FSE – 2004
Conference Schedule
The Hotel
Le Meridien , New Delhi.
5 Febuary 2004
9:30 – 10:30 Invited Talk-I
Session Chair : Bimal Roy
Title: New Cryptographic Primitives Based on Multiword T-functions.
Adi Shamir
10:30 – 11:00 Tea
11:00 – 12:40 Algebraic Attacks
Session Chair : Bart Preneel
11:00 – 11:25 Algebraic Attacks on Summation Generators
Dong
Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon
11:25 – 11:50 Algebraic Attacks on SOBER-t32 and SOBER-128
Joo Yeon
Cho and Josef Pieprzyk
11:50 - 12:15
Improving Fast Algebraic Attacks
Frederik
Armknecht
12:15
- 12:40 Resistance of S-boxes against Algebraic Attacks
Jung Hee
Cheon and Dong Hoon Lee
12:40 – 13:45 Lunch
13:45 – 15:00 Stream Cipher Cryptanalysis I
Session Chair : C. E. Veni Madhavan
13:45
– 14:10 Differential Attacks against the Helix Stream Cipher
Frédéric Muller
14:10 – 14:35 Improved Linear Consistency Attack on Irregular
Clocked Keystream Generators
Håvard
Molland
14:35 - 15:00
Correlation attacks using a new class of weak feedback polynomials
Håkan
Englund, Martin Hell and Thomas Johansson
15:00 – 15:30 Tea
15:30 – 16:20 Boolean Function
Session Chair : Claude Carlet
15:30
– 15:55 Minimum Distance between Bent and 1-resilient Boolean
Functions
Soumen
Maity and Subhamoy Maitra
15:55 – 16:20 Results on Rotation Symmetric Bent and Correlation
Immune Boolean Functions
Pantelimon
Stanica, Subhamoy Maitra and John A. Clark
16:20 – 17:10 Stream Cipher Cryptanalysis II
Session Chair : R. Balasubramaniam / R. Barua
16:20
– 16:45 A weakness of the linear part of stream cipher MUGI
Jovan
Golic
16:45 – 17:10 Vulnerability of Nonlinear Filter Generators
Based on Linear Finite State Machines
Jin
Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar
18:30 - 21:00 Banquet
6 Febuary 2004
9:30 – 10:45 Stream Cipher Design
Session Chair : David Wagner
9:30 - 9:55 VMPC One-Way Function and Stream Cipher
Bartosz Zoltak
9: 55 - 10:20 A New Stream Cipher HC-256 .
Hongjun Wu
10:20
- 10:45 A New Weakness in the RC4 Keystream Generator and an Approach
to Improve
the Security of the Cipher
Souradyuti
Paul and Bart Preneel
10:45 – 11:15 Tea
11:15 – 12:30 Design and Analysis of Block Ciphers I
Session Chair : Helena Handschuch
11:15 – 11:40 Improving Immunity of Feistel Ciphers against
Differential
Cryptanalysis by using Multiple MDS Matrices
Taizo Shirai and Kyoji Shibutani
11:40 – 12:05 ICEBERG : an Involutional Cipher Efficient for
Block Encryption in
Reconfigurable hardware
F.X.Standaert, G.Piret, G.Rouvroy, J.J.Quisquater and J.D.Legat
12:05 – 12:30 Related Key Differential Attacks on 26 rounds?of
XTEA and Full
rounds of GOST
Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Jongin Lim
12:30 – 13:20 Design and Analysis of Block Ciphers II
Session Chair : Rajeeva L. Karandikar
12:30
- 12:55 On the Additive Differential Probability of Exclusive-Or
Helger Lipmaa , Johan Wallen and Philippe Dumas
12:55
- 13:20 Two Power Analysis Attacks against One-Mask Methods
Mehdi-Laurent Akkar, Régis Bévan and Louis Goubin
13:20 - 14:20 Lunch
14:30 – 21:00 City Tour, Cultural Show
and Dinner
7 Febuary 2004
9:30 – 10:30 Invited Talk-II
Session Chair : Willi Meier
Title: Towards a unifying view of block cipher cryptanalysis.
David Wagner
10:30 – 11:00 Tea
11:00 – 12:15 Cryptographic Primitives: Theory
Session Chair : Ross Anderson
11:00
– 11:25 Nonce based Symmetric Encryption
Phillip Rogaway
11:25 – 11:50 Ciphers Secure Against Related-Key Attacks
Stefan Lucks
11:50
- 12:15 Cryptographic Hash-Function Basics: Definitions, Implications
and
Separations for Preimage Resistance, Second-Preimage Resistance, and
Collision Resistance
Phillip Rogaway and Thomas Shrimpton
12:30 – 13:30 Lunch
13:30 – 14:45 Modes of Operation
Session Chair : C. Pandu Rangan
13:30
- 13: 55 The EAX mode of operation
Mihir Bellare, Philip Rogaway and David Wagner
13:55 - 14:20 A high-performance conventional authenticated
encryption mode
Tadayoshi Kohno, John Viega and Doug Whiting
14:20
- 14 :45 New Security Proofs for the 3GPP Confidentiality and
Integrity Algorithms
Tetsu Iwata and Tadayoshi Kohno
15:00 – 16:15 Analysis of MACs and Hash
Functions
Session Chair : Adi Shamir
15:00 – 15:25
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Simon R. Blackburn and Kenneth G. Paterson
15:25 – 15:50
Fast Software-Based Attacks on SecurID
Scott Contini and Yiqun Lisa Yin
15:50 – 16:15
A MAC forgery attack on SOBER-128
Dai Watanabe and Soichi Furuya