International Association for Cryptologic Research
IACR logo

IACR Newsletter

The newsletter of the International Association for Cryptologic Research.

Vol. 26, No. 1, Spring 2011, (Publication date: 3 March 2011).

Contents

Survey IACR Elections 2010

In order to evaluate the past IACR election, a survey has been set up. Please help us to identify the strong and weak points by participating!

Detailed results of the 2010 election are given below.

Book Reviewers needed

Have you read a book lately? Do you got an opinion about it? Was the book about cryptography (or some related subject)? If the answer for all three questions was "yes!" - why not helping the cryptographic community by writing a book review?

You find a list of books still looking for a reviewer at our book review site or at the end of this newsletter. You can also find some sample reviews there.

If you have any questions, please contact Axel Poschmann (books (at) iacr.org) directly.

Upcoming Events

IACR Conferences

IACR Workshops

Events in cooperation with IACR

Further events can be found here. You can also add your events or calls for special issues of journals there.

IACR Fellows 2011 selected

  • David Kahn: For being cryptography's foremost historian and a co-founder of the IACR.
  • Charlie Rackoff: For pioneering contributions to the scientific foundations of cryptology and for sustained leadership in cryptographic education.
  • Richard Schroeppel: For pioneering and analysing the sieving technique underlying subexponential factoring and discrete logarithm methods.
  • Scott Vanstone: For essential work on the deployment of Elliptic Curve Cryptography, sustained educational leadership in applied cryptology, and service to the IACR.

IACR Elections 2010 / Results

The 2010 IACR elections included races for all IACR Officer positions (President, Vice-President, Treasurer, and Secretary) and three rotating Director positions. There was one candidate for President, two for each of the three other Officer positions, and six candidates for the three Director positions (one candidate ran both for an Officer and Director position).

For the first time, the IACR elections were conducted electronically using the Helios cryptographically-verifiable voting system. Despite a small number of concerns and complaints about possible security issues with online voting (even with a universally-verifiable system), the election seemed quite successful with a participation rate approximately 50% higher than with prior paper-based postal elections. The electronic system also reduced costs, substantially decreased lead time, and eliminated disqualification of ballots due to voter errors. Additionally, members who previously did not have an opportunity to vote because the IACR did not have a current physical address or because of slow mail service were able to participate in this election. Voting credentials were sent to 1555 IACR members - including 52 for whom the IACR had no physical address. A total of 499 ballots were cast by 475 distinct voters (only the last ballot submitted by each voter is included in the tally). An additional 26 optional “challenge� ballots were submitted for inclusion in the election audit - these challenge ballots helped to ensure the integrity of the Helios voting clients. Candidate names on the ballot were randomly ordered by the election chair using dice rolls. The results, as follows, were verified by the Helios election auditor as well as an independent auditor written and hosted by UC Louvain.

Election of Officers

Seven candidates stood for the four open officer positions. The  candidates with the highest number of votes were elected. They are marked in bold:

President:  Bart Preneel (429)
Vice President:  Christian Cachin (268) Helena Handschuh (179)
Secretary:  Martijn Stam (265) James Hughes (162)
Treasurer:  Greg Rose (275) Marcelo Kaihara (141)

Their terms will expire on 31 December 2013.

Election of Directors

Six candidates stood for the three open positions of Director. The three candidates with the highest number of votes were elected. Their names are in bold.

  • David Pointcheval (230)
  • Mitsuru Matsui (216)
  • Christof Paar (210)
  • Amit Sahai (169)
  • John Kelsey (130)
  • Christian Cachin (199) Not eligible as a director as already voted as vice-president

Their terms will expire on 31 December 2013.

Message from the President

In the Fall of 2010, the IACR has held for the first time elections using the Helios system. The election process was run very smoothly. Participation was up by about 50% compared to the previous years. I would like to thank the Helios team and the members of the Election Committee and the Board members who have made this happen. If you have suggestions for the improvement of Helios or the election procedures, we would like to hear from you. This is also the right time to thank Ed Dawson for his long service on the IACR Board (as Director, Vice President and Asiacrypt Steering Committee Chair), Helena Handschuh for her service as Treasurer, and Tom Shrimpon for serving as Membership Secretary.

You will also find in this newsletter the upcoming events for the next months; with three workshops and one conference the period February-May is always always a peak period for the IACR. I would like to thank the general chairs and program chairs of these events for their hard work; special thanks also to the IACR team that supports these events behind the scenes, and in particular Shai Halevi (membership secretary), Helena Handschuh (outgoing treasurer) and Greg Rose (new treasurer).

In the coming period, IACR will make a shift towards electronic publishing. By listening to your feedback, we have learned that there is a growing number of members who no longer want to receive publications on paper. A natural starting point to offer this option is the Journal of Cryptology, as this can bring a substantial cost reduction; in a later stage we may expand this to the workshops and conferences.

Bart Preneel
IACR President

On the Memory of Prof. Chi-Sung Laih

It is with great sorrow that we learned the passing of Professor Chi Sung Laih.

Professor Chi-Sung Laih was one of Taiwan's most distinguished researchers in cryptography and information security. He was born in 1956, in a remote village in southern Taiwan. After graduating from a vocational high school, he worked for Chunghwa Telecom. At the same time, he also studied as a part-time student at National Cheng Kung University (NCTU). After receiving his bachelor's degree, he went on to obtain a master degree and then a doctorate degree in Electrical Engineering from the same university. He graduated with his doctorate degree in 1990 and then joined the faculty of NCKU.

Professor Laih was a dedicated professor and researcher. He tried his very best in doing everything. He published in many prestigious journals and conferences. His research area includes public-key cryptography, information security, error correcting codes, and communication systems.

In 1994, working together with other professors, Professor Laih contributed to the formation of the Chinese Cryptography and Information Security Association (CCISA) in Taiwan. This organization has not only enabled researchers in Taiwan to pool their resources and ideas, but has also fastened interactions with similar organizations in other parts of the world.

Professor Chi-Sung Laih served two terms as the Chairman of the Board of Directors of CCISA. In his tenure, he sought to host an Asiacrypt conference in Taiwan. This was the first attempt for Taiwan to host such a conference. Through his hard work, the CCISA was able to secure financial support, overcoming all sorts of difficulties during the initial stage of the preparation. His efforts contributed greatly to the eventual success of the ASIACRYPT 2003.

Professor Laih was awarded "The Excellence Research Award" by National Science Council in 1996 and 1998. Starting from 2002, he was appointed as the Chair Professor at NCTU. He was invited to give invited speech and awarded "The Best Paper Award" in many conferences. In addition to the academic achievement, he also helped many government agencies, as well as private companies, to enhance their information security infrastructure.

Professor Chi-Sung Laih passed away on August 29, 2010. His contributions to cryptography and information security will be missed by all of us.

Asiacrypt Steering Committee (ASC) of IACR & Chinese Cryptology and Information Security Association (CCISA).

Mobile Phone Security Algorithms - New Version

Previously on this web site and also in the September 2010 IACR Newsletter we reported that a new set of cryptographic algorithms was being proposed for inclusion in the "4G" mobile standard called LTE (Long Term Evolution). The crypto community was invited to analyse the algorithms and report results.

The algorithms are:

  • a stream cipher called ZUC, which is the core of both new LTE algorithms;
  • the LTE encryption algorithm called 128-EEA3, defined straightforwardly using ZUC;
  • the LTE integrity algorithm called 128-EIA3, designed as a Universal Hash Function using ZUC as its core.
The public evaluation yielded valuable results. Some flaws were identified in the algorithms. New versions of the algorithms have now been produced, correcting those problems, and a new period of public evaluation has begun.

The algorithms are here: http://gsmworld.com/our-work/programmes-and-initiatives/fraud-and-security/gsm_security_algorithms.htm. The design and evaluation report (Document 4) includes details of what has changed and why.

Analysis of the new algorithm versions is invited, before a final decision is taken in (probably) July 2011 as to whether to include the new algorithms in the LTE standard. The discussion forum http://zucalg.forumotion.net/ is still the right place to post any evaluation results.

Service to members and the cryptographic community

Among others, IACR offers the following benefits:

  1. IACR Reading Room
  2. Open Positions
  3. ePrint
  4. IACR Archive

a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link

b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis.

c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions.

d. The proceedings of some conferences past are made available by the IACR in an archive. The copyright for these papers is held by the IACR.

Reports on Past Events

Asiacrypt 2010, December 5-9, 2010, Singapore

Asiacrypt 2010 was held at Swissôtel Merchant Court, Singapore, on 5 - 9 December 2010.
A total of 35 research papers, categorized into 12 sessions, were presented, selected from 219 submissions. Bart Preneel, President of IACR, and Krawczyk Hugo from IBM Research delivered the invited lectures on the topics "Cryptographic Hash Functions and the SHA-3 Competition" and "Cryptography, from Theory to Practice: A Personal Perspective", respectively. The Rump Session was chaired by Ed Dawson. Most of the presentation slides for the technical sessions and all the slides for the rump session can be found on the conference website at http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/Program.html and http://www.spms.ntu.edu.sg/Asiacrypt2010/Common/rumpsession.html, respectively.
The conference banquet was held at Grand Shanghai Restaurant, a 15-minute stroll along the banks of the Singapore River from the conference hotel, on Wednesday evening. The best paper award was also presented during the banquet to Dmitry Khovratovich, Ivica Nikolic and Christian Rechberger for their paper "Rotational Rebound Attacks on Reduced Skein".
The conference ended successfully on 9 December, having attracted 239 participants (50 being students), from 30 countries, mainly from Asia (146), Europe (61) and North America (21). We thank the sponsors for their generous support and contributions to the success of the conference.
Program Chair was Masayuki Abe and General Chair was San Ling.

Fast Software Encryption 2011, February 13-16, 2011, Lyngby, Denmark

FSE 2011 took place from February 13 to February 16, 2011, in Denmark. The general co-chairs were Lars R. Knudsen and Gregor Leander and the program chair Antoine Joux. This was the 18th edition of FSE. The venue was the Technical University of Denmark which is some 30 kilometres north of Copenhagen. There were about 150 attendees most of which stayed in hotels downtown Copenhagen.
Each morning there were FSE buses from a central hotel to the conference venue and buses the other way in the afternoon. There was a rump session on the Monday chaired this time by Vincent Rijmen. The registration fee for normal attendees was 350 US$ (not including the 70$ IACR membership fee). As a new initiative the printed proceedings will not be sent to the attendees but all have access to the electronic version when published through the IACR reading room at Springer. Moreover, FSE 2011 did not have printed pre-proceedings, but instead made the papers available online before and during the conference.
There was a record number of submissions, 106 (matching the number from 2006) of which 22 were accepted for presentation. There were two invited talks, one by Willi Meier and one by Ivan Damgaard.

Inscrypt 2010, October 20-23, 2010, Shanghai, China

Inscrypt 2010 was held in Shanghai China from October 20 to 23, there were nearly 110 participants from 16 countries and regions.
This conference was held in the Academic Activity Center (AAC-Hotel) at Min-Huang Campus of Shanghai Jiaotong University. The banquet was held at the Xiao Nan Guo Restaurant in the evening of October 22. The conference organizers are State Key Laboratory of Information Security, Chinese Association for Cryptologic Research and Shanghai Jiaotong University. Programme chairs are Xuejia Lai and Moti Yung, General chair was Dengguo Feng.

Book Reviews

The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available! In general, new books will be added around January and July to these lists.

An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all reviews added since the last newsletter was sent out. You can access the full list via the following link.

  • Jonathan Katz and Yehuda Lindell: "Introduction to Modern Cryptography", 2008:
    Introduction to Modern Cryptography provides a very well-balanced and thorough introduction to cryptography. This it book highlights precise definitions and rigorous proofs that have shaped cryptography into its current mathematically enriched form. It covers fundamental notions of modern cryptography ranging from public, private key encryption to data integrity and signatures. This is a must-read for researchers in cryptography.
    Publisher: CRC Press/Taylor & Francis Group. ISBN: 978-1-584-885-511
    Review written by Ladan Mahabadi (McGill University, Melbourne, Canada). (Date: 2011-03-01)
    A previous review of this book by Cristina Onete can be found here. (Date: 2010-01-13)

  • B. Schneier: "Beyond Fear", 2006:
    This book is about security in general. In contrast to many other books, Schneier explains how security works in the most general case, starting from protecting the diary of your sister to protecting the nation from global terrorism. Schneiers book does not focus on cryptography or network security, instead it uses examples of systems everyone is expected to be familiar with, e.g. airport security. The book entertains the reader and encourages him thinking rational about security threads and security solutions. I would recommend the book to everybody who starts working in the security business, but not for readers who are searching for technical details about any kind of security systems.
    Review written by Erik Tews (TU Darmstadt, Germany). (PDF)
    Publisher: Springer. ISBN: 978-0-387-02620-6 (Date: 2010-11-03)

  • J. Smith: "Introduction to Abstract Algebra", 2008:
    This is a careful treatment of the principal topics of Abstract Algebra in 327 pages. Taking a different approach from several books, it helps the reader to have a solid introduction to abstract algebra and establishes the link between it and the cryptographic world in many "Study projects". This is an attractive book which could be read by everybody because the author supposes not so much knowledge from the reader and gives all the necessary information to continue the reading from a chapter to the next. I believe that the readers, students and even experienced researchers may benefit strongly from this book.
    Review written by Frederic A.B. Edoukou (CCRG, Nanyang Technical University, Singapore). (PDF)
    Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-6371-4 (Date: 2010-10-11)

  • A. Joux: "Algorithmic Cryptanalysis", 2009:
    Algorithmic Cryptanalysis is a high level book that covers many interesting topics, so it is impossible to go into all details of the different topics. However, for each topic the reader can Þnd several references, which is a convenient extra of the book. I would recommend this book for graduate students with a strong mathematical background, a cryptographic background, knowledge in C-programming and an interest in implementing cryptanalytic attacks.
    Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (PDF)
    Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-7002-6 (Date: 2010-10-07)

  • C. Paar and J. Pelzl: "Understanding Cryptography", 2010:
    This book does not make any assumptions on prior knowledge in neither mathematics nor computer science. It is therefore not only suited for undergraduate students in mathe- matics or in the computer science Þeld, but rather also for students from other domains requiring crypto skills such as legal people for example. I would certainly recommend this book for the audience it is targeting.
    Review written by Luigi Lo Iacono (European University of Applied Sciences). (PDF)
    Publisher: Springer. ISBN: 978-3-642-04100-6 (Date: 2010-10-07)

  • S. Mangard, E. Oswald and T. Popp: "Power Analysis Attacks: Revealing the Secrets of Smart Cards", 2007:
    This book provides a very clear, complete and highly illustrated presentation of power analysis methods used to extract secret information from cryptosystems such as smart cards. All concepts are progressively introduced, mathematically analyzed and illustrated using many real attacks results. The main attack methods and some variants as well as standard countermeasures are presented and their limitations and efficiency aspects are discussed. Both software and hardware implementations on smart cards are targeted. I highly recommend this very nice book.
    Review written by Arnaud Tisserand (CNRS, IRISA Laboratory, Lannion, France). (PDF)
    Publisher: Springer. ISBN: 978-0-387-30857-9 (Date: 2010-10-07)

List of books for review

The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. New book reviews are posted continiously.

Available Books

Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name].

Go to titles from:

Springer
Below you find a selection of books from Springer. Further titles are available via Springer's website.
  1. Adjeroh: The Burrows-Wheeler Transform
  2. Bella: Formal Correctness of Security Protocols
  3. Buchmann: Binary Quadratic Forms
  4. Calmet: Mathematical Methods in Computer Science
  5. Camp: Economics of Identity Theft
  6. Dietzfelbinger: Primality Testing in Polynomial Time
  7. Di Pietro: Intrusion Detection Systems
  8. Fine: Number Theory
  9. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  10. Hromkovic: Algorithmic Adventures
  11. Kuo: Precoding Techniques for Digital Communication Systems
  12. Li: An Introduction to Kolmogorov Complexity and Its Applications
  13. Mehlhorn: Algorithms and Data Structures
  14. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  15. Portnoy: Global Initiatives to Secure Cyberspace
  16. Robshaw: New Stream Cipher Designs
  17. Rodríguez-Henríquez: Cryptographic Algorithms on Reconfigurable Hardware
  18. Rosen: Concurrent Zero-Knowledge
  19. Salomon: A Concise Introduction to Data Compression
  20. Sammes: Forensic Computing
  21. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  22. Schroeder: Number Theory in Science and Communication
  23. Shi: Transactions on Data Hiding and Multimedia Security III
  24. Traynor: Security for Telecommunications Networks
  25. Tuyls: Security with Noisy Data
  26. Vadhan: A Study of Statistical Zero-Knowledge Proofs
  27. Vöcking: Taschenbuch der Algorithmen [German]
  28. Yeung: Information Theory and Network Coding
Taylor & Francis
Below you find a selection of books from Taylor & Francis.
  1. Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices
  2. Thuraisingham, Bhavani: Secure Semantic Service-Oriented Systems
  3. Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words
  4. Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications
  5. Chartrand, Gary: Chromatic Graph Theory
  6. Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography
  7. Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering
  8. Erickson, Martin: Introduction to Number Theory
  9. Gross, Jonathan L.: Combinatorial Methods with Computer Applications
  10. Gould, Ronald J: Mathematics in Games, Sports, and Gambling
  11. Hsu, Lih-Hsing: Graph Theory and Interconnection Networks
  12. Johnson, Norman: Handbook of Finite Translation Planes
  13. Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  14. Lindner, Charles C.: Design Theory, Second Edition
  15. Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies
  16. Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems
  17. Mollin, Richard A.: Advanced Number Theory with Applications
  18. Newman, Robert C.: Computer Forensics: Evidence Collection and Management
  19. Paulsen, William: Abstract Algebra. An interactive Approach
  20. Peeva, Irena: Syzygies and Hilbert Functions
  21. Roberts, Fred: Applied Combinatorics, Second Edition
  22. Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations
  23. Szabo, Sandor: Factoring Groups into Subsets
  24. Talukder, Asoke K.: Architecting Secure Software Systems
  25. Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition
  26. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing
  27. Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
  28. Zhang, Y.: Security in Wireless Mesh Networks

Cryptology ePrint Archive: Top 20 Downloads in the last 6 month

This report includes all downloads from the ePrint archive between September 1, 2010 and Februars 28, 2011.
  1. 2010/332 ( PDF ) with 29078 downloads
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
    Aurelien Francillon and Boris Danev and Srdjan Capkun
  2. 2007/120 ( PDF ) with 7903 downloads
    Breaking 104 bit WEP in less than 60 seconds
    Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
  3. 2004/314 ( PDF ) with 7435 downloads
    A Technical Comparison of IPSec and SSL
    AbdelNasir Alshamsi and Takamichi Saito
  4. 2010/006 ( PDF ) with 5088 downloads
    Factorization of a 768-bit RSA modulus
    Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thom and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
  5. 2011/035 ( PDF ) with 2954 downloads
    A New Family of Practical Non-Malleable Protocols
    Andrew C. Yao and Yunlei Zhao
  6. 2010/643 ( PDF ) with 2650 downloads
    Construct MD5 Collisions Using Just A Single Block Of Message
    Tao Xie and Dengguo Feng
  7. 2010/439 ( PDF ) with 2581 downloads
    Embedded Extended Visual Cryptography Schemes
    Feng Liu and Chuankun Wu
  8. 2004/199 ( PDF ) with 2315 downloads
    Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
    Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
  9. 2009/223 ( PDF ) with 1998 downloads
    How To Find Weak Input Differences For MD5 Collision Attacks
    Tao Xie and Dengguo Feng
  10. 2008/469 ( PS PS.GZ PDF ) with 1920 downloads
    Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
    Stephane Manuel
  11. 2006/231 ( PS PS.GZ PDF ) with 1820 downloads
    A handy multi-coupon system
    Sebastien Canard and Aline Gouget and Emeline Hufschmitt
  12. 2006/262 ( PDF ) with 1806 downloads
    Logical Concepts in Cryptography
    Simon Kramer
  13. 2011/018 ( PDF ) with 1621 downloads
    Homomorphic Signatures for Polynomial Functions
    Dan Boneh and David Mandell Freeman
  14. 2006/105 ( PDF ) with 1568 downloads
    Tunnels in Hash Functions: MD5 Collisions Within a Minute
    Vlastimil Klima
  15. 2004/203 ( PS PS.GZ PDF ) with 1546 downloads
    How to Cheat at Chess: A Security Analysis of the Internet Chess Club
    John Black and Martin Cochran and Ryan Gardner
  16. 2009/579 ( PDF ) with 1413 downloads
    Privacy-Preserving Public Auditing for Secure Cloud Storage
    Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou
  17. 2010/594 ( PDF ) with 1372 downloads
    Cache Games - Bringing Access Based Cache Attacks on AES to Practice
    Endre Bangerter and David Gullasch and Stephan Krenn
  18. 2010/337 ( PDF ) with 1332 downloads
    Practical-Titled Attack on AES-128 Using Chosen-Text Relations
    Vincent Rijmen
  19. 2002/045 ( PS PS.GZ PDF ) with 1233 downloads
    Cryptanalysis of S-DES
    Dr. K. S. Ooi, Brain Chin Vito
  20. 2007/471 ( PDF ) with 1212 downloads
    Attacks on the WEP protocol
    Erik Tews


You may opt out of the newsletter either by editing your contact information and preferences here.

Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org.

IACR contact information. Current newsletter editor is Christopher Wolf.