Time Table
October 28 (Wed) , 2009
Time | Session |
---|---|
13:00–13:15 | Opening |
13:15–14:15 | Invited Talk 1 |
14:15–14:30 | Coffee break |
14:30–15:45 | Block Cipher |
15:45– | Excursion |
October 29 (Thu), 2009
Time | Session | |
---|---|---|
09:00–10:40 | Cryptographic Protocols | |
10:40–11:00 | Coffee break | |
11:00–12:00 | Invited Talk 2 | |
12:00–13:10 | Lunch | |
13:10–14:25 | Contents Protection and Intrusion Detection | |
14:25–15:40 | Authentication | |
15:40–16:00 | Coffee break | |
16:00–17:30 | Panel Discussion | |
17:30– | Banquet |
October 30 (Fri), 2009
Time | Session | |
---|---|---|
09:15–10:15 | Short Papers I | |
10:15–10:35 | Coffee Break | |
10:35–11:35 | Short Papers II | |
11:35– | Closing |
Program of IWSEC2009
Invited Talk 1
13:15-14:15 October 28 (Wed), 2009
Session Chair: Yuko Murayama
- The Psychology of Security
Bruce Schneier
Session 1: Block Cipher
14:30-15:45 October 28 (Wed), 2009
Session Chair: Christian Rechberger
- Bit-Free Collision: Application to APOP Attack
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta - Impossible Boomerang Attack for Block Cipher Structures
Jiali Choy and Huihui Yap - Improved Distinguishing Attacks on HC-256
Gautham Sekar and Bart Preneel
Session 2: Cryptographic Protocols
09:00-10:40 October 29 (Thu), 2009
Session Chair: Keisuke Tanaka
- A Generic Construction of Timed-Release Encryption with Pre-open Capability
Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, and Kanta Matsuura - An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, and Chandrasekaran Pandu Rangan - Universal Designated Verifier Signatures with Threshold-Signers
Pairat Thorncharoensri, Willy Susilo, and Yi Mu - Reducing Complexity Assumptions for Oblivious Transfer
K.Y. Cheong and Takeshi Koshiba
Invited Talk 2
11:00-12:00 October 29 (Thu), 2009
Session Chair: Kazuo Takaragi
- The Future of Cryptographic Algorithms
Bart Preneel
Session 3: Contents Protection and Intrusion Detection
13:10-14:25 October 29 (Thu), 2009
Session Chair: Masakatsu Nishigaki
- Tamper-Tolerant Software: Modeling and Implementation
Mariusz H. Jakubowski, Chit Wei (Nick) Saw, and Ramarathnam Venkatesan - An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation,
Koji Nuida - Efficient Intrusion Detection Based on Static Analysis and Stack Walks
Jingyu Hua, Mingchu Li, Kouichi Sakurai, and Yizhi Ren
Session 4: Authentication
14:25-15:40 October 29 (Thu), 2009
Session Chair: Pandu C. Rangan
- Strongly Secure Authenticated Key Exchange without NAXOS' Approach
Minkyu Kim, Atsushi Fujioka, and Berkant Ustaoglu - ID-Based Group Password-Authenticated Key Exchange
Xun Yi, Raylin Tso, and Eiji Okamoto - A Proposal of Efficient Remote Biometric Authentication Protocol
Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, and Masakatsu Nishigaki
Panel Discussion
16:00-17:30 October 29 (Thu), 2009
Session Chair: Bart Preneel
- Cryptographic hash functions: SHA-3 and beyond
William Burr, Bart Preneel, Christian Rechberger, Bruce Schneier, Dai Watanabe
Session 5: Short Papers I
9:15-10:15 October 30 (Fri), 2009
Session Chair: Kazukuni Kobara
- Key Generation for Fast Inversion of the Paillier Encryption Function
Takato Hirano and Keisuke Tanaka - Security Analysis of Three Provably Secure ID-based Signcryption Schemes
Chik How Tan - How to Implement Furukawa-Imai Group Signature Scheme with Barreto-Naehrig Curve
S. Takeuchi, Y. Sakemi, T. Okimoto, Y. Nogami, T. Nakanishi, J. Furukawa, and K. Sako
Session 6: Short Papers II
10:35-11:35 October 30 (Fri), 2009
Session Chair: Xun Yi
- A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity
Keita Emura, Atsuko Miyaji, Kazumasa Omote - An Adaptation of Proxy Signature for Secure and Serverless Authentication in 3GPP Release 8 Networks
Chan-Kyu Han, Hyoung-Kee Choi - A Formal Approach to Interoperability between Licenses for Content Protection
Kunihiko Fujita, Hiroki Endo, Yasuyuki Tsukada