FSE – 2004
                                        Conference Schedule
                                                            The Hotel Le Meridien , New Delhi.
                                                                             
5 Febuary 2004

                 9:30 – 10:30  Invited Talk-I
                                      Session Chair : Bimal Roy
Title: New Cryptographic Primitives Based on Multiword T-functions.
Adi Shamir

                 10:30 – 11:00  Tea

                 11:00 – 12:40  Algebraic Attacks
                                         Session Chair : Bart Preneel
                 11:00 – 11:25  Algebraic Attacks on Summation Generators
                                        Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon
                 11:25 – 11:50  Algebraic Attacks on SOBER-t32 and SOBER-128
                                        Joo Yeon Cho and Josef Pieprzyk
                 11:50 - 12:15  Improving Fast Algebraic Attacks
                                        Frederik Armknecht
                 
12:15 - 12:40  Resistance of S-boxes against Algebraic Attacks
                                        Jung Hee Cheon and Dong Hoon Lee
               12:40 – 13:45   Lunch    
               13:45 – 15:00   Stream Cipher Cryptanalysis I
                                       Session Chair : C. E. Veni Madhavan
               13:45 – 14:10   Differential Attacks against the Helix Stream Cipher
                                       Frédéric Muller
               14:10 – 14:35   Improved Linear Consistency Attack on Irregular Clocked Keystream Generators
                                       Håvard Molland
               14:35 - 15:00   Correlation attacks using a new class of weak feedback polynomials
                                       Håkan Englund, Martin Hell and Thomas Johansson

                15:00 – 15:30   Tea

                15:30 – 16:20    Boolean Function
                                         Session Chair : Claude Carlet
                15:30 – 15:55    Minimum Distance between Bent and 1-resilient Boolean Functions
                                         Soumen Maity and Subhamoy Maitra
                15:55 – 16:20     Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions
                                        Pantelimon Stanica, Subhamoy Maitra and John A. Clark
                16:20 – 17:10    Stream Cipher Cryptanalysis II
                                         Session Chair : R. Balasubramaniam / R. Barua
                16:20 – 16:45   A weakness of the linear part of stream cipher MUGI
                                         Jovan Golic
                16:45 – 17:10   Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
                                         Jin Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar

                 18:30 - 21:00   Banquet

6 Febuary 2004  

                      9:30 – 10:45   Stream Cipher Design
                                            Session Chair : David Wagner
                      9:30 - 9:55     VMPC One-Way Function and Stream Cipher
                                            Bartosz Zoltak
                     9: 55 - 10:20   A New Stream Cipher HC-256 .
                                            Hongjun Wu
                    10:20 - 10:45  A New Weakness in the RC4 Keystream Generator and an Approach
                                           to Improve the Security of the Cipher
                                           Souradyuti Paul and Bart Preneel
                    10:45 – 11:15   Tea

                    11:15 – 12:30    Design and Analysis of Block Ciphers I
                                             Session Chair : Helena Handschuch
                    11:15 – 11:40    Improving Immunity of Feistel Ciphers against Differential
                                             Cryptanalysis by using Multiple MDS Matrices
                                             Taizo Shirai and Kyoji Shibutani
                    11:40 – 12:05    ICEBERG : an Involutional Cipher Efficient for Block Encryption in
                                             Reconfigurable hardware
                                             F.X.Standaert, G.Piret, G.Rouvroy, J.J.Quisquater and J.D.Legat
                    12:05 – 12:30   Related Key Differential Attacks on 26 rounds?of XTEA and Full
                                            rounds of GOST
                                            Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Jongin Lim
                   
                   12:30 – 13:20    Design and Analysis of Block Ciphers II
                                             Session Chair : Rajeeva L. Karandikar
                   12:30 - 12:55     On the Additive Differential Probability of Exclusive-Or
                                             Helger Lipmaa , Johan Wallen and Philippe Dumas
                   12:55 - 13:20     Two Power Analysis Attacks against One-Mask Methods
                                             Mehdi-Laurent Akkar, Régis Bévan and Louis Goubin
                   13:20 - 14:20     Lunch
                   14:30 – 21:00     City Tour, Cultural Show and Dinner                        

7 Febuary 2004  

                    9:30 – 10:30    Invited Talk-II
                                            Session Chair : Willi Meier
Title: Towards a unifying view of block cipher cryptanalysis.
David Wagner

                     10:30 – 11:00   Tea

                     11:00 – 12:15   Cryptographic Primitives: Theory
                                              Session Chair : Ross Anderson
                     11:00 – 11:25    Nonce based Symmetric Encryption
                                              Phillip Rogaway
                     11:25 – 11:50    Ciphers Secure Against Related-Key Attacks
                                              Stefan Lucks
                     11:50 - 12:15    Cryptographic Hash-Function Basics: Definitions, Implications and
                                              Separations for Preimage Resistance, Second-Preimage Resistance, and
                                              Collision Resistance
                                              Phillip Rogaway and Thomas Shrimpton
                    12:30 – 13:30    Lunch
                    13:30 – 14:45     Modes of Operation
                                              Session Chair : C. Pandu Rangan 
                    13:30 - 13: 55    The EAX mode of operation
                                              Mihir Bellare, Philip Rogaway and David Wagner
                    13:55 - 14:20     A high-performance conventional authenticated encryption mode
                                              Tadayoshi Kohno, John Viega and Doug Whiting
                    14:20 - 14 :45    New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
                                              Tetsu Iwata and Tadayoshi Kohno
                  15:00 – 16:15      Analysis of MACs and Hash Functions
                                             Session Chair : Adi Shamir  
                  15:00 – 15:25    Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
                                            Simon R. Blackburn and Kenneth G. Paterson
                  15:25 – 15:50    Fast Software-Based Attacks on SecurID
                                            Scott Contini and Yiqun Lisa Yin
                  15:50 – 16:15    A MAC forgery attack on SOBER-128
                                            Dai Watanabe and Soichi Furuya