|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. | |||
30 March 1998: Link to David Wagner's papers
26 March 1998
Source:
http://www.dmi.ens.fr/~vaudenay/fse5/prog2.txt
The Fifth Fast Software Encryption Workshop will take place at the
Hotel du Louvre on 1998, March 23-24-25. The program below and other
information are available on the web page of the workshop:
http://www.dmi.ens.fr/~vaudenay/fse5/
This workshop is organized by the Ecole Normale Superieure and the
Centre National pour la Recherche Scientifique in cooperation with
the International Association for Cryptologic Research and with the
generous sponsor of Microsoft and Gemplus.
Monday, 23rd
9h45 registration with coffee
10h15 introductory remarks
10h30 Session 1 --- Cryptanalysis 1
title: New Results in Linear Cryptanalysis of RC5
author: A.A. Selcuk
title: Higher Order Differential Attack of a CAST Cipher
author: S. Moriai, T. Shimoyama, T. Kaneko
title: Cryptanalysis of Twoprime
author: D. Wagner, B. Schneier, J. Kelsey, D. Coppersmith
12h00 Lunch
14h00 Session 2 --- New Stream Cipher
title: JEROBOAM
author: H. Chabanne, E. Michon
title: Fast Hashing and Stream Encryption with Panama
author: J. Daemen, C.S.K. Clapp
title: Joint Hardware/Software Design of a Fast Stream Cipher
author: C.S.K. Clapp
15h30 break
16h00 Session 3 --- Construction Analysis
title: On the Security of Hashing Scheme Based on SL2
author: K.S. Abdukhalikov, C. Kim
title: About Feistel Schemes with Six (or more) Rounds
author: J. Patarin
title: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
author: A. Young, M. Yung
17h30 end of day
Tuesday, 24th
9h00 Session 4 --- Hash Functions
title: MRD Hashing and its Application to Multisender Authentication
author: R. Safavi-Naini, S. Bakhtiari
title: New Constructions for Secure Hash Functions
author: W. Aiello, S. Haber, R. Venkatesan
10h00 break
10h30 Session 5 --- Pseudo Random Generators
title: Cryptanalytic Attacks on Pseudorandom Number Generators
author: J. Kelsey, B. Schneier, D. Wagner, C. Hall
11h00 Panel
12h30 Lunch
14h30 Session 6 --- New Block Cipher
title: CS-Cipher
author: J. Stern, S. Vaudenay
title: On the Design and Security of RC2
author: L.R. Knudsen, V. Rijmen, R.L. Rivest, M.J.B. Robshaw
title: Serpent: a new Block Cipher Proposal
author: E. Biham, R. Anderson, L. Knudsen
16h00 break
16h30 new results (to be submitted at the workshop)
[...]
20h30 Dinner
Wednsday, 25th
9h30 Session 7 --- Modes of Operations
title: Attacking Triple Encryption
author: S. Lucks
title: Cryptanalysis of some Multiple Modes of Operation
author: D. Wagner
10h30 break
11h00 Session 8 --- Cryptanalysis 2
title: Differential Cryptanalysis of the ICE Encryption Algorithm
author: B. Van Rompay, L. Knudsen, V. Rijmen
title: The first two Rounds of MD4 are not One-Way
author: H. Dobbertin
title: Differential Cryptanalysis of KHF
author: D. Wagner
[See also D. Wagner: http://www.cs.berkeley.edu/~daw/me.html ]
12h30 Lunch
Adjourn