List of Posters

Best Poster Award

  • *Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
    "New Security Proof for a Variant of the BGW Broadcast Encryption Scheme"

  • *Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi
    "Improving BKZ Algorithm with Reordering Technique"

Remarks:

  • Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.

IWSEC 2013 List of Posters (tentative program as of 14 Nov)

  1. A Vulnerability in a Cancelable Biometrics Authentication Scheme
    Yumi Sakemi, Masahiko Takenaka, Tetsuya Izu, and Naoya Torii
  2. Basis Conversion Technique on Dual Paring Vector Space and its applications
    Yutaka Kawai and Katsuyuki Takashima
  3. Implementation and Evaluation of Secure Outsourcing Scheme for Cloud Storage Services using Secret Sharing Scheme
    Kouta Yoshida, Kouji Nishimura, Toshihiro Ohigashi, and Reiji Aibara
  4. Reducing Randomness Complexity Unconditionally: How to Keep Underlying Assumptions
    Koji Nuida
  5. Data Sharing for Cybersecurity Research and Information Sharing for Cybersecurity Practice
    Kanta Matsuura and Takurou Hosoi
  6. Effectiveness of a Change in TCP Retransmission Timer Management for Low-rate DoS Attack Mitigation and Attack Variants
    HOSOI Takurou and Kanta Matsuura
  7. Secure Single Sign-on Schemes Constructed from Nominative Signatures, Revisited
    Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Sanami Nakagawa, and Yusuke Sakai
  8. Partial Key Exposure Attacks on RSA: Achieve Boneh-Durfee's Bound
    Atsushi Takayasu and Noboru Kunihiro
  9. On the Security Proof of an Authentication Protocol from Eurocrypt 2011
    Kosei Endo and Noboru Kunihiro
  10. PrivacyVisor: Wearables based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection
    Takayuki YAMADA, Seiichi GOHSHI, and Isao ECHIZEN
  11. New Security Proof for a Variant of the BGW Broadcast Encryption Scheme
    Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
  12. Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags
    Yang Li, Toshiki Nakasone, and Kazuo Sakiyama
  13. Investigating Entropy of User-retained Authentication Information
    Takuya Kaneko and Masakatsu Nishigaki
  14. An image-based CAPTCHA using sophisticated mental rotation
    Yuki Ikeya, Junya Kani, Yuta Yoneyama, and Masakatsu Nishigaki
  15. Improving BKZ Algorithm with Reordering Technique
    Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi
  16. SSL/TLS status survey in Asia region - Transitioning against the renegotiation vulnerability, CRIME attacks and untrusted X.509 certificates
    Yuji Suga
  17. A Network to Render Botnet Activity Harmless using OpenFlow/SDN
    Kazumasa Yamauchi, Kentaro Sonoda, Yoshiaki Hori, Junpei Kawamoto, and Koichi Sakurai
  18. Reducing the Key Size of Multivariate Signature Scheme
    Takanori Yasuda, Tsuyoshi Takagi, and Kouichi Sakurai
  19. Implementation of Efficient Operations over $GF({2}^{32})$ using Graphics Processing Units
    Satoshi Tanaka, Takanori Yasuda, and Kouichi Sakurai
  20. A New Model of Modeling attacks against Arbiter PUF on FPGA
    Takanori Machida, Toshiki Nakasone, Mitsugu Iwamoto, and Kazuo Sakiyama
-->