[332] in cryptography@c2.net mail archive
DIMACS Workshop on Cryptographic Protocol Design and
daemon@ATHENA.MIT.EDU (Bob Quinn)
Tue Mar 11 13:38:20 1997
Date: Tue, 11 Mar 1997 12:58:19 -0500
To: cryptography@c2.net
From: Bob Quinn <rcq@tiac.net>
>Date: Tue, 11 Mar 1997 11:26:18 -0500
>From: Barbara Quigley <bquigley@iyar.rutgers.edu>
>To: dimacs-rustaff@iyar.rutgers.edu, dimacs-rupustaff@iyar.rutgers.edu,
> local-list@iyar.rutgers.edu, rutgers-list@iyar.rutgers.edu,
> dimacs-members@iyar.rutgers.edu, massive-list@iyar.rutgers.edu,
> dimacs-outside@iyar.rutgers.edu, sy-net@iyar.rutgers.edu
>Subject: DIMACS Workshop on Cryptographic Protocol Design and
Verification, Sept. 3-5, 1997
>
>--------------------------------------------------------------------------
>| DIMACS: Center for Discrete Mathematics & Theoretical Computer Science |
>| A National Science Foundation Science and Technology Center |
>--------------------------------------------------------------------------
>
> DIMACS Special Year on Networks
>
> Workshop on Cryptographic Protocol Design and Verification
>
> September 3-5, 1997
>
> DIMACS Center, CoRE Building, Rutgers University
>
> ORGANIZERS:
> Hilarie Orman, orman@darpa.mil
> Catherine Meadows, meadows@itd.nrl.navy.mil
>
>
>The purpose of the workshop is to bring together those who design and
>implement cryptographic protocols with those who formally analyze them, in
>order to develop a community that can routinely produce secure protocols for
>use in protecting organizational data and facilitating commerce. The two
>groups will have opportunities to share ideas about the current state of the
>art, directions to pursue, and the motivation for their work.
>
>Participants will be encouraged to bring demonstration software with them,
>and part of the workshop organization will involve determining the needs for
>Internetwork access and local networking. The demonstrations will be of
>secure protocols in action and of interactive specification and verification
>techniques.
>
>In addition to examining the current state, participants will attempt to
>quantify the factors that they expect to be significant contributors to
>scaling the current techniques for future problems. For example, the ability
>to perform proofs new protocols within a day might be significant. What are
>the prospects for doing this for a mobile internetwork protocol, for
example.
>
>Ideally the conclusion of the workshop would be a set of published
guidelines
>for how to design and verify secure cryptographic protocols in reasonable
time.
>
> ---------------------------------------------------------------------
>The Special Year program is made possible by long term funding from the
>National Science Foundation, the New Jersey Commission on Science and
>Technology and DIMACS university and industry partners.
>
>DIMACS Center; Rutgers University; P.O. Box 1179; Piscataway, NJ 08855-1179
> TEL: 908-445-5928 FAX: 908-445-5932 ** EMAIL: center@dimacs.rutgers.edu
> WWW: http://dimacs.rutgers.edu ** TELNET: telnet info.rutgers.edu 90
>
> DIMACS is a partnership of Rutgers University, Princeton University,
> AT&T Labs, Bellcore, and Bell Laboratories.
>
>
>
>
>