Time Table (Last updated: November 18)
November 18, 2013
Time | Session | |
---|---|---|
13:00–14:00 | Keynote - Leakage Resilient Cryptography (Chair: Kazuo Sakiyama) | |
14:00–14:10 | Break | |
14:10–15:25 | Session 1: Software and System Security (Chair: Yuji Suga) | |
15:25–16:00 | Coffee Break | |
16:00–17:40 | SCIS/CSS Invited Session 1 (Chair: Keisuke Tanaka) | |
17:40–18:30 | Poster Session (Chair: Maki Yoshida) | |
18:30–20:30 | Welcome Reception |
November 19, 2013
Time | Session | |
---|---|---|
9:20–11:00 | Session 2: Cryptanalysis (Chair: Yang Li) | |
11:00–11:30 | Coffee Break | |
11:30–12:30 | Keynote - Learning from the experience of publishing useful data (Chair: Masayuki Terada) | |
12:30–14:00 | Lunch Break and Poster Session | |
14:00–15:40 | Session 3: Privacy and Cloud Computing (Chair: Hiroaki Kikuchi) | |
15:40–16:10 | Coffee Break | |
16:10–17:00 | SCIS/CSS Invited Session 2 (Chair: Goichiro Hanaoka) | |
18:00–20:00 | Banquet |
November 20, 2013
Time | Session |
---|---|
9:20–11:00 | Session 4: Public Key Cryptosystems (Chair: Noboru Kunihiro) |
11:00–11:10 | Break |
11:10–12:50 | Session 5: Security Protocols (Chair: Takahiro Matsuda) |
13:50–18:15 | Excursion (optional, extra charge) |
Program of IWSEC2013
Keynote
13:00-14:00 November 18, 2013
Session Chair: Kazuo Sakiyama
- Leakage Resilient Cryptography
Sebastian Faust
[Abstract]
Session 1: Software and System Security (3 talks)
14:10-15:25 November 18, 2013
Session Chair: Yuji Suga
- Secure Log Transfer by Replacing a Library in a Virtual Machine
Masaya Sato and Toshihiro Yamauchi - Static Integer Overflow Vulnerability Detection in Windows Binary
Yi Deng, Yang Zhang, Liang Cheng and Xiaoshan Sun - Solving Google's Continuous Audio CAPTCHA with HMM-based Automatic Speech Recognition
Shotaro Sano, Takuma Otsuka and Hiroshi G. Okuno - Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces
José Moreira, Marcel Fernández and Grigory Kabatiansky
SCIS/CSS Invited Session 1
16:00-17:40 November 18, 2013
Session Chair: Keisuke Tanaka
- An Algorithm for Computing Aggregate Median on Secure Function Evaluation
Koki Hamada - Privacy visor: Wearable device that transmits invisible noise signals for preventing face recognition from camera images
Isao Echizen - Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup Revisited
Takashi Yamakawa - Multiple-Signability: A Study on Multisignatures and Aggregate Signatures
Naoto Yanai
Poster Session
17:40-18:30 November 18, 2013
12:30-14:00 November 19, 2013
Session Chair: Maki Yoshida
Session 2: Cryptanalysis (4 talks)
9:20-11:00 November 19, 2013
Session Chair: Yang Li
- Differential Power Analysis of MAC-Keccak at Any Key-Length
Mostafa Taha and Patrick Schaumont - Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
Yusuke Naito, Yu Sasaki, Lei Wang and Kan Yasuda - New Property of Diffusion Switching Mechanism on CLEFIA and its Application to DFA
Yosuke Todo and Yu Sasaki - Improvement of Faugère et al.'s method to solve ECDLP
Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara and Tsuyoshi Takagi
Keynote
11:30-12:30 November 19, 2013
Session Chair: Masayuki Terada
- Learning from the experience of publishing useful data
Nobuaki Hoshino
[Abstract]
Session 3: Privacy and Cloud Computing (4 talks)
14:00-15:40 November 19, 2013
Session Chair: Hiroaki Kikuchi
- Statistics on Encrypted Cloud Data
Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen and Bao-Shuh Paul Lin - Toward Practical Searchable Symmetric Encryption
Wakaha Ogata, Keita Koiwa, Akira Kanaoka and Shin'Ichiro Matsuo - Unconditionally Secure Oblivious Transfer from Real Network Behavior
Paolo Palmieri and Olivier Pereira - Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption
Takato Hirano, Mitsuhiro Hattori, Takashi Ito and Nori Matsuda
SCIS/CSS Invited Session 2
16:10-17:00 November 19, 2013
Session Chair: Goichiro Hanaoka
- Application for Privacy-Preserving Epidemic analysis and Bays Estimation of Size of Intersection using Bloom Filter
Hiroaki Kikuchi - Remote fault-injection method with timing control based on leaked information
Yu-ichi Hayashi
Session 4: Public Key Cryptosystems (4 talks)
9:20-11:00 November 20, 2013
Session Chair: Noboru Kunihiro
- Efficient Algorithm for Tate Pairing of Composite Order
Yutaro Kiyomura and Tsuyoshi Takagi - How to Factor $N_1$ and $N_2$ When $p_1=p_2 \bmod 2^t$
Kaoru Kurosawa and Takuma Ueda - Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption
Takahiro Matsuda and Goichiro Hanaoka - Cryptanalysis of the Quaternion Rainbow
Yasufumi Hashimoto
Session 5: Secure Protocols (4 talks)
11:10-12:50 November 20, 2013
Session Chair: Takahiro Matsuda
- On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary
Rui Xu, Kirill Morozov and Tsuyoshi Takagi - One-Round Authenticated Key Exchange without Implementation Trick
Kazuki Yoneyama - Attacks to the Proxy Re-Encryption Schemes from IWSEC2011
Toshiyuki Isshiki, Manh Ha Nguyen and Keisuke Tanaka - Game-Theoretic Security for Bit Commitment
Haruna Higo, Keisuke Tanaka and Kenji Yasunaga