last update: February 12, 2002

cryptrec.png (6153 bytes)

Cryptographic Techniques Evaluation Workshop

Rump Session
January 28, 2002
Kamitonda-cho, Wakayama-ken

(Provisional Translation)

December 26, 2001

A rump session will be held during the CRYPTREC Cryptographic Techniques Evaluation Workshop as a forum for a lively debate in an open atmosphere. A rump session is an open session for presenting information that is of interest to participants, such as recent results and details on current research (presentations may also include humor and other non-technical comments). In the Cryptographic Techniques Evaluation Workshop, you can look forward in particular to comments by authors presentators on presentations made in Sessions 1 and 2 as well as explanations of problems in the submitted documents, and recent analysis results.

Rump session application information

If you want to present your results in the rump session, please submit the rump session application information listed above through either of the following procedures.
Advance application (Closed. Please apply on-site submission.)
Send your application information to the CRYPTREC office ( by 5:00 p.m. on Thursday, January 24, 2002 JST (=GMT+9). Please send your information in text format. HTML emails will be ignored.
Application on date of workshop
Submit a hard copy containing the rump session application information to the Cryptographic Techniques Evaluation Workshop registration desk by 6:30 p.m.

An overhead projector will be available at the conference hall for the presentations.

Please note that the presentation time periods may be shorter than requested, depending on the number of presentations submitted and other factors. Also, please note that presentation titles and other information received via the Internet may be made public on the Internet prior to the workshop.

Rump Session Program

(start 19:15, end 21:00)
Yukiyasu Tsunoo, Hiroyasu Kubo:
Differential and Linear cryptanalysis of CIPHERUNICORN-A
Akira Sugiyama:
Unique methods to generate PRN in TAO TIME Cognition Algorithm
Soichi Furuya:
Latest Information of MUGI
Soichi Furuya:
Latest Information of MULTI-S01
Eiichiro Fujisaki:
EPOC-2: Relationship between CRYPTREC'01 submission version and provable security in ROM
Mitsuru MATSUI:
Correction of a test vector generation program of Camellia
William Whyte:
NTRUSign: Digital Signature using the NTRU Lattice
Akashi Satoh:
Key points for ASIC implementation of 128-bit block ciphers (+KASUMI)