next up previous
Next: About this document ...

INDOCRYPT 2000

First International Conference on Cryptology in India

Indian Statistical Institute, Calcutta, India

10-13 December 2000

http://www.isical.ac.in/indocrypt

Programme

10 December, 2000



  0000-0000  : 

1030-1130 : Tutorial I

$\textstyle \parbox{\boxwidth}{\textrm{Number Theory and Cryptography}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~R.~Balasubramaniam \emph{Inst. of Mathematical Sciences, Chennai}}}$

1130-1230 : Tutorial II

$\textstyle \parbox{\boxwidth}{\textrm{Complexity in Cryptography}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~K.~Sikdar \emph{Indian Statistical Institute, Calcutta}}}$

1330-1415 : Tutorial III

$\textstyle \parbox{\boxwidth}{\textrm{Payment Systems and E-Cash and RelatedAuthentication}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~C~E~Veni Madhavan\emph{Indian Institute of Science, Bangalore}}}$

1415-1500 : Tutorial IV

$\textstyle \parbox{\boxwidth}{\textrm{Sequences and Stream Cipher}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~Cunsheng Ding\emph{Hong Kong Univ. of Science and Technology}}}$

1500-1545 : Tutorial V

$\textstyle \parbox{\boxwidth}{\textrm{Differential Cryptanalysis}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~Eli Biham\emph{Technion--Israel Inst. Of Technology}}}$

1630-1730 : Inauguration

$\textstyle \parbox{\boxwidth}{\textrm{~}}$
$\textstyle \parbox{\smboxwidth}{\textit{Dr.~N.~Vittal \emph{Chief VigilanceCommissioner, Govt. of India}}}$

$\textstyle \parbox{\boxwidth}{\textrm{~}}$
$\textstyle \parbox{\smboxwidth}{\textit{\emph{Special Guest}: Dr.~K.~N.~Gupta \emph{Controller of Certifying Auth., Govt. of India}}}$

11 December, 2000



  0000-0000  : 

0930-1030 : Invited Talk

$\textstyle \parbox{\boxwidth}{\textrm{Cryptographic Protocols and Their Complexities}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~Adi Shamir \emph{M.I.T.,USA}}}$

1100-1300 : 1. $\textstyle \parbox{0.75\smboxwidth}{E-cash and Multi-party Computation}$

$\textstyle \parbox{\boxwidth}{\textrm{An online, transferable E-cash payment system}}$
$\textstyle \parbox{\smboxwidth}{\textit{R.~Sai Anand, C.~E.~Veni~Madhavan \emph{IISCBangalore}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Anonymity control in Multi-bank E-cash system}}$
$\textstyle \parbox{\smboxwidth}{\textit{Ik Rae Jeong, Dong Hoon Lee \emph{Korea University}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Efficient Asynchronous Secure Multiparty DistrilbutedComputation}}$
$\textstyle \parbox{\smboxwidth}{\textit{K.~Srinathan, C.~Pandu Rangan \emph{IIT Madras}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Tolerating Generalized Mobile Adversaries in SecureMulti-party Computation}}$
$\textstyle \parbox{\smboxwidth}{\textit{K.~Srinathan, C.~Pandu Rangan \emph{IIT Madras}}}$

1400-1530 : 2. $\textstyle \parbox{0.75\smboxwidth}{Stream Ciphers and Boolean Function}$

$\textstyle \parbox{\boxwidth}{\textrm{The correlation of a Boolean function with its variable}}$
$\textstyle \parbox{\smboxwidth}{\textit{Dingyi Pei, Wenliang Qin \emph{State Key Lab. Of Inf. Security, China}}}$

$\textstyle \parbox{\boxwidth}{\textrm{On choice of connection-polynomials for LFSR-based Stream Ciphers}}$
$\textstyle \parbox{\smboxwidth}{\textit{K.Jambunathan \emph{ISI Calcutta}}}$

$\textstyle \parbox{\boxwidth}{\textrm{On resilient Boolean function with maximal possible nonlinearity}}$
$\textstyle \parbox{\smboxwidth}{\textit{Yuriy V.~Tarannikov \emph{Mech. and Math. Dept, Moscow State University, Russia}}}$

1600-1700 : 3. Cryptanalysis I

$\textstyle \parbox{\boxwidth}{\textrm{Decimation attack of stream ciphers}}$
$\textstyle \parbox{\smboxwidth}{\textit{Eric Filiol \emph{INRIA, France}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Cryptanalysis of the A5/1 GSM Stream Cipher}}$
$\textstyle \parbox{\smboxwidth}{\textit{Eli Biham, Dunkelman Orr \emph{Technion -- Israel Inst. Of Technology , Israel}}}$

12 December, 2000



  0000-0000  : 

0930-1030 : Invited Talk

$\textstyle \parbox{\boxwidth}{\textrm{On the Selection of the Advanced Encryption Standard}}$
$\textstyle \parbox{\smboxwidth}{\textit{Prof.~Eli Biham \emph{Technion -- Israel Inst. Of Technology , Israel}}}$

1100-1200 : 4. Elliptic Curve

$\textstyle \parbox{\boxwidth}{\textrm{Power Analysis Breaks Elliptic Curve Cryptosystem EvenSecure Against the Timing Attack}}$
$\textstyle \parbox{\smboxwidth}{\textit{Katsuyuki Okeya \emph{Hitachi Ltd., Japan}, Kouichi Sakurai \emph{Kyushu Univ., Japan}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Efficient Construction of Cryptographically Strong Elliptic Curves}}$
$\textstyle \parbox{\smboxwidth}{\textit{Harald Baier, Johannes Buchmann \emph{Univ. of Tech. , Germany}}}$

1200-1300 : 5. Fast Arithmetic

$\textstyle \parbox{\boxwidth}{\textrm{High speed software multiplication in F2m}}$
$\textstyle \parbox{\smboxwidth}{\textit{Lopez Julio Cesar \emph{Univ. of Valle, Colombia}, Ricardo Dahab \emph{State Univ. of Campinas, Brazil}}}$

$\textstyle \parbox{\boxwidth}{\textrm{On Efficient Normal Basis Multiplication}}$
$\textstyle \parbox{\smboxwidth}{\textit{Arash Reyhani-Masoleh, Anwar Hasan \emph{Univ. of Waterloo, Canada}}}$

1400-1530 : 6. Digital Signature

$\textstyle \parbox{\boxwidth}{\textrm{Codes identifying Bad Signatures in Batches}}$
$\textstyle \parbox{\smboxwidth}{\textit{Jaroslaw Pastuszak \emph{Polish Academy...
...and}, Josef Pieprzyk, Jennifer Seberry \emph{Univ. of Wollongong , Australia}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Distributed Signcryption}}$
$\textstyle \parbox{\smboxwidth}{\textit{Yi Mu, Vijay Varadharajan \emph{Univ. of Western Sydney, Australia}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Fail-Stop Signature for Long Messages}}$
$\textstyle \parbox{\smboxwidth}{\textit{Willy Susilo, Rei Safavi-Naini, Huaxiong Wang \emph{Univ. of Wollongong, Australia}}}$

1600-1730 : 7. Cryptographic Protocols

$\textstyle \parbox{\boxwidth}{\textrm{Symmetrically private information retrieval (Extended Abstract)}}$
$\textstyle \parbox{\smboxwidth}{\textit{Sanjeev Kumar Mishra \emph{CISCO Systems Pvt. Ltd., India}, Palash Sarkar \emph{Univ. of Waterloo, Canada}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Two-Pass Authenticated Key Agreement Protocol with Key Confirmation}}$
$\textstyle \parbox{\smboxwidth}{\textit{Kwangjo Kim, Bo-Yeon Song \emph{Inf. and Communications Univ., S. Korea}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Anonymous Traceability Schemes with Unconditional Security}}$
$\textstyle \parbox{\smboxwidth}{\textit{R Safavi-Naini, Y Wang \emph{Univ. of Wollongong , Australia}}}$

13 December, 2000



  0000-0000  : 

0930-1100 : 8. Cryptanalysis II

$\textstyle \parbox{\boxwidth}{\textrm{On Bias Estimation in Linear Cryptanalysis}}$
$\textstyle \parbox{\smboxwidth}{\textit{Ali Aydin Selcuk \emph{University of Maryland, USA}}}$

$\textstyle \parbox{\boxwidth}{\textrm{On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks}}$
$\textstyle \parbox{\smboxwidth}{\textit{John Pliam \emph{LASEC, EPFL, Switzerland}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Improved Impossible Differentials on Twofish}}$
$\textstyle \parbox{\smboxwidth}{\textit{Eli Biham, Vladimir Furman \emph{Technion -- Israel Inst. Of Technology , Israel}}}$

1130-1300 : 9. $\textstyle \parbox{0.75\smboxwidth}{Block Cipher and Public Key Cryptography}$

$\textstyle \parbox{\boxwidth}{\textrm{New Block Cipher DONUT Using Pairwise Perfect Decorrelation}}$
$\textstyle \parbox{\smboxwidth}{\textit{Dong Hyeon Cheon, Sang Jin Lee, Jong In...
..., Korea Univ., Korea}, Sang Jae Lee \emph{Korea Info. Security Agency, Korea}}}$

$\textstyle \parbox{\boxwidth}{\textrm{Generating RSA Keys on a Handheld Using an Untrusted Server}}$
$\textstyle \parbox{\smboxwidth}{\textit{D. Boneh, N. Modadugu, M. Kim \emph{Stanford Univ., USA}}}$

$\textstyle \parbox{\boxwidth}{\textrm{A Generalised Takagi-Cryptosystem with a module of form prqs}}$
$\textstyle \parbox{\smboxwidth}{\textit{Seongan Lim, Seungjoo Kim, Hongsub Lee \emph{Korea info. Security Agency, Korea}, Ikkowan Yie \emph{Inha Univ, Korea}}}$




next up previous
Next: About this document ...
Meena Mahajan 2002-02-13