Preliminary Program
(Subject to Change)
1997 Information Security Workshop

September 17-19, 1997
Ishikawa High-Tech Conference Center
Japan Advanced Institute of Science and Technology

Sponsored by
JAIST and The Engineering Sciences Society of IEICE
In cooperation with
IEEE IT Society, Tokyo Chapter, and SITA

Invited Lectures:
Dr. Mihir Bellare (Univ. of California at San Diego, USA)
Dr. Yvo Desmedt (Univ. of Wisconsin, Milwaukee, USA)
Dr. Bart Preneel (Katholieke Univ. Leuven, Belgium)
Dr. Yuliang Zheng (Monash Univ., Australia)

Special Lecture:
Dr. George Davida (Univ. of Wisconsin, Milwaukee, USA)


Wednesday, September 17, 1997

11:30-13:00 Registration

13:00-13:30 Welcome to ISW'97

13:30-14:20 Cryptanalysis

13:30-13:55 "Improving the Higher Order Differential Attack and Cryptanalysis of KN Cipher"
Takeshi Shimoyama, Shiho Moriai and Toshinobu Kaneko(TAO, Japan)

13:55-14:20 "An Optimized Linear Attack to Random Generators by Non Linear Combiner"
Hidema Tanaka, Tomoya Ohishi and Toshinobu Kaneko(Science Univ. of Tokyo, Japan)

14:20-15:00 Invited Lecture: Dr. Bart Preneel(Katholieke Univ. Leuven, Belgium)
"Cryptanalysis of Message Authentication Codes"

15:00-15:20 Break

15:20-17:25 Public Key Cryptography

15:20-15:45 "The Least Witness of a Composite Number"
R. Balasubramanian and S. V. Nagaraj(Inst. of Math. Sci., India)

15:45-16:10 "New Algorithm for Finding a Small Root of a Quadratic Modular Equation"
Hidenori Kuwakado and Hatsukazu Tanaka(Kobe Univ., Japan)

16:10-16:35 "Modified Finite Automata Public Key Cryptosystem"
Feng Bao, Robert H. Deng(Nat'l Univ. of Singapore, Singapore),
Xiang Gao(Millstar Elec. Pub. Group, USA) and Yoshihide Igarashi(Gumma Univ., Japan)

16:35-17:00 "Modified ElGamal Cryptosystem"
Daisuke Nakamura and Kunikatsu Kobayashi(Yamagata Univ., Japan)

17:00-17:25 "Remarks on Blind Decryption"
Kazuo Ohta(NTT Lab., Japan)

17:25-18:05 Special Lecture: Dr. George Davida (Univ. of Wisconsin, Milwaukee, USA)
"Ciphertext Transformations and Deniability"

19:00-21:00 Banquet


Thursday, September 18, 1997

9:45-11:00 Key Management

9:45-10:10 "Secure Applications of Low-Entropy Keys"
John Kelsey, Bruce Schneier(Counterpane Systems, USA) and
David Wagner(U.C. Berkeley, USA)

10:10-10:35 "A Key Escrow System of RSA Cryptosystem"
Yoshiki Sameshima(Hitachi Software Eng., Japan)

10:35-11:00 "A Key Escrow System with Protecting User's Privacy by Blind Decoding"
Kouichi Sakurai, Yoshinori Yamane, Shingo Miyazaki(Kyushu Univ., Japan) and
Tohru Inoue(Adv. Mobile Telecomm. Sec. Tech. Research Lab., Japan)

11:00-11:40 Invited Lecture: Dr. Yvo Desmedt (Univ. of Wisconsin, Milwaukee, USA)
"Some Recent Research Aspects of Threshold Cryptography"

11:40-13:00 Lunch

13:00-15:05 Implementation(Hard/Soft)

13:00-13:25 "A High-Speed Small RSA Encryption LSI with Low-Power Dissipation"
A. Satoh, Y. Kobayashi, H. Niijima, N. Ooba, S. Munetoh and S. Sone(IBM Japan, Japan)

13:25-13:50 "A Methodology for High-Speed Software Implementations of
Number-Theoretic Cryptosystems"

C. K. Koc and T. Acar (Oregon State Univ., USA)

13:50-14:15 "The Case for a Secure Multi-Application Smart Card Operating System"
Constantinos Markantonakis(Royal Holloway, Univ. of London, UK)

14:15-14:40 "An Augmented Family of Cryptographic Parity Circuits"
Kenji Koyama(NTT C.S. Labs., Japan) and Routo Terada(Univ. of S. Paulo, Brazil)

14:40-15:05 "A New Byte-Oriented Block Cipher"
Xun Yi(Southeast Univ., P. R. China)

15:05-15:35 Break

15:35-16:15 Invited Lecture: Dr. Mihir Bellare (Univ. of California at San Diego, USA)
"Practice-Oriented Provable Security"

16:15-17:30 Security Management

16:15-16:40 "A Framework for the Management of Information Security"
Jussipekka Leiwo and Yuliang Zheng(Monash Univ., Australia)

16:40-17:05 "Specifying Security in a Composite System"
J.-M. Kabasele-Tenday(Univ. de Louvain, Belgium)

17:05-17:30 "IRI: A Quantitative Approach to Inference Analysis in Relational Databases"
Kan Zhang(Cambridge Univ., UK)


Friday, September 19, 1997

9:45-11:00 Signature/Authentication

9:45-10:10 "Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders"
Tzonelih Hwang and Chih-Hung Wang(Nat'l Cheng-Kung Univ., Taiwan)

10:10-10:35 "Group Signatures for Hierarchical Multigroups"
Seungjoo Kim(Sung Kyun Kwan Univ., Korea), Sangjoon Park(ETRI, Korea) and
Dongho Won(Sung Kyun Kwan Univ., Korea)

10:35-11:00 "Threshold Proxy Signature Schemes"
Kan Zhang(Cambridge Univ., UK)

11:00-11:40 Invited Lecture: Dr. Yuliang Zheng (Monash Univ., Australia)
"Signcryption and Its Applications in Efficient Public Key Solutions"

11:40-13:00 Lunch

13:00-13:50 Payment Scheme

13:00-13:25 "A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature"
Khanh Quoc Nguyen, Yi Mu and Vijay Varadharajan (Univ. of Western Sydney, Australia)

13:25-13:50 "An Incremental Payment Method for Internet Based Streaming Real-Time Media"
Andreas Fuchsberger(Royal Holloway, Univ. of London, UK)

13:50-15:05 Key Sharing

13:50-14:15 "A New Identity-Based Key Exchange Protocol Minimizing
Computation and Communication"

Shahrokh Saeednia(Univ. de Bruxelles, Belgium) and
Rei Safavi-Naini(Univ. of Wollongong, Australia)

14:15-14:40 "Suitable ID-Based Key Distribution System over Elliptic Curves"
Hisao Sakazaki, Eiji Okamoto and Masahiro Mambo(JAIST, Japan)

14:40-15:05 "On Reconciliation of Discrepant Sequences Shared through
Quantum Mechanical Channels"

Kouichi Yamazaki, Masao Osaki and Osamu Hirota(Tamagawa Univ., Japan)

15:05 Adjourn