjøvik University College, Norway - 1-2 Professor/Associate Professor Information Security - 2 PhD grants - 1 Post. Doc. researcher More details are available at http://nislab.hig.no/People/Jobs/ For further information, please contact Professor Einar Snekkenes, phone +47 61 13 52 25. email: einar.snekkenes@hig.no. Deadline for application is April 1. 2004. (14-Jan-04) _________________________________________________________________ Centre for Information Security, University of Wollongong Associate Research Fellow/Research Fellow Centre for Information Security Fixed Term 2 years The Centre for Information Security is seeking to appoint an Associate Research Fellow / Research Fellow to work on the project Privacy Enhancing Technologies for Digital Communications. The project is funded by an Australian Research Council Discovery Grant and is for a period of 2 years Essential criteria: PhD (or submitted thesis) in Computer Science, Mathematics or related field; Strong background in cryptography or algorithm design and analysis; Demonstrated background in mathematics (finite mathematics, algebra, number theory); Good organisational, interpersonal, and written communication skills. Candidates should also be familiar with security systems and algorithms. Preference will be given to those with research background in theoretical security. For a Fellowship appointment a strong publication record in related areas is also required. Please address the criteria above in your application and indicate the level at which you are applying or whether you wish to be considered at both levels. Annual Salary (Associate Research Fellow) $37,861 to $51,381 per annum, (Research Fellow) $54,085 to $64,226 per annum plus generous superannuation and access to salary packaging. For further details please contact: Professor Safavi-Naini on telephone +61 24221 3800. Please quote reference number 20-751 in your application. Applications close 21st January 2004. How to apply: See our website http://www.uow.edu.au/vacancies/ for more information and instructions. Please address the Selection Criteria and include your CV. Applications should be emailed to jobs@uow.edu.au (12-Jan-04) _________________________________________________________________ National ICT Australia Limited National ICT Australia (NICTA) is seeking an outstanding Research Program Leader to provide inspirational leadership for a new Program in Security and Trust Management in its Canberra Research Laboratory. Program Leader responsibilities: * Providing research leadership for the Program; * Contributing to the development of research priorities, research training, supervision of PhD students, and collaborative project formation; * Attracting and hiring research staff for the program; * Building linkages to other institutions, industry (both Australian and international), relevant government agencies and promoting commercialisation activities. Remuneration: Senior research management role. Package within the range of $A135,000 to $A250,000 (salary plus superannuation) depending on qualifications and experience. You will receive a responsibility loading and participation in NICTA's performance incentive scheme. Further information, detailing the information required from all applicants, is available on the NICTA website (http://www.nicta.com.au). Applications should be lodged with jobs@nicta.com.au by 20 March 2004 (12-Jan-04) _________________________________________________________________ Royal Holloway, University of London Chair of Information Security A professorial position is available with the Information Security Group at Royal Holloway (University of London). Applicants will be expected to have a proven outstanding record of academic achievement in the area of cryptology or some other area related to information security. The Information Security Group currently has 14 permanent staff and undertakes research in all areas of information security, as well as running a large Doctoral and Masters programmes. Further details about the Information Security Group are available at http://www.isg.rhul.ac.uk and about this position at http://www.rhul.ac.uk/Personnel/AcademicAdvertDec03/isgprof589/Information. html (07-Jan-04) ______________________________________________________________________________ IACR Calendar of Events in Cryptology ______________________________________________________________________________ The IACR calendar lists events (conferences, workshops, ...) that may be of interest to IACR members or deal with research in cryptology. If you want to have an event listed here, please fill out this form or send email to webmaster(at)iacr.org . (The current condition for being listed here is that the description of an event must contain the substring "crypt" anywhere.) 2004 * [2]DIMACS/PORTIA Workshop and Working Group on Privacy-Preserving Data Mining, March 15-17, Piscataway, NJ. * [3]ITCC 2004 Special Track on Information Assurance and Security (ITCC 2004), April 5-7, Las Vegas, NV, USA. * [4]3rd Annual PKI R&D Workshop (pki04), April 12-14, Gaithersburg, MD, USA. * [5]Eurocrypt 2004, May 2-6, Interlaken, Switzerland. * [6]2004 IEEE Symposium on Security and Privacy (IEEE S&P 2004), May 9-12, Berkeley, USA. * [7]Fourth conference on the Advanced Encryption Standard (AES) (AES4), May 10-12, Bonn, Germany. * [8]International Conference on Data Privacy and Security in a Global Society (Data Security 2004), May 11-13, Skiathos, Greece. * [9]The Third Annual Workshop on Economics and Information Security (WEIS04), May 13-14, Minneapolis, USA. * [10]2004 ACM Conference on Electronic Commerce, May 17-21, New York, USA. * [11]6th Information Hiding Workshop (IH2004), May 23-25, Toronto, Canada. * [12]Workshop on Privacy Enhancing Technologies (PET'04), May 26-28, Toronto, Canada. * [13]Yet Another Conference on Cryptography (YACC'04), June 1-5, Porquerolles Island, France. * [14]Second Conference of Applied Cryptography and Network Security (ACNS '04), June 8-11, Yellow Mountain, China. * [15]36th Annual ACM Symposium on Theory of Computing (STOC), June 13-15, Chicago, USA. * [16]Payments and Security 2004 (Paysec2004), June 18-19, London, England. * [17]2004 IEEE CEC Special Session on Evolutionary Computation in Cryptology and Computer Security (IEEE CEC 2004), June 20-23, Portland, USA. * [18]1st European PKI Workshop. Research and Applications (EuroPKI'04), June 25-26, Samos Island, Greece. * [19]International Conference on Dependable Systems and Networks (DSN-2004), June 28-July 1, Florence, Italy. * [20]Fourth Central European Conference on Cryptology (WartaCrypt'04), July 1-3, Bedlewo, Poland. * [21]Cryptographic Algorithms and their Uses, July 5-6, Gold Coast, Australia. * [22]Polynomial-Based Cryptography, July 7-12, Melbourne, Australia. * [23]PORTIA Workshop on Sensitive Data in Medical, Financial, and Content-Distribution Systems, July 8-9, Stanford (CA), USA. * [24]The 9th Australasian Conference on Information Security and Privacy (ACISP04), July 13-15, Sydney, Australia. * [25]23rd Symposium on Principles of Distributed Computing (PODC 2004), July 25-28, St. John's, Newfoundland, Canada. * [26]The First Conference on Email and Anti-Spam (CEAS), July 30-August 1, Mountain View, CA, USA. * [27]1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), August 5-6, Heidelberg, Germany. * [28]11th Annual Workshop on Selected Areas in Cryptography (SAC 2004), August 9-10, Waterloo, Canada. * [29]13th USENIX Security Symposium, August 9-13, San Diego, CA, USA. * [30]Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), August 11-13, Cambridge (Boston), USA. * [31]Crypto 2004, August 15-19, Santa Barbara, California, USA. * [32]The 5th International Workshop on Information Security Applications (WISA2004), August 23-25, Ramada Plaza, Jeju Island, Korea. * [33]International Conference on E-Business and Telecommunication Networks (ICETE'04), August 25-28, Setúbal, Portugal. * [34]First International Conference on Trust and Privacy in Digital Business (Trustbus '04), September 1-3, Zaragoza, Spain. * [35]Fourth Conference on Security in Communication Networks '04 (SCN04), September, 8-10, Amalfi, Italy. * [36]9th European Symposium on Research in Computer Security (ESORICS 2004), September 13-15, Sophia Antipolis, France. * [37]Reunion Española sobre Criptologia y Seguridad de la Informacion (RECSI2004), 15-17 September, Madrid, Spain. * [38]8th Workshop on Elliptic Curve Cryptography (ECC 2004), September 20-22, Bochum, Germany. * [39]The International Conference of Computer Safety, Reliability and Security (SAFECOMP 2004), September 21-24, Potsdam, Germany. * [40]7th Information Security Conference (ISC'04), September 27-29, Palo Alto, CA, USA. * [41]11th ACM Conference on Computer and Communications Security (CCS 2004), October 25-29, Washington, DC, USA. * [42]Sixth International Conference on Information and Communications Security (ICICS'04), October 27-29, Malaga, Spain. * [43]2nd ACM Workshop on Formal Methods in Security Engineering (FMSE '04), October 29, Washington DC, USA. * [44]Asiacrypt 2004, December 5-9, Jeju Island, Korea. * [45]5th International Conference on Cryptology in India (INDOCRYPT 2004), December 20-22, Chennai (Madras), India. * [46]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. 2005 * [47]International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005), January 23-26, Les Diablerets, Switzerland. * [48]RSA Conference 2005, Cryptographers' Track (CT-RSA '05), February 14-18, San Francisco, USA. * [49]Eurocrypt 2005, May 22-26, Aarhus, Denmark. * [50]Crypto 2005, August 14-18, Santa Barbara, California, USA. * [51]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. * [52]Asiacrypt 2005, (December), Madras, India. 2006 * [53]Eurocrypt 2006, (May), St. Petersburg, Russia. * [54]DIMACS 2003-2006 Special Focus on Communication Security and Information Privacy, 2003-2006, DIMACS Center, Rutgers University, USA. Past events are [55]archived here. _________________________________________________________________ References 1. http://www.iacr.org/events/submit.html 2. http://dimacs.rutgers.edu/Workshops/Privacy/ 3. http://www.cs.okstate.edu/~aa/itcc04/itcc04.html 4. http://middleware.internet2.edu/pki04/ 5. http://www.zurich.ibm.com/eurocrypt2004/ 6. http://www.ieee-security.org/TC/SP-Index.html 7. http://www.aes4.org/ 8. http://www.wessex.ac.uk/conferences/2004/datasecurity04/index.html 9. http://www.dtc.umn.edu/weis2004 10. http://research.microsoft.com/acmec04 11. http://msrcmt.research.microsoft.com/IH2004/ 12. http://petworkshop.org/2004/ 13. http://grim.univ-tln.fr/YACC04/ 14. http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/acns.htm 15. http://people.cs.uchicago.edu/~stoc04/stoc04.html 16. http://www.enhyper.com/paysec 17. http://www.cs.unr.edu/~sushil/cec/ 18. http://www.aegean.gr/EuroPKI2004 19. http://www.dsn.org/dsn2004.html 20. http://wartacrypt.im.pwr.wroc.pl/ 21. http://www.isrc.qut.edu.au/events/eracom2004/ 22. http://www.it.deakin.edu.au/cryptography2004/ 23. http://crypto.stanford.edu/portia/workshops/2004_7.html 24. http://www.ics.mq.edu.au/~acisp04 25. http://www.podc.org/podc2004/ 26. http://www.ceas.cc/ 27. http://www.netlab.nec.de/esas/esas2004.html 28. http://www.vlsi.uwaterloo.ca/~sac04 29. http://www.usenix.org/events/sec04/ 30. http://www.chesworkshop.org/ches2004/ 31. http://www.iacr.org/conferences/crypto2004/ 32. http://dasan.sejong.ac.kr/~wisa04/ 33. http://www.icete.org/ 34. http://www-ifs.uni-regensburg.de/trustbus04/ 35. http://www.dia.unisa.it/conferences/SCN04/ 36. http://esorics04.eurecom.fr/ 37. http://www.iacr.org/events/www.uc3m.es/recsi 38. http://www.cacr.math.uwaterloo.ca/conferences/2004/ecc2004/announcement.html 39. http://www.safecomp.org/ 40. http://isc04.uncc.edu/ 41. http://www.acm.org/sigs/sigsac/ccs/CCS2004/ 42. http://icics04.lcc.uma.es/ 43. http://www.zurich.ibm.com/~mbc/FMSE04 44. http://www.iacr.org/conferences/asiacrypt2004/ 45. http://www-rocq.inria.fr/codes/indocrypt2004/ 46. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 47. http://www.iacr.org/workshops/pkc2005/ 48. http://www.rsasecurity.com/rsalabs/cfp_ct_rsa05.html 49. http://www.iacr.org/conferences/eurocrypt2005/ 50. http://www.iacr.org/conferences/crypto2005/ 51. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ 52. http://www.iacr.org/conferences/asiacrypt2005/ 53. http://www.iacr.org/conferences/eurocrypt2006/ 54. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/ ______________________________________________________________________________ IACR Contact Information ______________________________________________________________________________ Officers and Directors of the IACR (2004) Officers and directors of the IACR are elected for three year terms. If you are a member and wish to contact IACR regarding an address change or similar matter, you should contact the membership services at [iacrmem(at)iacr.org]. See http://www.iacr.org/iacrmem/ for more information. The numbers in parentheses give the terms of service in calendar years. The terms of service for conference chairs expire at the end of the calendar year of the conference. Officers Andrew J. Clark Bart Preneel President (2002-2004) Vice President (2002-2004) P.O. Box 743 Department of Electrical Brighton Engineering East Sussex Katholieke Universiteit Leuven BN1 5HS Kasteelpark Arenberg 10 United Kingdom B-3001 Heverlee Tel: +44 1273 270752 BELGIUM Fax: +44 1273 276558 Tel: +32 16 32 11 48 Email: president(at)iacr.org Fax: +32 16 32 19 86 Email: vicepresident(at)iacr.org Josh Benaloh Susan Langford Secretary (2002-2004) Treasurer (2002-2004) Microsoft Research 1275 Poplar Ave #101 One Microsoft Way Sunnyvale, CA 94086 Redmond, WA 98052 USA USA Tel: +1 408 732 4305 Tel: +1 425 703 3871 Email: treasurer(at)iacr.org Fax: +1 425 936 7329 Email: secretary(at)iacr.org Directors Thomas Berson Eli Biham Director (2004-2006) Director (2002-2004) Anagram Labs Computer Science Department P.O. Box 791 Technion Palo Alto CA, 94301 Haifa 32000 USA Israel Tel: +1 650 324 0100 Tel: +972 4 8294308 Email: berson(at)anagram.com Fax: +972 4 8294308 Email: biham(at)cs.technion.ac.il Christian Cachin Jan Camenisch Editor, IACR Newsletter (2002-2004) Eurocrypt 2004 General Chair IBM Zurich Research Laboratory IBM Zurich Research Laboratory Säumerstrasse 4 Säumerstrasse 4 CH-8803 Rüschlikon CH-8803 Rüschlikon Switzerland Switzerland Tel: +41 1 724 8989 Tel: +41 1 724 8279 Fax: +41 1 724 8953 Fax: +41 1 724 8953 Email: newsletter(at)iacr.org Email: jca(at)zurich.ibm.com Ivan Damgård Ed Dawson Eurocrypt 2005 General Chair Director (2003-2005) Department of Computer Science Director, Information Security University of Aarhus Research Centre IT-parken, Aabogade 34 Queensland University of DK-8200 Aarhus N Technology Denmark GPO Box 2434 Tel: +45 8942 5780 Brisbane, Qld 4001 Fax: +45 8942 5601 AUSTRALIA Email: ivan(at)daimi.au.dk Tel: +61 7 3864 1919 Fax: +61 7 3221 2384 Email: e.dawson(at)qut.edu.au Stuart Haber James Hughes Crypto 2005 General Chair Crypto 2004 General Chair HP Labs Storage Technology Corp. 5 Vaughn Drive 7600 Boone Avenue North Princeton Junction, NJ 08540 Brooklyn Park, MN USA USA Tel: +1 609 514 0681 Tel: +1 763 424 1676 Email: stuart.haber(at)hp.com Fax: +1 763 424 1776 Email: james_hughes(at)stortek.com Kwangjo Kim Lars Knudsen Asiacrypt 2004 General Chair Director (2004-2006) School of Engineering Technical University of Denmark Information and Communications Dept. of Mathematics Univ. Building 303 58-4 Hwaam-dong Yusong-ku DK-2800 Lyngby Taejon, 305-348 DENMARK KOREA Tel: +45 4525 3048 Tel: +82 42 866 6118 Fax: +45 4588 1399 Fax: +82 42 866 6154 Email: knudsen(at)mat.dtu.dk Email: kkj(at)icu.ac.kr Arjen K. Lenstra Tsutomu Matsumoto Director (2004-2006) Director (2002-2004) Information Security Services, Graduate School of Environment and Citigroup Information Sciences Technische Universiteit Eindhoven Yokohama National University 1 North Gate Road 79-7 Tokiwadai, Hodogaya, Yokohama Mendham, NJ 07945-3104 240-8501, Japan USA Tel: +81-45-339-4133 Tel: +1 973 543 5091 Fax: +81-45-339-4338 Fax: +1 973 543 5094 Email: Email: tsutomu(at)mlab.jks.ynu.ac.jp arjen.lenstra(at)citigroup.com Ueli Maurer Kevin S. McCurley Editor-in-Chief, Journal of Director (2002-2004) Cryptology (2002-2005) 6721 Tannahill Drive Department of Computer Science San Jose, CA 95120 ETH Zürich USA CH-8092 Zürich Tel: +1 408 927 1838 Switzerland Email: see here Tel: +41 1 632 7420 Fax: +41 1 632 1172 Email: maurer(at)inf.ethz.ch or jofc(at)iacr.org C.Pandu Rangan Jean-Jacques Quisquater Asiacrypt 2005 General Chair Director (2003-2005) Department of Computer Science and Université catholique de Louvain Engineering Microelectronic laboratory Indian Institute of Technology, Place du Levant, 3 Madras 1348 Louvain-la-Neuve Chennai - 600 036 BELGIUM India Tel: +32 10 47 25 41 Tel: +91 44 2257 8336 Fax: +32 10 47 25 98 Fax: +91 44 2257 8352 Email: jjq(at)dice.ucl.ac.be Email: rangan(at)iitm.ernet.in Rebecca Wright Director (2003-2005) Department of Computer Science Stevens Institute of Technology Castle Point on Hudson Hoboken, NJ 07030 USA Tel: +1 201 216-5328 Fax: +1 201 216-8249 Email: rwright(at)cs.stevens-tech.edu ------------------------------------------------------------------------ Other People Working for IACR Hilarie Orman Archivist Email: archive(at)iacr.org ------------------------------------------------------------------------ About the IACR Newsletter ______________________________________________________________________________ The IACR Newsletter is published three times a year (usually in February, June, and October) and only available electronically. It is sent to IACR members by email (as a flat ASCII text) and published on the web at http://www.iacr.org/newsletter/ If you are a member of IACR and wish to receive the newsletter, you need to make sure that we know your email address! To update your email address in the IACR member database, please contact the membership services at iacrmem(at)iacr.org . Contributions, announcements, book announcements or reviews, calls for papers ... are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter(at)iacr.org The next issue Deadline for submissions to the next newsletter issue is June 1st, 2004. However, many items will be posted on the website as soon as possible. ______________________________________________________________________________ End of IACR Newsletter, Vol. 21, No. 1, Winter 2004. ______________________________________________________________________________