______________________________________________________________________________
______________________________________________________________________________
   

   IACR Newsletter
                                       
   The newsletter of the International Association for Cryptologic
   Research.
   
   Vol. 21, No. 2, Summer 2004.
   
   Published by the International Association for Cryptologic Research
   Christian Cachin, Editor

______________________________________________________________________________
______________________________________________________________________________

   http://www.iacr.org/newsletter/

______________________________________________________________________________

   Contents
______________________________________________________________________________


     * Editorial
     * IACR 2004 Elections: Announcement and Nominations
     * First IACR Fellows' Celebration
     * CD-ROM of IACR Conference Proceedings 1998-2003
     * Crypto   2004:   Online   registration   coming   soon!  (Early
       registration deadline: July 16)
     * Eurocrypt 2004 Wrap-up: Presentations, Rump Session, Fotos
     * ECRYPT - European Network of Excellence for Cryptology
     * Announcements
       + Workshop on Secure Multiparty Protocols (SMP 2004)
       + SASC - The State of the Art of Stream Ciphers
       + Workshop on Provable Security
       + Compsec  2004:  building  business  security - New rules; New
         threats: Game on...
     * New reports in the Cryptology ePrint Archive
     * Open positions
     * Calendar of events in cryptology
     * IACR contact information


______________________________________________________________________________

   Editorial
______________________________________________________________________________


   Welcome to the 18th electronic issue of the IACR Newsletter!


   http://www.iacr.org/newsletter/v21n2/4fellows.jpg

   This  dynamic  group of cryptographers are four of the six first  IACR
   Fellows,  designated  in  2004, at Eurocrypt in Interlaken. From left:
   Adi  Shamir,  Tom Berson, Whit Diffie, and Don Coppersmith; Ron Rivest
   and  David  Chaum  couldn't  join  the celebration. More pictures from
   Eurocrypt are available here.

   In  this  newsletter  issue, you'll  find  information about ECRYPT, a
   European  Network  of  Excellence  for  Cryptology,  sponsored  by the
   European  Commission's  Sixth Framework Programme (FP6). Many European
   IACR  members take an active role in ECRYPT; you are invited to attend
   several  workshops  and  schools  organized  by  the  Network, see the
   announcements section.

   The  year  2004  is  important  for  IACR also because of the upcoming
   IACR  elections;  the  posts of four officers and three directors will
   be  filled.  Moreover,  your  Newsletter editor also intends to resign
   after  about  6  years of service in order make way for new talents in
   IACR.  If you are interested in taking up some responsibility for your
   IACR, then you should talk to Andy Clark, IACR president, or any other
   member of the board.

   Please send your contributions to the Newsletter to

     newsletter@iacr.org

   The  next issue of the IACR Newsletter is scheduled for publication in
   October  2004.  However,  announcements  will  be  posted  on the IACR
   Website as soon as possible.

   Christian Cachin
   IACR Newsletter Editor


______________________________________________________________________________

   IACR 2004 Elections: Announcement and Nominations
______________________________________________________________________________

   The election committee consists of:

          James Hughes - Chair
          Jean-Jacques Quisquater - Returns
          Ed Dawson

   Positions to be filled at this election (starting 1-Jan-2005):
POSITION                 TERM                   CURRENTLY
President                3 Years                Andrew Clark 
Vice President           3 Years                Bart Preneel 
Secretary                3 Years                Josh Benaloh 
Treasurer                3 Years                Susan Langford 

Director                 3 Years                Eli Biham 
Director                 3 Years                Tsutomu Matsumoto 
Director                 3 Years                Kevin S. McCurley

   Nominators  and  nominees  must  be  regular members of IACR. Any IACR
   member can nominate another regular member and all nominations must be
   made in writing to the election chairperson.

   Please download and fill in the nomination form.

     * http://www.iacr.org/elections/2004/nom_form.pdf

   Nominations  forms  must  be  received by mail or fax by September 12,
   2004  at  the  address  below.   Receipt will be acknowledged by email
   within   two   working   days   (before  the  deadline).   It  is  the
   responsibility  of  the  candidates  to  ensure  the  nominations  and
   statements  are   received!   If you have any questions please contact
   the election chairperson.

   Election Chair
   James Hughes
   Storage Technology Corporation
   7600 Boone Ave No.
   Minneapolis, MN, 55428
   USA

   Fax: +1 612 677 3007

   Email: James_Hughes@StorageTek.com

   Ballots  will  be  mailed  by  October 1. Ballots must be mailed to be
   received  by  the  Returning  Officer  in  the  official  envelopes by
   NOVEMBER 15, 2004.


______________________________________________________________________________

   2004 IACR Fellows
______________________________________________________________________________

     * Tom Berson
     * David Chaum
     * Don Coppersmith
     * Whitfield Diffie
     * Ron Rivest
     * Adi Shamir

   Four  of them were present at Eurocrypt 2004 in Interlaken/Switzerland
   for the celebration:

       http://www.iacr.org/fellows/2004/92970023.JPG

   More pictures are available at the Eurocrypt 2004 web site at

   http://www.zurich.ibm.com/eurocrypt2004/fotos/banquet/index3.html


______________________________________________________________________________

   CD-ROM of IACR Conference Proceedings 1998-2003
______________________________________________________________________________

   Together  with  the printed proceedings, the attendees of a Eurocrypt,
   Crypto or Asiacrypt conference in 2004 receive a CD-ROM containing the
   electronic versions of the IACR conference proceedings from 1998 until
   2003.

   The CD-ROM included the proceedings of

     Eurocrypt 1998-2003
     Crypto 1998-2003
     Asiacrypt 1998-2003
     FSE 1998-2003
     PKC 1998-2003

   This CD-ROM is only available from IACR, and not from Springer-Verlag.

   Currently,   we  have  a  few  extra  copies  of  the  Eurocrypt  2004
   proceedings  including  the  CD-ROM  available  that  we  sell to IACR
   members  or  others  who  are  not attending any of the conferences in
   2004.  For  details,  please  contact eurocrypt2004(at)zurich.ibm.com.
   (The  Eurocrypt 2004 proceedings available from Springer-Verlag and in
   books stores does not include the CD-ROM.)


______________________________________________________________________________

   Eurocrypt 2004 Wrap-up
______________________________________________________________________________


   The program of the rump session at Eurocrypt 2004 is available at

     http://www.zurich.ibm.com/eurocrypt2004/rump.html

   Many presentations from the regular program are also available from

     http://www.zurich.ibm.com/eurocrypt2004/program.html

   And,  last but not least, some fotos are available from the banquet
   and from the rump session at

     http://www.zurich.ibm.com/eurocrypt2004/

   -- Jan Camenisch & Christian Cachin


______________________________________________________________________________

   ECRYPT - European Network of Excellence for Cryptology
______________________________________________________________________________


   http://www.ecrypt.eu.org/

   ECRYPT  -  European  Network  of Excellence for Cryptology is a 4-year
   network  of  excellence  funded  within  the  [2]Information Societies
   Technology  (IST)  Programme  of  the  European  Commission's [3]Sixth
   Framework  Programme  (FP6)  under contract number IST-2002-507932. It
   falls  under  the  action  line  Towards  a  global  dependability and
   security  framework.  ECRYPT  was  launched on February 1st, 2004. Its
   objective is to intensify the collaboration of European researchers in
   information  security,  and  more  in  particular  in cryptology and
   digital watermarking.

   The  activities  of the ECRYPT Network of Excellence will be organized
   into five virtual laboratories established as follows:
    1. Symmetric techniques virtual lab (STVL)
    2. Asymmetric techniques virtual lab (AZTEC)
    3. Protocols virtual lab (PROVILAB)
    4. Secure and efficient implementations virtual lab (VAMPIRE), and
    5. Watermarking and perceptual hashing virtual lab (WAVILA).

   ECRYPT activities:
     * Summer schools and workshops
     * Exchanges of researchers, outside visitors
     * Common publications, integration of tools
     * Input   to   standardization   bodies   and   other  dissemination
       activities.
     * Jointly executed targeted research, within ECRYPT's virtual labs

   Calendar of Open (Public) Workshops and Schools organized by ECRYPT:
     * [4]Workshop  on Secure Multiparty Protocols (SMP 2004), Amsterdam,
       Netherlands, 7-8 October 2004.
     * [5]Workshop on Provable Security, Versailles, France, 3-5 November
       2004.
     * [6]State  of  the  Art  of  Stream  Ciphers (SASC), October 14-15,
       Brugge, Belgium.
     * Workshop on Stream Ciphers, Bruges, Belgium, 14-15 October 2004.
     * School on Elliptic Curve Cryptography, Autumn 2004.
     * Workshop on Watermarking, Winter 2005.
     * School on Algorithm Crptanalysis, Spring 2005.
     * Workshop on Lightweight Cryptography, Summer 2005.
     * School on Unconditionally Secure Protocols, Summer 2005.
     * Workshop on Special-Purpose Hardware, Summer 2005.

References

   1. http://www.ecrypt.eu.org/
   2. http://www.cordis.lu/ist/
   3. http://www.cordis.lu/fp6/
   4. http://www.zurich.ibm.com/~cca/smp2004/
   5. http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Provable_Security.html
   6. http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html


______________________________________________________________________________

   Announcements
______________________________________________________________________________


** Workshop on Secure Multiparty Protocols (SMP 2004)


             WORKSHOP ON SECURE MULTIPARTY PROTOCOLS (SMP 2004)

                  Announcement and Call for Contributions

               October 7-8, 2004, Amsterdam, The Netherlands

                   http://www.zurich.ibm.com/~cca/smp2004/


   The   workshop  is  organized  by  ECRYPT,  the  European  Network  of
   Excellence  in  Cryptology,  and  in connection with DISC 2004, the
   18th  Annual  Conference  on  Distributed Computing, which takes place
   October 5-7, in Amsterdam. (The program of October 7 will be partially
   joint  with  DISC,  and  held  at  the same venue.) The workshop is an
   activity  of  ECRYPT's  PROVILAB,  the  virtual  lab  on cryptographic
   protocols.

   SCOPE

   Cryptographic  protocols  play  an  important role for building secure
   distributed systems. Such protocols involve the interaction of several
   agents   with   potentially   conflicting  security  goals.  Protocols
   involving   only   two   agents,   such   as   establishing  a  secure
   point-to-point  channel, are used widely today. However, protocols for
   jointly  executed  tasks  among  multiple  distrusting  agents are not
   frequently  used  because  they  are more difficult to define and even
   harder to construct.

   The  goal of a multiparty protocol can be of technical nature, such as
   synchronization  of  distributed  state  information,  carrying  out a
   distributed  computation, or transferring digitally signed credentials
   anonymously. But it can also consist of an application itself, such as
   a  secure  payment  system, privacy-preserving data access, electronic
   voting,  secure  auctions, and contract bidding. Secure protocols must
   reach  their  goals despite attacks from agents who participate in the
   protocol.

   The  aim  of  this  workshop  is  to  bring  together  researchers and
   practitioners  from  the cryptography and distributed computing areas,
   from  academia  and  industry,  who  are  working on secure multiparty
   protocols  for distributed systems, in order to engage in a discussion
   about  common  goals and important research problems in the overlap of
   the areas.

   Topics include, but are not limited to:
     * secure group communication
     * distributed cryptosystems
     * threshold cryptography
     * secure multiparty computation
     * anonymity-preserving protocols
     * protocols supporting private data access
     * secure payment schemes
     * secure peer-to-peer systems
     * privacy-preserving protocols for auctions and bidding

   FORMAT

   The  workshop  will  consist  of  invited  keynote  presentations  and
   contributed presentations. There will be no proceedings, but a handout
   with abstracts will be provided to all participants.

   KEYNOTE SPEAKERS

     Juan Garay (Bell Labs - Lucent Technologies)
     Dahlia Malkhi (The Hebrew University of Jerusalem)
     Keith Marzullo (University of California, San Diego)
     Gene Tsudik (University of California, Irvine)
     Moti Yung (Columbia University)

   CONTRIBUTIONS

   To  contribute  a  presentation,  please  submit  an extended abstract
   summarizing  a  technical contribution or a position paper summarizing
   your research. Contributions will be selected by the expected interest
   in the topic and the potential for stimulating exchange of ideas among
   the participants.

   A  submission must be a PDF file of at most 4 (four) pages, in letter-
   or  A4-format, using at least 10pt fonts and no non-standard character
   sets.   Submissions  must  be  sent  as  an  attachment  by  email  to
   cca+smp2004(at)zurich.ibm.com  and  will  be  acknowledged  within one
   working day after receiving.

   All  submissions  must  be  received  before  or on July 12, 2004, and
   notification of acceptance will be sent by August 10, 2004.

   Contributions deviating from these guidelines will not be considered.

   PROGRAM COMMITTEE

     Lorenzo Alvisi (University of Texas, Austin, USA)
     Christian Cachin (IBM Zurich Research Laboratory, Switzerland), chair
     Ronald Cramer (Aarhus University and BRICS, Denmark)
     Giuseppe Persiano (Università di Salerno, Italy)

   STIPENDS

   A  limited  number  of  stipends  are  available  to participants from
   non-ECRYPT  institutions  to participate in the workshop. Requests for
   stipends   should  be  sent  to  cca+smp2004(at)zurich.ibm.com  before
   September 10, 2004.



** SASC - The State of the Art of Stream Ciphers

     Special Workshop to be hosted by the ECRYPT Network of Excellence

               SASC - The State of the Art of Stream Ciphers

                            October 14-15, 2004

                              Brugge, Belgium

                           Call for Participation

     http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html

   The cryptographic community is well served by a variety of efficient
   and trusted block ciphers. Yet there remains only a limited selection
   of trusted, non-proprietary, and royalty-free stream ciphers.

   SASC is a special workshop that aims to provide a more complete
   understanding of the current state of stream cipher design and
   analysis. Sponsored by the ECRYPT Network of Excellence
   (http://www.ecrypt.eu.org) SASC will consider the current state of
   stream cipher knowledge. In particular it is hoped to expose new and
   existing stream cipher proposals, cryptanalytic tools, and design
   criteria to the wider attention of the cryptographic community.

   As a workshop and forum for the exchange of ideas and proposals,
   active participation at SASC is encouraged. Attendees are invited to
   submit papers on all aspects of stream ciphers including, but not
   limited to the following:
     * stream cipher analysis,
     * stream cipher implementation,
     * stream cipher deployment,
     * stream cipher building blocks, and
     * new stream cipher proposals (accompanied by appropriate security
       claims and analysis).

   We also encourage submissions that question or comment upon:
     * the need for, and desirability of, trusted stream ciphers, and
     * the requirements of industry.

   To avoid submissions to SASC from conflicting with submissions to
   forthcoming conferences with proceedings, SASC will have no formal
   proceedings though there will be a workshop record. Subject to the
   approval of the submitter, new algorithms proposed at SASC will be
   included in the ECRYPT Stream Cipher Lounge.

   Details of the program committee, submission procedures, and workshop
   logistics will become available via
   http://www.isg.rhul.ac.uk/research/projects/ecrypt/stvl.html.

   Important Dates
   Submission Dealine:                    September 3, 2004
   Notification and Program Confirmation: September 24, 2004
   Workshop:                              October 14-15, 2004



** Workshop on Provable Security


                       WORKSHOP ON PROVABLE SECURITY

                  Announcement and Call for Contributions

               November 3-5, 2004, INRIA, Versailles, Paris.

     http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Pro
                            vable_Security.html

   The  European  Union has funded a Network of Excellence in Cryptology,
   bringing  together  the leading research groups in cryptography in the
   European  Union,  and  associated  states. This Network, named eCrypt,
   will be hosting a series of workshops over the coming years and one of
   the  first  of  these  will be on the topic of provable security. This
   workshop is organized by the Aztec Vitual Lab of the Ecrypt Network of
   Excellence  in  cooperation  with  ENS,  INRIA  and  the University of
   Bristol.

   SCOPE

   This  workshop  will  consist  of  a number of invited talks plus some
   contributed  talks.  It  will  concentrate  on all aspects of provable
   security,   including  recent  new  advances  and  aspects  of  future
   developments.  The  workshop is timed to occur just before the meeting
   in  Luminy  in November, and we hope that participants at Luminy would
   also attend this workshop.

   The  aim  of  this  workshop  is  to  bring  together  researchers and
   practitioners  from  from  academia  and  industry  who are working on
   provable  security of cryptographic protocols, in order to engage in a
   discussion  about  common goals and important research problems in the
   overlap of the areas.

   Topics include, but are not limited to:
     * Encryption schemes
     * Signature schemes
     * Key agreement protocols
     * Authentication mechanisms
     * Foundational and definitional work
     * Proof techniques

   FORMAT

   The  workshop  will  consist  of  invited  keynote  presentations  and
   contributed presentations. There will be no proceedings, but a handout
   with abstracts will be provided to all participants.

   KEYNOTE SPEAKERS

     Ronald Cramer, Leiden University
     Alex Dent, Royal Holloway College, University of London
     Shai Halevi, IBM, TJ Watson Research Center
     Tatsuaki Okamoto, NTT Research Laboratories
     David Pointcheval, ENS Paris
     Moti Yung, Columbia University

   CONTRIBUTIONS

   We  invite  others  to  contribute  talks  by  sending a two paragraph
   abstract  of what you wish to talk about to [2]Nigel Smart. Talks will
   be  selected  on  the  basis  of  trying  to create a balanced program
   covering all aspects of provable security. Whilst every effort will be
   made to accomodate all people wishing to talk there are only a limited
   number  of slots available. If you simply wish to attend this workshop
   then  further  details  will be made available in the coming months on
   this web site

   All  submissions  must  be received before or on August 1st, 2004, and
   notification of acceptance will be sent by August 30th, 2004.

   PROGRAM COMMITTEE

     Jan Camenisch, IBM (Switzerland)
     Dario Catalano, ENS Paris (France)
     Ronald Cramer, Leiden University (Netherlands)
     Phong Nguyen, ENS Paris (France)
     Nicolas Sendrier, INRIA (France)
     Nigel Smart, Uni Bristol (UK)

   STIPENDS

   A  limited  number  of  stipends  are  available  to participants from
   non-ECRYPT  institutions  to participate in the workshop. Requests for
   stipends should be sent to dario.catalano (at) ens.fr before September
   10, 2004.



** Compsec 2004: building business security - New rules; New threats: Game on...

First Announcement - Compsec 2004: building business security - New rules;
New threats: Game on...
14-15 October 2004
Queen Elizabeth II Conference Centre, London, UK

Now in its 21st year, Compsec 2004 investigates the current status of the
industry from a user's perspective. A specialised programme of talks by
leading practitioners, distinguished researchers and thinkers and major
suppliers offers a practical guide to action on current and upcoming
threats. Compsec 2004 addresses the political and practical contexts of
information security, as well as analysing leading-edge technical issues.
Conference highlights include:
- Governance
- Emerging threats
- What business wants from suppliers
- Building a business case for infosecurity investment
- Trends in corporate cyber crime
- Hardware-based security

Expert speakers include:
- Gene Spafford, Purdue University
- Stuart Brocklehurst, SVP Payments Development Visa
- Jean Pierre Mean, European Bank for Reconstruction and Development
- Brian Collins, Cranfield University
- Bill Cheswick, Lumeta
- David Aucsmith, Microsoft
- Paul Woods, UBS
- Robin Mansell, LSE
- David Naccache, Gemplus
- Ross Anderson, University of Cambridge

To register at the early bird rate go to: www.compsec2004.com/register.htm
or contact the Conference Secretariat at compsec2004@elsevier.com

To receive regular e-mail updates on Compsec 2004 go to:
http://www.compsec2004.com/reply.htm

Further information can be found at www.compsec2004.com


______________________________________________________________________________

   New Reports in the Cryptology ePrint Archive
______________________________________________________________________________

   (The  list  contains  reports  posted  since the last newsletter issue
   appeared.)


   2004/143 ( PS PS.GZ PDF )
          Short   Signatures,  Provable  Security,  Generic  Attacks  and
          Computational  Security of Multivariate Polynomial Schemes such
          as HFE, Quartz and Sflash
          Nicolas T. Courtois

   2004/142 ( PDF )
          A New Signcryption Scheme and its Threshold Protocol
          Yiliang Han and Guangming Wu and Xiaoyuan Yang

   2004/141 ( PS PS.GZ PDF )
          Elastic AES
          Debra L. Cook and Moti Yung and Angelos D. Keromytis

   2004/140 ( PDF )
          Hardware Implementation of the 64-bit MISTY1 Block Cipher
          Paris Kitsos

   2004/139 ( PS PS.GZ PDF )
          New  Notions  of  Security:  Achieving  Universal Composability
          without Trusted Setup
          Manoj Prabhakaran and Amit Sahai

   2004/138 ( PS PS.GZ PDF )
          How to Disembed a Program?
          Benoit  Chevallier-Mames and David Naccache and Pascal Paillier
          and David Pointcheval

   2004/137 ( PDF )
          New GF(2n) Parallel Multiplier Using Redundant Representation
          Haining Fan

   2004/136 ( PDF )
          A Protocol for Countering Online Dictionary Attacks
          Vipul Goyal and Virendra Kumar and Mayank Singh

   2004/135 ( PDF )
          More Efficient Server Assisted One Time Signatures
          Vipul Goyal

   2004/134 ( PDF )
          Secure and Efficient Masking of AES - A Mission Impossible?
          Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller

   2004/133 ( PS PS.GZ PDF )
          Secret Handshakes from CA-Oblivious Encryption
          Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik

   2004/132 ( PS PS.GZ PDF )
          On   Small   Characteristic  Algebraic  Tori  in  Pairing-Based
          Cryptography
          R. Granger, D. Page and M. Stam

   2004/131 ( PS PS.GZ PDF )
          A New ID-based Signature with Batch Verification
          Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon

   2004/130 ( PS PS.GZ PDF )
          Private Inference Control
          David Woodruff and Jessica Staddon

   2004/129 ( PS PS.GZ PDF )
          Generalizing Kedlaya's order counting based on Miura Theory
          Joe Suzuki

   2004/128 ( PS PS.GZ PDF )
          Elastic Block Ciphers
          Debra L. Cook and Moti Yung and Angelos D. Keromytis

   2004/127 ( PS PS.GZ PDF )
          DDH-based Group Key Agreement for Mobile Computing
          Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won

   2004/126 ( PS PS.GZ )
          Two Software Normal Basis Multiplication Algorithms for GF(2n)
          Haining Fan and Yiqi Dai

   2004/125 ( PS PS.GZ PDF )
          EME*:  extending  EME  to handle arbitrary-length messages with
          associated data
          Shai Halevi

   2004/124 ( PS PS.GZ )
          Universally    Composable    DKG    with   Linear   Number   of
          Exponentiations
          Douglas Wikström

   2004/123 ( PS PS.GZ PDF )
          On  security  of  XTR  public  key  cryptosystems  against Side
          Channel Attacks
          Dong-Guk Han and Jongin Lim and Kouichi Sakurai

   2004/122 ( PS PS.GZ PDF )
          A New Two-Party Identity-Based Authenticated Key Agreement
          Noel McCullagh and Paulo S. L. M. Barreto

   2004/121 ( PS PS.GZ PDF )
          Fast  and  Proven Secure Blind Identity-Based Signcryption from
          Pairings
          Tsz Hon Yuen and Victor K. Wei

   2004/120 ( PS PS.GZ PDF )
          One-Way  IND-CNA  Key  Setup  -  a Step Towards Provably Secure
          Symmetric Encryption
          Bartosz Zoltak

   2004/119 ( PS PS.GZ PDF )
          Adaptively    Secure    Feldman   VSS   and   Applications   to
          Universally-Composable Threshold Cryptography
          Masayuki Abe and Serge Fehr

   2004/118 ( PS PS.GZ PDF )
          Fast addition on non-hyperelliptic genus $3$ curves
          Stéphane Flon and Roger Oyono and Christophe Ritzenthaler

   2004/117 ( PS PS.GZ PDF )
          Efficient and Forward-Secure Identity-Based Signcryption
          Noel McCullagh and Paulo S. L. M. Barreto

   2004/116 ( PS PS.GZ PDF )
          On   the   Limitations   of  Universally  Composable  Two-Party
          Computation Without Set-up Assumptions
          Ran Canetti and Eyal Kushilevitz and Yehuda Lindell

   2004/115 ( PS PS.GZ PDF )
          Provably-Secure  and Communication-Efficient Scheme for Dynamic
          Group Key Exchange
          Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won

   2004/114 ( PS PS.GZ )
          Improved Identity-Based Signcryption
          Liqun Chen and John Malone-Lee

   2004/113 ( PS PS.GZ PDF )
          On the Security and Composability of the One Time Pad
          Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade

   2004/112 ( PDF )
          Relation between XL algorithm and Groebner Bases Algorithms
          M. Sugita and M. Kawazoe and H. Imai

   2004/111 ( PS PS.GZ PDF )
          The Vulnerability of SSL to Chosen Plaintext Attack
          Gregory V. Bard

   2004/110 ( PDF )
          Designing Against the `Overdefined System of Equations' Attack
          Carlisle Adams

   2004/109 ( PDF )
          Concealing Complex Policies with Hidden Credentials
          Robert Bradshaw and Jason Holt and Kent Seamons

   2004/108 ( PS PS.GZ PDF )
          Two  Improved  Partially  Blind Signature Schemes from Bilinear
          Pairings
          Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow

   2004/107 ( PS PS.GZ PDF )
          Classification  of  genus  2 curves over $\mathbb{F}_{2^n}$ and
          optimization of their arithmetic
          Bertrand BYRAMJEE and Sylvain DUQUESNE

   2004/106 ( PDF )
          Capacity   and   Examples   of  Template  Protecting  Biometric
          Authentication Systems
          P. Tuyls and J. Goseling

   2004/105 ( PS PS.GZ PDF )
          Receipt-Free Homomorphic Elections and Write-in Ballots
          Alessandro Acquisti

   2004/104 ( PS PS.GZ PDF )
          A  Trapdoor-free  and  Efficient  Group  Signature  Scheme from
          Bilinear Pairings
          Lan Nguyen

   2004/103 ( PS PS.GZ PDF )
          Cryptanalysis of SFlash v3
          Jintai Ding and Dieter Schmidt

   2004/102 ( PS PS.GZ PDF )
          The  Exact  Security  of  an  Identity  Based Signature and its
          Applications
          Benoît Libert and Jean-Jacques Quisquater

   2004/101 ( PS PS.GZ PDF )
          Provably Secure Masking of AES
          Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel

   2004/100 ( PDF )
          The Sorcerers Apprentice Guide to Fault Attacks
          Hagai  Bar-El,  Hamid Choukri, David Naccache, Michael Tunstall
          and Claire Whelan

   2004/099 ( PS PS.GZ )
          Secure Hashed Diffie-Hellman over Non-DDH Groups
          Rosario Gennaro and Hugo Krawczyk and Tal Rabin

   2004/098 ( PS PS.GZ PDF )
          Attacking a Public Key Cryptosystem Based on Tree Replacement
          María Isabel González Vasco and David Pérez García

   2004/097 ( PDF )
          How To Re-initialize a Hash Chain
          Vipul Goyal

   2004/096 ( -- withdrawn -- )
          On the Ambiguity of Concurrent Signatures
          Yi Mu and Fangguo Zhang and Willy Susilo

   2004/095 ( PS PS.GZ PDF )
          GNFS Factoring Statistics of RSA-100, 110, ..., 150
          Kazumaro  Aoki  and  Yuji Kida and Takeshi Shimoyama and Hiroki
          Ueda

   2004/094 ( PS PS.GZ PDF )
          Block Ciphers and Stream Ciphers: The State of the Art
          Alex Biryukov

   2004/093 ( PS PS.GZ PDF )
          A   Provably   Secure  Nyberg-Rueppel  Signature  Variant  with
          Applications
          Giuseppe Ateniese and Breno de Medeiros

   2004/092 ( PS PS.GZ PDF )
          A New Stream Cipher HC-256
          Hongjun Wu

   2004/091 ( PDF )
          Signature   Bouquets:   Immutability  for  Aggregated/Condensed
          Signatures
          Einar Mykletun and Maithili Narasimha and Gene Tsudik

   2004/090 ( PS PS.GZ PDF )
          Provably  Secure  Authenticated  Tree Based Group Key Agreement
          Protocol
          Ratna Dutta and Rana Barua and and Palash Sarkar

   2004/089 ( PS PS.GZ PDF )
          Security  of  Random  Key Pre-distribution Schemes With Limited
          Tamper Resistance
          Mahalingam Ramkumar and Nasir Memon

   2004/088 ( -- withdrawn -- )
          Efficient  Batch  Verification  of  Signature  Schemes based on
          Bilinear Maps
          Noel McCullagh

   2004/087 ( PS PS.GZ PDF )
          Using primitive subgroups to do more with fewer bits
          K. Rubin and A. Silverberg

   2004/086 ( PDF )
          Fuzzy Identity Based Encryption
          Amit Sahai and Brent R. Waters

   2004/085 ( PDF )
          The CS2 Block Cipher
          Tom St Denis

   2004/084 ( PDF )
          Evaluating elliptic curve based KEMs in the light of pairings
          David Galindo and Sebastia Martin and Jorge L. Villar

   2004/083 ( PDF )
          Scan Based Side Channel Attack on Data Encryption Standard
          Bo Yang and Kaijie Wu and Ramesh Karri

   2004/082 ( PS PS.GZ )
          Secure Asynchronous Reactive Systems
          Michael Backes and Birgit Pfitzmann and Michael Waidner

   2004/081 ( PDF )
          Rewriting  Variables:  the Complexity of Fast Algebraic Attacks
          on Stream Ciphers
          Philip Hawkes and Gregory G. Rose

   2004/080 ( PDF )
          HENKOS STREAM CIPHER
          Marius Oliver Gheorghita and Dominic Bucerzan

   2004/079 ( PS PS.GZ PDF )
          Pairing-Based One-Round Tripartite Key Agreement Protocols
          Zhaohui Cheng and Luminita Vasiu and Richard Comley

   2004/078 ( PS PS.GZ PDF )
          Analysis of the WinZip encryption method
          Tadayoshi Kohno

   2004/077 ( PS PS.GZ PDF )
          Foundations of Group Signatures: The Case of Dynamic Groups
          Mihir Bellare and Haixia Shi and Chong Zhang

   2004/076 ( PS PS.GZ PDF )
          Group  Signatures:  Provable  Security, Efficient Constructions
          and Anonymity from Trapdoor-Holders
          Aggelos Kiayias and Moti Yung

   2004/075 ( PDF )
          An Hybrid Mode of Operation
          Alexis W. Machado


______________________________________________________________________________

   Open Positions in Cryptology
______________________________________________________________________________

   IACR  provides a listing of open positions with a focus on cryptology.
   The  listing  is  available on the Web at [1]http://www.iacr.org/jobs/
   and  also  included  in the [2]IACR Newsletter that is sent to members
   three times per year.

   To  advertise  your job opportunities, please send a description of no
   more  than 150 words in plain ASCII text by email to jobs(at)iacr.org.
   This  should  include  an  URL  and  further  contact  information. No
   attachments  or  word documents, please! (Submissions in other formats
   than text will not be posted.)

   As this is intended to be a service to the members of IACR, it is free
   for  all  members.  We  ask  that  commercial  enterprises who want to
   advertise  their openings identify at least one of their employees who
   is a member of IACR. (IACR does not know corporate membership.) Please
   contact the membership secretariat to [3]become a member of IACR.

   On  top  of  that,  IACR  accepts  donations and is always looking for
   sponsors for its conferences.
     _________________________________________________________________

  ROYAL HOLLOWAY, UNIVERSITY OF LONDON, U.K.

Royal Holloway is seeking to appoint a Professor of Information Security to
its Information Security Group. The Information Security Group is one of the
largest academic security groups in the world and undertakes teaching,
research and commercial activities in Information Security.  Candidates
should have an outstanding record of achievement and leadership in some area
of Information Security. The successful candidate is expected to undertake a
full role within the Information Security Group.

Further information about the Information Security Group is available at
http://www.isg.rhul.ac.uk. Informal enquiries can be made to Professor Fred
Piper (+44 (0) 1784 443098) f.piper@rhul.ac.uk or Professor Chris Mitchell
(+44 (0) 1784 443423) c.mitchell@rhul.ac.uk  .
Further information about the position is available at
http://www.rhul.ac.uk/Personnel/ads/isg589.html

   (14-Jun-04)
     _________________________________________________________________

  Saarland University, Saarbruecken

http://www.uni-saarland.de/mediadb/organisation/Verwaltung/Referate/Ref2
/Personal/Stellenangebote/2004/Mai_2004/U17.pdf

SAARLAND UNIVERSITY, SAARBRUECKEN, GERMANY. The Department of
Mathematics and Computer Sciences invites applications for three tenured
Associate Professor (C3) positions.

We seek outstanding applicants in the following areas of Computer
Science: Networking, Distributed Systems, Database Systems, Computer
Architecture, Operating Systems, Security, Complexity Theory,
Vision/Robotics or Hybrid Systems.

Saarland University has one of Germany's leading computer science
departments, with close ties to Germany's only Max-Planck Institute for
Computer Science (MPI) and the German Center for Artificial Intelligence
(DFKI), all located on campus. A DFG graduate school (Graduiertenkolleg)
promotes young scientific talents; the DFG AVACS project researches
verification and analysis of complex systems. Commitment and cooperation
are welcome.

Saarbrücken is located at the heart of Europe, near to Paris, Heidelberg
and Cologne and close to Germany's borders to France and Luxembourg,
strongly influenced by French savoir-vivre. A substantial number of new
companies and jobs have been created in recent years, facilitated by
Saarland University's Start-up Center and the new Science Park.
Entrepreneurial activities by students and faculty members are
expressively encouraged and supported. Additional information may be
found on the website http://www.cs.uni-sb.de/?lang=en

Applicants should hold a Ph.D. in Computer Science or in a closely
related field. Courses at the M.Sc. and Ph.D. level are predominantly
taught in English.

Saarland University is strongly involved in gender balance activities
and wishes to increase the share of female scientific staff. For
candidates with equal qualification, preference will be given to female
candidates.

Applicants should submit a letter of application, official transcripts,
CV, a list of publications in chronological order as well as three
copies of their three most important publications to the chair of the
faculty of mathematics and computer science, Prof. Dr. Jörg Eschmeier,
Saarland University, Postfach 151150, 66041 Saarbruecken, Germany. Also
send PDF copies of your material to sekr.fakultaet6@mx.uni-saarland.de .

   (xx-Xxx-04)
     _________________________________________________________________

  University of Bristol

We are currently looking for three new people.....

Lecturers in Computer Science (ref. 10284)

Department of Computer Science

Working in the Department of Computer Science, you will have a proven research
record or show excellent research promise. You will be expected to contribute
to the research of the department, to teach undergraduate courses and to
supervise PhD students and postdoctoral workers. We have a lively research
culture with current interests in Digital Media, Cryptography and Security,
Languages and Architecture, Machine Learning, Mobile and Wearable Computing,
Quantum Computing, System Design and Verification. We have extensive links
with the computer, communications, microelectronics, and media industries.
These are well represented in the Bristol region, providing many opportunities
for collaborative research and teaching, secondments and new ventures.

Grade : Lecturer Grade A - Lecturer Grade B
Salary : £22,954 - £34,838

Contact for informal enquiries :
Professor D May dave@cs.bris.ac.uk Tel. 0117 954 5134

Timescale of appointment :
Contract : Permanent
Closing date for applications : 9.00 am on 11 June 2004

For further details and applications procedure see

      http://www.bris.ac.uk/boris/jobs/ads?ID=22033

   (23-May-04)


______________________________________________________________________________

   IACR Calendar of Events in Cryptology
______________________________________________________________________________

   The  IACR calendar lists events (conferences, workshops, ...) that may
   be of interest to IACR members or deal with research in cryptology.

   If you want to have an event listed here, please [1]fill out this form
   or send email to webmaster(at)iacr.org .

   (The  current  condition for being listed here is that the description
   of an event must contain the substring "crypt" anywhere.)

  2004

     * [2]2004  IEEE  CEC  Special Session on Evolutionary Computation in
       Cryptology  and  Computer  Security  (IEEE  CEC 2004), June 20-23,
       Portland, USA.
     * [3]1st   European   PKI   Workshop.   Research   and  Applications
       (EuroPKI'04), June 25-26, Samos Island, Greece.
     * [4]International  Conference  on  Dependable  Systems and Networks
       (DSN-2004), June 28-July 1, Florence, Italy.
     * [5]Fourth    Central    European    Conference    on    Cryptology
       (WartaCrypt'04), July 1-3, Bedlewo, Poland.
     * [6]Issues  of  Provable  Security  and Efficiency in Cryptographic
       Constructions, July 1-9, Barcelona, Spain.
     * [7]Cryptographic  Algorithms and their Uses, July 5-6, Gold Coast,
       Australia.
     * [8]Polynomial-Based Cryptography, July 7-12, Melbourne, Australia.
     * [9]PORTIA  Workshop  on  Sensitive Data in Medical, Financial, and
       Content-Distribution Systems, July 8-9, Stanford (CA), USA.
     * [10]The  9th  Australasian  Conference on Information Security and
       Privacy (ACISP04), July 13-15, Sydney, Australia.
     * [11]23rd  Symposium  on  Principles of Distributed Computing (PODC
       2004), July 25-28, St. John's, Newfoundland, Canada.
     * [12]The  First  Conference  on  Email  and  Anti-Spam (CEAS), July
       30-August 1, Mountain View, CA, USA.
     * [13]1st  European  Workshop  on  Security  in  Ad-Hoc  and  Sensor
       Networks (ESAS 2004), August 5-6, Heidelberg, Germany.
     * [14]11th  Annual  Workshop  on Selected Areas in Cryptography (SAC
       2004), August 9-10, Waterloo, Canada.
     * [15]13th  USENIX  Security  Symposium, August 9-13, San Diego, CA,
       USA.
     * [16]Workshop  on Cryptographic Hardware and Embedded Systems (CHES
       2004), August 11-13, Cambridge (Boston), USA.
     * [17]Crypto 2004, August 15-19, Santa Barbara, California, USA.
     * [18]The   5th   International  Workshop  on  Information  Security
       Applications  (WISA2004), August 23-25, Ramada Plaza, Jeju Island,
       Korea.
     * [19]International  Conference  on E-Business and Telecommunication
       Networks (ICETE'04), August 25-28, Setúbal, Portugal.
     * [20]First International Conference on Trust and Privacy in Digital
       Business (Trustbus '04), September 1-3, Zaragoza, Spain.
     * [21]Fourth  Conference  on  Security in Communication Networks '04
       (SCN04), September, 8-10, Amalfi, Italy.
     * [22]9th  European  Symposium  on  Research  in  Computer  Security
       (ESORICS 2004), September 13-15, Sophia Antipolis, France.
     * [23]Reunion   Española   sobre   Criptologia  y  Seguridad  de  la
       Informacion (RECSI2004), 15-17 September, Madrid, Spain.
     * [24]8th  Workshop  on  Elliptic  Curve  Cryptography  (ECC  2004),
       September 20-22, Bochum, Germany.
     * [25]The  International  Conference of Computer Safety, Reliability
       and Security (SAFECOMP 2004), September 21-24, Potsdam, Germany.
     * [26]7th Information Security Conference (ISC'04), September 27-29,
       Palo Alto, CA, USA.
     * [27]ACM  Workshop  on  Wireless  Security  (WiSe 2004), October 1,
       Philadelphia, PA, USA.
     * [28]The  Third  International Workshop for Applied PKI (IWAP2004),
       October 3-5, Fukuoka, JAPAN.
     * [29]Workshop  on  Secure  Multiparty Protocols (SMP 2004), October
       7-8, 2004, Amsterdam, Netherlands.
     * [30]State  of  the  Art  of  Stream Ciphers (SASC), October 14-15,
       Brugge, Belgium.
     * [31]11th  ACM  Conference  on Computer and Communications Security
       (CCS 2004), October 25-29, Washington, DC, USA.
     * [32]The  Fourth  ACM  Workshop  on  Digital Rights Management (DRM
       2004), October 25, Washington, DC, USA.
     * [33]Sixth    International    Conference    on   Information   and
       Communications Security (ICICS'04), October 27-29, Malaga, Spain.
     * [34]2nd  ACM  Workshop  on  Formal Methods in Security Engineering
       (FMSE '04), October 29, Washington DC, USA.
     * [35]Workshop on Provable Security, November 3-5, Paris, France.
     * [36]RSA  Conference 2004 Europe (RSA-04), November 3-5, Barcelona,
       Spain.
     * [37]The   7th   Annual  International  Conference  on  Information
       Security and Cryptology (ICISC 2004), December 2-3, Seoul, Korea.
     * [38]Asiacrypt 2004, December 5-9, Jeju Island, Korea.
     * [39]National   conference   on   Discrete   Mathematics   and  its
       Applications (dma 2004), December 9-11, India.
     * [40]5th International Conference on Cryptology in India (INDOCRYPT
       2004), December 20-22, Chennai (Madras), India.
     * [41]DIMACS  2003-2006  Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.

  2005

     * [42]International  Workshop  on  Practice and Theory in Public Key
       Cryptography   (PKC   2005),   January   23-26,   Les  Diablerets,
       Switzerland.
     * [43]Theory  of  Cryptography Conference (TCC '05), February 10-12,
       Cambridge, MA, USA.
     * [44]RSA  Conference  2005,  Cryptographers'  Track  (CT-RSA  '05),
       February 14-18, San Francisco, USA.
     * [45]Financial  Cryptography  and  Data  Security (FC'05), February
       28-March 3, Roseau, The Commonwealth Of Dominica.
     * [46]International  Workshop on Coding and Cryptography (WCC'2005),
       March 14-18, Bergen, Norway.
     * [47]2nd   International   Conference   on  Security  in  Pervasive
       Computing (SPC 05), April 6-8, Boppard, Germany.
     * [48]4th Annual PKI R&D Workshop (PKI05), April 19-21, Gaithersburg
       MD, USA.
     * [49]2005  IEEE  Symposium on Security and Privacy (IEEE S&P 2005),
       May 8-11, Berkeley, USA.
     * [50]Third   International  Workshop  on  Security  in  Information
       Systems (WOSIS 2005), May 24-25, Miami, USA.
     * [51]The  20th  IFIP  International Information Security Conference
       (SEC2005), May 30-June 1, Chiba, Japan.
     * [52]Eurocrypt 2005, May 22-26, Aarhus, Denmark.
     * [53]Crypto 2005, August 14-18, Santa Barbara, California, USA.
     * [54]DIMACS  2003-2006  Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.
     * [55]Asiacrypt 2005, (December), Madras, India.

  2006

     * [56]2006  IEEE  Symposium on Security and Privacy (IEEE S&P 2006),
       May 21-26, Berkeley, USA.
     * [57]Eurocrypt 2006, (May), St. Petersburg, Russia.
     * [58]DIMACS  2003-2006  Special Focus on Communication Security and
       Information Privacy, 2003-2006, DIMACS Center, Rutgers University,
       USA.

  2007

     * [59]2007  IEEE  Symposium on Security and Privacy (IEEE S&P 2007),
       May 20-23, Berkeley, USA.

  2008

     * [60]2008  IEEE  Symposium on Security and Privacy (IEEE S&P 2008),
       May 18-21, Berkeley, USA.

   Past events are [61]archived here.
     _________________________________________________________________

Journal Calls for Papers

     * Journal of Indian Statistical Association
       Journal  of  Indian  Statistical Association (JISA) is planning to
       bring  out  a special issue in Dec 2004 that will include original
       work   on  Cryptology  having  its  primary  content:  Statistics,
       Probability or Combinatorics.
       The editor of this special issue is Professor Bimal Roy,
       Indian Statistical Institute,
       Calcutta,
       India.
       The postscript/PDF version of the papers (typed using Latex) is to
       be     submitted     electronically    to    Prof.    Bimal    Roy
       (bimal@isical.ac.in) by May 31, 2004.
       The review reports will be available by August 31, 2004.
       For other information of this journal and the special issue please
       contact Prof. M. B. Rajarshi (mbraj@stat.unipune.ernet.in).
     _________________________________________________________________

Other Calendars

     * [62]Cipher's calendar (security & privacy)
     * [63]ACM SIGACT Theory Calendar (theory of computation)
     * [64]Calendar from UCL Crypto Group (crypto, security)
     * [65]Calendar from Cambridge University (security)
     * [66]ACM Calendar of Events
     * [67]IEEE Calendar/TAG
     _________________________________________________________________

   [ [68]IACR home page ] [69]© IACR

References

   1. http://www.iacr.org/events/submit.html
   2. http://www.cs.unr.edu/~sushil/cec/
   3. http://www.aegean.gr/EuroPKI2004
   4. http://www.dsn.org/dsn2004.html
   5. http://wartacrypt.im.pwr.wroc.pl/
   6. http://www-ma4.upc.es/mak/coursegen.html
   7. http://www.isrc.qut.edu.au/events/eracom2004/
   8. http://www.it.deakin.edu.au/cryptography2004/
   9. http://crypto.stanford.edu/portia/workshops/2004_7.html
  10. http://www.ics.mq.edu.au/~acisp04
  11. http://www.podc.org/podc2004/
  12. http://www.ceas.cc/
  13. http://www.netlab.nec.de/esas/esas2004.html
  14. http://www.vlsi.uwaterloo.ca/~sac04
  15. http://www.usenix.org/events/sec04/
  16. http://www.chesworkshop.org/ches2004/
  17. http://www.iacr.org/conferences/crypto2004/
  18. http://dasan.sejong.ac.kr/~wisa04/
  19. http://www.icete.org/
  20. http://www-ifs.uni-regensburg.de/trustbus04/
  21. http://www.dia.unisa.it/conferences/SCN04/
  22. http://esorics04.eurecom.fr/
  23. http://www.uc3m.es/recsi
  24. http://www.cacr.math.uwaterloo.ca/conferences/2004/ecc2004/announcement.html
  25. http://www.safecomp.org/
  26. http://isc04.uncc.edu/
  27. http://www.ece.cmu.edu/~adrian/wise2004/
  28. http://itslab.csce.kyushu-u.ac.jp/iwap04/
  29. http://www.zurich.ibm.com/~cca/smp2004/
  30. http://www.isg.rhul.ac.uk/research/projects/ecrypt/sasc-cfp.html
  31. http://www.acm.org/sigs/sigsac/ccs/CCS2004/
  32. http://mollie.engr.uconn.edu/DRM2004/
  33. http://icics04.lcc.uma.es/
  34. http://www.zurich.ibm.com/~mbc/FMSE04
  35. http://www.cs.bris.ac.uk/Research/CryptographySecurity/Workshop_Provable_Security.html
  36. http://2004.rsaconference.com/europe/c4p/default.aspx
  37. http://www.kiisc.or.kr/html/Call%20for%20papers.pdf
  38. http://www.iacr.org/conferences/asiacrypt2004/
  39. http://www.amrita.edu/dma2004
  40. http://www-rocq.inria.fr/codes/indocrypt2004/
  41. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  42. http://www.iacr.org/workshops/pkc2005/
  43. http://www.cs.ucsd.edu/users/mihir/tcc/tcc05/
  44. http://www.rsasecurity.com/rsalabs/node.asp?id=2015
  45. http://www.ifca.ai/fc05/
  46. http://www.selmer.uib.no/WCC.html
  47. http://www.spc-conf.org/
  48. http://middleware.internet2.edu/pki05/
  49. http://www.ieee-security.org/TC/SP-Index.html
  50. http://www.iceis.org/workshops/wosis/wosis2005-cfp.html
  51. http://www.sec2005.org/pre-cfp.html
  52. http://www.iacr.org/conferences/eurocrypt2005/
  53. http://www.iacr.org/conferences/crypto2005/
  54. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  55. http://www.iacr.org/conferences/asiacrypt2005/
  56. http://www.ieee-security.org/TC/SP-Index.html
  57. http://www.iacr.org/conferences/eurocrypt2006/
  58. http://dimacs.rutgers.edu/SpecialYears/2003_CSIP/
  59. http://www.ieee-security.org/TC/SP-Index.html
  60. http://www.ieee-security.org/TC/SP-Index.html
  61. http://www.iacr.org/events/archive.html
  62. http://www.cs.utah.edu/flux/cipher/cipher-hypercalendar.html
  63. http://www.cs.vt.edu/~theoryc/
  64. http://www.dice.ucl.ac.be/crypto/call_for_papers.html
  65. http://www.cl.cam.ac.uk/users/bc201/security/conf.html
  66. http://www.acm.org/events/
  67. http://www.ieee.org/conferences/tag/
  68. http://www.iacr.org/index.html
  69. http://www.iacr.org/copyright.html


______________________________________________________________________________

   IACR Contact Information
______________________________________________________________________________

                  Officers and Directors of the IACR (2004)

Officers and directors of the IACR are elected for three year terms. If you
are a member and wish to contact IACR regarding an address change or similar
matter, you should contact the membership services at [iacrmem(at)iacr.org].
See http://www.iacr.org/iacrmem/ for more information.

The numbers in parentheses give the terms of service in calendar years. The
terms of service for conference chairs expire at the end of the calendar
year of the conference.

                                  Officers

  Andrew J. Clark                       Bart Preneel
  President (2002-2004)                 Vice President (2002-2004)
  P.O. Box 743                          Department of Electrical
  Brighton                              Engineering
  East Sussex                           Katholieke Universiteit Leuven
  BN1 5HS                               Kasteelpark Arenberg 10
  United Kingdom                        B-3001 Heverlee
  Tel: +44 1273 270752                  BELGIUM
  Fax: +44 1273 276558                  Tel: +32 16 32 11 48
  Email: president(at)iacr.org          Fax: +32 16 32 19 86
                                        Email: vicepresident(at)iacr.org

  Josh Benaloh                          Susan Langford
  Secretary (2002-2004)                 Treasurer (2002-2004)
  Microsoft Research                    1275 Poplar Ave #101
  One Microsoft Way                     Sunnyvale, CA 94086
  Redmond, WA 98052                     USA
  USA                                   Tel: +1 408 732 4305
  Tel: +1 425 703 3871                  Email: treasurer(at)iacr.org
  Fax: +1 425 936 7329
  Email: secretary(at)iacr.org

                                  Directors

  Thomas Berson                         Eli Biham
  Director (2004-2006)                  Director (2002-2004)
  Anagram Labs                          Computer Science Department
  P.O. Box 791                          Technion
  Palo Alto CA, 94301                   Haifa 32000
  USA                                   Israel
  Tel: +1 650 324 0100                  Tel: +972 4 8294308
  Email: berson(at)anagram.com          Fax: +972 4 8294308
                                        Email: biham(at)cs.technion.ac.il

  Christian Cachin                      Jan Camenisch
  Editor, IACR Newsletter (2002-2004)   Eurocrypt 2004 General Chair
  IBM Zurich Research Laboratory        IBM Zurich Research Laboratory
  Säumerstrasse 4                       Säumerstrasse 4
  CH-8803 Rüschlikon                    CH-8803 Rüschlikon
  Switzerland                           Switzerland
  Tel: +41 1 724 8989                   Tel: +41 1 724 8279
  Fax: +41 1 724 8953                   Fax: +41 1 724 8953
  Email: newsletter(at)iacr.org         Email: jca(at)zurich.ibm.com

  Ivan Damgård                          Ed Dawson
  Eurocrypt 2005 General Chair          Director (2003-2005)
  Department of Computer Science        Director, Information Security
  University of Aarhus                  Research Centre
  IT-parken, Aabogade 34                Queensland University of
  DK-8200 Aarhus N                      Technology
  Denmark                               GPO Box 2434
  Tel: +45 8942 5780                    Brisbane, Qld 4001
  Fax: +45 8942 5601                    AUSTRALIA
  Email: ivan(at)daimi.au.dk            Tel: +61 7 3864 1919
                                        Fax: +61 7 3221 2384
                                        Email: e.dawson(at)qut.edu.au

  Stuart Haber                          James Hughes
  Crypto 2005 General Chair             Crypto 2004 General Chair
  HP Labs                               Storage Technology Corp.
  5 Vaughn Drive                        7600 Boone Avenue North
  Princeton Junction, NJ 08540          Brooklyn Park, MN
  USA                                   USA
  Tel: +1 609 514 0681                  Tel: +1 763 424 1676
  Email: stuart.haber(at)hp.com         Fax: +1 763 424 1776
                                        Email: james_hughes(at)stortek.com

  Kwangjo Kim                           Lars Knudsen
  Asiacrypt 2004 General Chair          Director (2004-2006)
  School of Engineering                 Technical University of Denmark
  Information and Communications        Dept. of Mathematics
  Univ.                                 Building 303
  58-4 Hwaam-dong Yusong-ku             DK-2800 Lyngby
  Taejon, 305-348                       DENMARK
  KOREA                                 Tel: +45 4525 3048
  Tel: +82 42 866 6118                  Fax: +45 4588 1399
  Fax: +82 42 866 6154                  Email: knudsen(at)mat.dtu.dk
  Email: kkj(at)icu.ac.kr

  Arjen K. Lenstra                      Tsutomu Matsumoto
  Director (2004-2006)                  Director (2002-2004)
  Lucent Technologies, Room 2T-504      Graduate School of Environment and
  600 Mountain Avenue                   Information Sciences
  P.O.Box 636                           Yokohama National University
  Murray Hill, NJ 07974-0636            79-7 Tokiwadai, Hodogaya, Yokohama
  USA                                   240-8501, Japan
  Tel: +1 908 582 8323                  Tel: +81-45-339-4133
  Fax: +1 973 543 5094                  Fax: +81-45-339-4338
  Email: akl(at)lucent.com              Email:
                                        tsutomu(at)mlab.jks.ynu.ac.jp

  Ueli Maurer                           Kevin S. McCurley
  Editor-in-Chief, Journal of           Director (2002-2004)
  Cryptology (2002-2005)                6721 Tannahill Drive
  Department of Computer Science        San Jose, CA 95120
  ETH Zürich                            USA
  CH-8092 Zürich                        Tel: +1 408 927 1838
  Switzerland                           Email: see here
  Tel: +41 1 632 7420
  Fax: +41 1 632 1172
  Email: maurer(at)inf.ethz.ch or
  jofc(at)iacr.org

  C.Pandu Rangan                        Jean-Jacques Quisquater
  Asiacrypt 2005 General Chair          Director (2003-2005)
  Department of Computer Science and    Université catholique de Louvain
  Engineering                           Microelectronic laboratory
  Indian Institute of Technology,       Place du Levant, 3
  Madras                                1348 Louvain-la-Neuve
  Chennai - 600 036                     BELGIUM
  India                                 Tel: +32 10 47 25 41
  Tel: +91 44 2257 8336                 Fax: +32 10 47 25 98
  Fax: +91 44 2257 8352                 Email: jjq(at)dice.ucl.ac.be
  Email: rangan(at)iitm.ernet.in

  Rebecca Wright
  Director (2003-2005)
  Department of Computer Science
  Stevens Institute of Technology
  Castle Point on Hudson
  Hoboken, NJ 07030
  USA
  Tel: +1 201 216-5328
  Fax: +1 201 216-8249
  Email:
  rwright(at)cs.stevens-tech.edu

  ------------------------------------------------------------------------

                        Other People Working for IACR

 Hilarie Orman
 Archivist
 Email: archive(at)iacr.org

______________________________________________________________________________

   About the IACR Newsletter
______________________________________________________________________________
                                       
   The IACR Newsletter is published three times a year (usually in
   February, June, and October) and only available electronically. It is
   sent to IACR members by email (as a flat ASCII text) and published on
   the web at
   
     http://www.iacr.org/newsletter/
     
   If you are a member of IACR and wish to receive the newsletter, you
   need to make sure that we know your email address! To update your
   email address in the IACR member database, please contact the
   membership services at iacrmem(at)iacr.org .
   
   Contributions, announcements, book announcements or reviews, calls for
   papers ... are most welcome! Please include a URL and/or e-mail
   addresses for any item submitted (if possible). For things that are
   not on the Web, please submit a one-page ASCII version. Send your
   contributions to newsletter(at)iacr.org
   
The next issue

   Deadline for submissions to the next newsletter issue is October 1st, 
   2004. However, many items will be posted on the website as soon as 
   possible.

______________________________________________________________________________

End of IACR Newsletter, Vol. 21, No. 2, Summer 2004.
______________________________________________________________________________