PROGRAMME SCHEDULE FOR
INDOCRYPT 2000 - 10 th to 13th DECEMBER Venue : Science City Auditorium, Calcutta 10.12.2000
10:30-11:30 Tutorial I 11:30-12:30 Tutorial II 12:00-13:30 Lunch 13:30-14:15 Tutorial III 14:15-15:00 Tutorial IV 15:00-15:45 Tutorial V 16:30-17:30 Inauguration * Spot registration is open for whole day on 10.12.2000 and upto 11:00 a.m. on 11.12.2000
11.12.2000
09:00-09:30 Snacks 09:30-10:30 Invited talk:Prof.Adi Shamir 10:30-11:00 Tea Break 11:00-13:00 E-cash & Multi-party Computation 13:00-14:00 Lunch 14:00-15:30 Stream Ciphers & Boolean Function 15:30-16:00 Tea Break 16:00-17:00 Cryptanalysis - I
09:00-09:30 | Snacks |
09:30-10:30 | Invited talk :Prof.Eli Biham |
10:30-11:00 | Tea Break |
11:00-12:00 | Elliptic Curve |
12:00-13:00 | Fast Arithmetic |
13:00-14:00 | Lunch |
14:00-15:30 | Digital Signature |
15:30-16:00 | Tea Break |
16:00-17:30 | Cryptographic Protocols |
18:30-21:30 | Banquet |
09:00-09:30 | Snacks |
09:30-11:00 | Cryptanalysis II |
11:00-11:30 | Tea Break |
11:30-13:00 | Block Cipher & Public Key Cryptography |
13:00-14:00 | Lunch |
14:00-18:00 | City tour |
Tutorial & Inauguration Back
Morning Tutorial - Session Chair : Prof. Rana Barua, Indian Statistical Institute, India
10-30 - 11-30 : Tutorial -
I : Number Theory and Cryptography
-Prof. R. Balasubramaniam (Indian
Inst. of Mathematical Sciences, India)
11-
30 - 12-30 : Tutorial -II : Complexity in Cryptography
-Prof. K. Sikdar ( Indian
Statistical Institute , Calcutta, India)
Afternoon Tutorial - Session Chair : Dr. Palash Sarkar, University of Waterloo, Canada
13- 30 - 14-15
: Tutorial - III : Payment Systems and E-Cash and Related Authentication
-Prof. C E Veni Madhavan ( Indian Institute
of Science , India)
14- 15 - 15-00 : Tutorial - IV : Sequences
and Stream Cipher
-Prof. Cunsheng Ding (Hong Kong
Univ. of Science and Technology, Hong Kong)
15- 00 - 15-45 : Tutorial - V : Differential
Cryptanalysis
- Prof. Eli Biham (Technion
- Israel Inst. Of Technology , Israel)
Inauguration (16-30 -17-30 ) -By Dr. N. Vittal ,Chief Vigilance Commissioner, Govt. of India
1.E-cash
& Multi-party Computation
(Session Chair : Prof. Radha Poovendran Univ. of Maryland, USA)
11- 00 - 11-30
: An online, transferable E-cash payment system
- R. Sai Anand, C.E.VeniMadhavan (
IISC Bangalore, India)
11-30 - 12-00 :
Anonymity control in Multi-bank E-cash system
- Ik Rae Jeong, Dong Hoon Lee (Korea
University , Korea)
12-00 - 12-30 : Efficient
Asynchronous Secure Multiparty Distrilbuted Computation
- K. Srinathan, C. Pandu Rangan (
IIT Madras, India)
12-30 - 13-00 : Tolerating
Generalized Mobile Adversaries in Secure Multi-party Computation
- K. Srinathan, C. Pandu Rangan (
IIT Madras, India)
Back
2.Stream
Ciphers & Boolean Function
(Session
Chair : Prof. Cunsheng Ding, Hong Kong Univ. of Science &
Technology, Hong Kong)
14- 00 - 14-30 : The
correlation of a Boolean function with its variable
-Dingyi Pei, Wenliang Qin (State
Key Lab. Of Inf. Security, China)
14-30 - 15-00 : On choice
of connection-polynomials for LFSR-based Stream Ciphers
- K.Jambunathan (ISI
Calcutta , India)
14-30 - 15-00 : On resilient
Boolean function with maximal possible nonlinearity
-Yuriy V. Tarannikov (Mech.
& Math. Dept. of Moscow State University, Russia)
Back
3.Cryptanalysis
- I
(Session
Chair : Prof. Kwangjo Kim, Inf. & Communications
Univ., S. korea)
16-00- 16-30 : Decimation
attack of stream ciphers
-Eric Filiol (
INRIA, France)
16-30- 17-00 : Cryptanalysis
of the A5/1 GSM Stream Cipher
-Eli Biham, Dunkelman Orr
(Technion -Israel Inst. Of Technology , Israel)
Back
4.Elliptic
Curve
(Session
Chair : Prof. K. Sikdar, Indian Statistical Institute , Calcutta,
India)
11-00- 11-30 : Power
Analysis Breaks Elliptic Curve Cryptosystem Even Secure Against the Timing
Attack
- Katsuyuki Okeya (
Hitachi Ltd., Japan),
- Kouichi Sakurai (Kyushu
Univ., Japan)
11-30- 12-00 : Efficient Construction
of Cryptographically Strong Elliptic Curves
- Harald Baier, Johannes Buchmann (Univ.
of Tech. , Germany)
Back
5.Fast
Arithmetic
(Session
Chair : Charanjit S. Jutla, IBM, T. J. Watson Lab, USA
)
12-00- 12-30 : High speed
software multiplication in F2m
-Lopez Julio Cesar (Univ.
of Valle, Columbia),
-Ricardo Dahab (State
Univ. of Campinas, Brazil)
12-30- 13-00 : On Efficient
Normal Basis Multiplication
- Arash Reyhani-Masoleh, Anwar Hasan
(Univ. of Waterloo, Canada)
Back
6.Digital
Signature
(Session
Chair : Prof. Eiji Okamoto, Univ.
of Wisconsin-Milwaukee, USA )
14-00- 14-30 : Codes
identifying Bad Signatures in Batches
- Jaroslaw Pastuszak
(Polish Academy
of Sc. ,Poland) ,
- Josef Pieprzyk, Jennifer Seberry (Univ.
of Wollongong , Australia)
14-30- 15-00 : Distributed
Signcryption
- Yi Mu, Vijay Varadharajan
(Univ. of Western Sydney, Australia)
15-00- 15-30 : Fail-Stop
Signature for Long Messages
-Willy Susilo, Rei Safavi-Naini, Huaxiong
Wang
(Univ. of Wollongong , Australia) Back
7.Cryptographic
Protocols
(Session Chair : Prof. C. E. Veni Madhavan, Indian Institute
of Sciences, India )
16-00- 16-30 :
Symmetrically private information retrieval (Extended Abstract)
- Sanjeev Kumar Mishra (CISCO
Systems Pvt. Ltd., India),
- Palash Sarkar
(Univ. of Waterloo, Canada)
16-30- 17-00 :
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation
- Kwangjo Kim, Bo-Yeon Song (Inf.
& Communications Univ., S. korea)
17-30- 17-30 : Anonymous
Traceability Schemes with Unconditional Security
-R Safavi-Naini, Y Wang
(Univ. of Wollongong , Australia)
Back
8.Cryptanalysis
II
(Session
Chair : Dr. V. P. Gulati, IDRBT, India )
11-30- 12-00 : On Bias
Estimation in Linear Cryptanalysis
- Ali Aydin Selcuk (University
of Maryland, USA )
12-00- 12-30 : On the Incomparability
of Entropy and Marginal Guesswork in Brute-Force Attacks
- John Pliam (LASEC,
EPFL, Switzerland)
12-30- 13-00 : Improved Impossible
Differentials on Twofish
- Eli Biham, Vladimir Furman
(Technion - Israel Inst. Of Technology , Israel )
Back
9.Block
Cipher & Public Key Cryptography
(Session
Chair : Dr. P. K. Saxena, SAG, India)
11-30- 12-00 : New Block
Cipher DONUT Using Pairwise Perfect Decorrelation
- Dong Hyeon Cheon, Sang Jin Lee, Jong
In Lim (CIST,
Korea Univ., Korea),
- Sang Jae Lee
(Korea Info. Security Agency, Korea)
12-00- 12-30 : Generating RSA
Keys on a Handheld Using an Untrusted Server
-D. Boneh, N. Modadugu, M. Kim
(Stanford Univ., USA)
12-30- 13-00 : A Generalised
Takagi-Cryptosystem with a module of form prqs
-Seongan Lim, Seungjoo Kim, Hongsub Lee
(
Korea info. Security Agency, Korea),
-Ikkowan Yie
(Inha Univ, Korea)
Back
-11.12.200 : Session Chair : Prof. R. Balasubramaniam (Indian Inst. of Math. Sciences, India)
9-30
- 10-30 :"Cryptographic Protocols and Their Complexities"
- Prof. Adi Shamir
(M.I.T., USA)
Back
-12.12.200 : Session Chair : Prof. Jenifer Seberry (Univ. of Wollongong , Australia)
9-30
- 10-30 :"On the Selection of the Advanced Encryption Standard""
- Prof. Eli Biham
(Technion - Israel Inst. Of Technology , Israel)
Back