PROGRAMME SCHEDULE

FOR

  INDOCRYPT 2000 -  10 th to 13th DECEMBER
            Venue :  Science City Auditorium, Calcutta

10.12.2000
 
 
10:30-11:30  Tutorial I
11:30-12:30 Tutorial II
12:00-13:30 Lunch
13:30-14:15 Tutorial III
14:15-15:00  Tutorial IV
15:00-15:45 Tutorial V
16:30-17:30  Inauguration

* Spot registration  is open for whole day on 10.12.2000 and upto 11:00 a.m. on  11.12.2000
 
 

11.12.2000


09:00-09:30  Snacks
09:30-10:30 Invited talk:Prof.Adi Shamir
10:30-11:00 Tea Break
11:00-13:00  E-cash & Multi-party Computation
13:00-14:00  Lunch
14:00-15:30  Stream Ciphers & Boolean Function
15:30-16:00 Tea Break
16:00-17:00  Cryptanalysis - I

 
 

12.12.2000


09:00-09:30  Snacks
09:30-10:30  Invited talk :Prof.Eli Biham
10:30-11:00 Tea Break
11:00-12:00  Elliptic Curve
12:00-13:00  Fast Arithmetic
13:00-14:00  Lunch
14:00-15:30  Digital Signature
15:30-16:00 Tea Break
16:00-17:30 Cryptographic Protocols
18:30-21:30 Banquet

 

13.12.2000



 
 
 

09:00-09:30 Snacks
09:30-11:00 Cryptanalysis II
11:00-11:30 Tea Break
11:30-13:00 Block Cipher & Public Key Cryptography
13:00-14:00 Lunch
14:00-18:00 City tour


Tutorial & Inauguration                                                    Back

 Morning Tutorial  - Session Chair : Prof. Rana Barua,  Indian Statistical Institute, India

   10-30 - 11-30 : Tutorial - I  : Number Theory and  Cryptography
                                                   -Prof. R. Balasubramaniam  (Indian Inst. of  Mathematical Sciences, India)

  11- 30 - 12-30 : Tutorial -II   : Complexity in Cryptography
                                                    -Prof. K. Sikdar   ( Indian Statistical Institute , Calcutta, India)
 

Afternoon Tutorial - Session Chair : Dr. Palash Sarkar,  University of  Waterloo, Canada

  13- 30 - 14-15 : Tutorial - III : Payment Systems and E-Cash and Related Authentication
                                                    -Prof. C E Veni Madhavan ( Indian Institute of  Science ,  India)

 14- 15 - 15-00 : Tutorial - IV : Sequences and Stream Cipher
                                                   -Prof. Cunsheng Ding  (Hong Kong Univ. of Science and Technology, Hong Kong)

15- 00 - 15-45 : Tutorial - V  : Differential Cryptanalysis
                                                  - Prof. Eli Biham   (Technion - Israel Inst. Of Technology , Israel)
 

 Inauguration (16-30 -17-30 ) -By Dr. N. Vittal  ,Chief Vigilance Commissioner, Govt. of India

                                             -Special Guest : Dr. K. N. Gupta(Controller of  Certifying Auth., Govt. of India)
                                                                                                                                                                   Back







1.E-cash & Multi-party  Computation
    (Session Chair : Prof. Radha Poovendran  Univ. of Maryland, USA)

     11- 00 - 11-30 : An online, transferable E-cash payment system
                            - R. Sai Anand, C.E.VeniMadhavan ( IISC Bangalore, India)

     11-30 - 12-00 : Anonymity control in Multi-bank  E-cash system
                            - Ik Rae Jeong, Dong Hoon Lee  (Korea University , Korea)

    12-00 - 12-30 : Efficient Asynchronous Secure Multiparty Distrilbuted Computation
                           - K. Srinathan, C. Pandu Rangan  ( IIT Madras, India)

    12-30 - 13-00 : Tolerating Generalized Mobile Adversaries in Secure Multi-party Computation
                            - K. Srinathan, C. Pandu Rangan  ( IIT Madras, India)                                                  Back
 
 
 

2.Stream Ciphers & Boolean Function
    (Session Chair : Prof. Cunsheng Ding,   Hong Kong Univ. of Science & Technology, Hong Kong)

    14- 00 - 14-30 : The correlation of a Boolean function with its  variable
                             -Dingyi Pei, Wenliang Qin (State Key Lab. Of Inf. Security, China)

    14-30 - 15-00 : On choice of connection-polynomials for LFSR-based Stream Ciphers
                            - K.Jambunathan  (ISI Calcutta , India)

   14-30 - 15-00 : On resilient Boolean function with maximal possible nonlinearity
                           -Yuriy V. Tarannikov  (Mech. & Math. Dept. of Moscow State University, Russia)       Back
 
 
 

3.Cryptanalysis - I
  (Session Chair : Prof. Kwangjo Kim,    Inf. & Communications Univ., S. korea)

    16-00- 16-30 : Decimation attack of stream ciphers
                            -Eric Filiol    ( INRIA, France)

   16-30- 17-00 : Cryptanalysis of the A5/1 GSM Stream Cipher
                           -Eli Biham, Dunkelman Orr     (Technion -Israel Inst. Of Technology , Israel)      Back
 
 
 

4.Elliptic Curve
    (Session Chair : Prof. K. Sikdar,  Indian Statistical Institute , Calcutta, India)

    11-00- 11-30 : Power Analysis Breaks Elliptic Curve Cryptosystem Even Secure Against the Timing Attack
                            - Katsuyuki Okeya   ( Hitachi Ltd., Japan),
                            - Kouichi Sakurai      (Kyushu Univ., Japan)

   11-30- 12-00 : Efficient Construction of Cryptographically Strong Elliptic Curves
                           - Harald Baier, Johannes Buchmann (Univ. of  Tech. , Germany)                                     Back
 
 
 

5.Fast Arithmetic
    (Session Chair : Charanjit S. Jutla,    IBM, T. J. Watson Lab, USA )

    12-00- 12-30 : High speed software multiplication in F2m
                            -Lopez Julio Cesar    (Univ. of Valle, Columbia),
                           -Ricardo Dahab         (State Univ. of Campinas, Brazil)

    12-30- 13-00 : On Efficient Normal Basis Multiplication
                            - Arash Reyhani-Masoleh, Anwar Hasan     (Univ. of  Waterloo, Canada)                         Back
 
 

6.Digital Signature
    (Session Chair : Prof.  Eiji Okamoto,       Univ. of Wisconsin-Milwaukee, USA  )

    14-00- 14-30 : Codes identifying Bad Signatures in Batches
                           - Jaroslaw Pastuszak                  (Polish Academy of Sc. ,Poland) ,
                          - Josef Pieprzyk, Jennifer Seberry      (Univ. of  Wollongong , Australia)

    14-30- 15-00 : Distributed Signcryption
                          - Yi Mu, Vijay Varadharajan     (Univ. of Western Sydney, Australia)

    15-00- 15-30 : Fail-Stop Signature for Long Messages
                           -Willy Susilo, Rei Safavi-Naini, Huaxiong Wang      (Univ. of  Wollongong , Australia)      Back
 
 
 

7.Cryptographic Protocols
    (Session Chair : Prof. C. E. Veni Madhavan,   Indian Institute of Sciences, India )

     16-00- 16-30 : Symmetrically private information retrieval (Extended Abstract)
                             - Sanjeev Kumar Mishra   (CISCO Systems Pvt. Ltd., India),
                             - Palash Sarkar             (Univ. of  Waterloo, Canada)

     16-30- 17-00 : Two-Pass Authenticated Key Agreement Protocol with Key Confirmation
                             - Kwangjo Kim, Bo-Yeon Song  (Inf. & Communications Univ., S. korea)

    17-30- 17-30 : Anonymous Traceability Schemes with Unconditional Security
                           -R Safavi-Naini, Y Wang         (Univ. of  Wollongong , Australia)                                      Back
 
 
 

8.Cryptanalysis II
    (Session Chair : Dr. V. P. Gulati,    IDRBT,  India )

    11-30- 12-00 : On Bias Estimation in Linear Cryptanalysis
                            - Ali Aydin Selcuk    (University of Maryland, USA )

   12-00- 12-30 : On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
                           - John Pliam     (LASEC, EPFL, Switzerland)

   12-30- 13-00 : Improved Impossible Differentials on Twofish
                            - Eli Biham, Vladimir Furman        (Technion - Israel Inst. Of Technology , Israel )    Back
 
 
 
 

9.Block Cipher & Public Key Cryptography
    (Session Chair :  Dr. P. K. Saxena,    SAG, India)

    11-30- 12-00 : New Block Cipher DONUT Using Pairwise Perfect Decorrelation
                           - Dong Hyeon Cheon, Sang Jin Lee, Jong In Lim     (CIST, Korea Univ., Korea),
                           - Sang Jae Lee                                                        (Korea Info. Security Agency, Korea)

   12-00- 12-30 : Generating RSA Keys on a Handheld Using an Untrusted Server
                           -D. Boneh, N. Modadugu, M. Kim         (Stanford Univ., USA)

   12-30- 13-00 : A Generalised Takagi-Cryptosystem with a module of form prqs
                          -Seongan Lim, Seungjoo Kim, Hongsub Lee ( Korea info. Security Agency, Korea),
                          -Ikkowan Yie                                                   (Inha Univ, Korea)                                       Back
 
 

Invited Talk

       -11.12.200 : Session Chair : Prof. R. Balasubramaniam  (Indian Inst. of  Math.  Sciences, India)

      9-30 - 10-30 :"Cryptographic Protocols and  Their Complexities"
                              - Prof.   Adi Shamir   (M.I.T., USA)                                                                       Back
 

       -12.12.200 : Session Chair : Prof. Jenifer Seberry  (Univ. of  Wollongong , Australia)

      9-30 - 10-30 :"On the Selection of the Advanced  Encryption Standard""
                             - Prof.    Eli Biham   (Technion - Israel Inst. Of Technology , Israel)         Back