Tuesday, June 2, 1998
Chair: Jim Massey
Speakers are indicated in bold face.
Part I - 10 minute presentations
- Solitaire zero knowledge
- V. Niemi and A. Renvall
- Pseudo random generators with guaranteed diversity
- A. Shamir and B. Tsaban
- A new simple and efficient batch RSA (Rabin) based cryptosystem
- Z. Shmuely
- The policeman in the middle attack
- M. Joye, J.-J. Quisquater, and M. Yung.
- An efficient algorithm for SPKI/SDSI group membership.
- J.E. Elien, M. Fredette, A. Morcos, & R. Rivest
- Non-injectivity of a public key cryptosystem
- J. Koskinen
- A comment on the BBDW96 threshold scheme
- Y. Desmedt
Part II: 7 minute presentations
- No weak keys in RC5a?
- R. Wobst
- Maurer's universal test and random source entropy
- J.-S. Coron
- Speeding up the parallelized Pollard lambda search on binary anomalous
curves
- R. Gallant, R. Lambert and S. Vanstone
- A block cipher called SEA
- D. Naccache
- Securely revisiting distributed key generation
- R. Gennaro, S. Jarecki, & T. Rabin
- Multi-DES: Properties of DES that facilitate differential cryptanalysis
- J. Stiebel
- A timing attack on RC5
- H. Handschuh
- Compact ISO 9796
- C. Clavier
- Smart card cryptoprocessors for Public Key Cryptography
- H. Handschuh and P. Paillier
- Making cryptanalysis illegal
- Y. Desmedt
- A week of key conferences
- J.-J. Quisquater