SAC '99 Preliminary Program Note all sessions will take place in Walter Light Hall (the Electrical and Computer Engineering Building) on the main campus of Queen's University. Sunday, August 8, 1999 19:00 - 21:00 Welcome Reception at Queen's University Club Monday, August 9, 1999 8:00 - 9:00 Registration and Refreshments 9:00 - 9:10 Opening Remarks Session I Cryptosystems and Pseudorandom Number Generators 9:10 - 9:35 "A Universal Encryption Standard" Helena Handschuh (Gemplus-ENST) and Serge Vaudenay (Ecole Normale Supérieure-CNRS) 9:35 - 10:00 "Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator" John Kelsey, Bruce Schneier, and Niels Ferguson (Counterpane) 10:00 - 10:25 "Elliptic Curve Pseudorandom Sequence Generators" Guang Gong (U. of Waterloo), Thomas Berson (Anagram), and Douglas Stinson (U. of Waterloo) 10:25 - 11:00 Refreshment Break Session II Security Aspects of Block Ciphers I 11:00 - 11:25 "Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness" Serge Vaudenay (Ecole Normale Supérieure-CNRS) 11:25 - 11:50 "Guesswork and Variation Distance as Measures of Cipher Security" John Pliam (U. of Minnesota) 11:50 - 13:30 Lunch 13:30 - 14:30 Invited Talk: "From DES to AES: Twenty Years of Government Initiatives in Cryptography" Miles Smid (NIST) 14:30 - 14:50 Refreshment Break Session III Efficient Implementations in Cryptosystems 14:50 - 15:15 "Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders" Detlef Huehnlein (secunet) 15:15 - 15:40 "Improving and Extending the Lim/Lee Exponentiation Algorithm" Biljana Cubaleska (Fern U. Hagen), Andreas Reike (ISL), and Thomas Hermann (MMK) 15:40 - 16:05 "Non-Conventional Basis of Finite Fields" Chang Han Kim (Semyung U.), Sang Ho Oh, Joong Chul Yoon, Jong In Lim (Korea U.), and Hee Jin Kim (Telemann) 16:05 - 16:30 "Software Optimization of Decorrelation Module" Fabrice Noilhan (U. Paris-Sud) 19:00 - 21:00 Dinner (location to be announced) Tuesday, August 10, 1999 Session IV Cryptanalysis of Block Ciphers 9:10 - 9:35 "Security of E2 Against Truncated Differential Cryptanalysis " Shiho Moriai, Makoto Sugita, Kazumaro Aoki, and Masayuki Kanda (NTT Labs) 9:35 - 10:00 "Key-Schedule Cryptanalysis of DEAL" John Kelsey and Bruce Schneier (Counterpane) 10:00 - 10:25 "Efficient Evaluation of Security Against Generalized Interpolation Attack" Kazumaro Aoki (NTT Labs) 10:25 - 11:00 Refreshment Break Session V Security Aspects of Block Ciphers II 11:00 - 11:25 "Modeling Linear Characteristics of Substitution- Permutation Networks" Liam Keliher, Henk Meijer, and Stafford Tavares (Queen's U.) 11:25 - 11:50 "Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors" Yulieng Zheng (Monash U.) and Xian-Mo Zhang (U. of Wollongong) 11:50 - 13:30 Lunch 13:30 - 14:30 Invited Talk: "A Biometric Technique for Improving Security in Virtual Private Networks" Mike Reiter (Bell Labs) 14:30 - 14:50 Refreshment Break Session VI Cryptography for Network Applications 14:50 - 15:15 "Pseudonym Systems" Anna Lysyanskaya, Ronald Rivest, and Amit Sahai (MIT) 15:15 - 15:40 "Unconditional Secure Proactive Secret Sharing Scheme with Combinatorial Structures" Douglas Stinson and R. Wei (U. of Waterloo) 15:40 - 16:05 "Protecting a Mobile Agent's Route against Collusions" Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali (Fern U. Hagen) 16:05 - 16:30 "Photuris: Design Criteria" William Simpson (DayDreamer) 16:30 - 16:40 Closing Remarks