Time Table

November 8, 2011

Time Session
13:30–13:40 Opening
13:40–14:40 Invited Talk 1
14:40–15:05 Break
15:05–15:55 Session 1: Software Protection and Reliability (2 talks)
15:55–16:45 Session 2: Cryptographic Protocol (2 talks)

November 9, 2011

Time Session
10:00–10:50 Session 3: Pairing and Identity Based Signature (2 talks)
10:50–11:15 Break
11:15–12:30 Session 4: Malware Detection (3 talks)
12:30–14:00 Lunch Break
14:00–15:15 Session 5: Mathematical and Symmetric Cryptography (3 talks)
15:15–15:40 Break
15:40–17:40 Poster Session
18:00–20:00 Banquet

November 10, 2011

Time Session
10:00–11:00 Invited Talk 2
11:00–11:25 Break
11:25–12:15 Session 6: Public Key Encryption (2 talks)
12:15–12:25 Closing

Program of IWSEC2011

Invited Talk 1

13:40-14:40 November 8, 2011

Session Chair: Tetsu Iwata

  • Linear Cryptanalysis: History and Open Problems
    Mitsuru Matsui

Session 1: Software Protection and Reliability (2 talks)

15:05-15:55 November 8, 2011

Session Chair: Toshihiro Yamauchi

  • A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes
    Minoru Kuribayashi
  • REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
    Georgios Portokalidis and Angelos D. Keromytis

Session 2: Cryptographic Protocol (2 talks)

15:55-16:45 November 8, 2011

Session Chair: Goichiro Hanaoka

  • Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
    Atsushi Fujioka
  • A Secure M + 1st Price Auction Protocol based on Bit Slice Circuits
    Takuho Mitsunaga, Yoshifumi Manabe, and Tatsuaki Okamoto

Session 3: Pairing and Identity Based Signature (2 talks)

10:00-10:50 November 9, 2011

Session Chair: Noboru Kunihiro

  • Cryptographic Pairings Based on Elliptic Nets
    Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, and Eiji Okamoto
  • Identity Based Deterministic Signature Scheme Without Forking-Lemma
    S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan

Session 4: Malware Detection (3 talks)

11:15-12:30 November 9, 2011

Session Chair: Yutaka Miyake

  • Nitro: Hardware-based System Call Tracing for Virtual Machines
    Jonas Pfoh, Christian Schneider, and Claudia Eckert
  • Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking
    Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
  • An Entropy based approach for DDoS attack detection in IEEE 802.16 based networks
    Maryam Shojaei, Naser Movahedinia, and Behrouz Tork Ladani

Session 5: Mathematical and Symmetric Cryptography (3 talks)

14:00-15:15 November 9, 2011

Session Chair: Shiho Moriai

  • A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
    Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, and Yasuhide Numata
  • A Theoretical Analysis of the Structure of HC-128
    Goutam Paul, Subhamoy Maitra, and Shashwat Raizada
  • Experimental Verification of Super-Sbox Analysis --- Confirmation of Detailed Attack Complexity
    Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta

Invited Talk 2

10:00-11:00 November 10, 2011

Session Chair: Masakatsu Nishigaki

  • Palm Vein Authentication Technology and its Application Systems
    Takashi Shinzaki

Session 6: Public Key Encryption (2 talks)

11:25-12:15 November 10, 2011

Session Chair: Katsuyuki Takashima

  • Towards Restricting Plaintext Space in Public Key Encryption
    Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote
  • Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, and Koji Okada