Time Table (Last updated: November 18)

November 18, 2013

Time Session
13:00–14:00 Keynote - Leakage Resilient Cryptography (Chair: Kazuo Sakiyama)
14:00–14:10 Break
14:10–15:25 Session 1: Software and System Security (Chair: Yuji Suga)
15:25–16:00 Coffee Break
16:00–17:40 SCIS/CSS Invited Session 1 (Chair: Keisuke Tanaka)
17:40–18:30 Poster Session (Chair: Maki Yoshida)
18:30–20:30 Welcome Reception

November 19, 2013

Time Session
9:20–11:00 Session 2: Cryptanalysis (Chair: Yang Li)
11:00–11:30 Coffee Break
11:30–12:30 Keynote - Learning from the experience of publishing useful data (Chair: Masayuki Terada)
12:30–14:00 Lunch Break and Poster Session
14:00–15:40 Session 3: Privacy and Cloud Computing (Chair: Hiroaki Kikuchi)
15:40–16:10 Coffee Break
16:10–17:00 SCIS/CSS Invited Session 2 (Chair: Goichiro Hanaoka)
18:00–20:00 Banquet

November 20, 2013

Program of IWSEC2013

Keynote

13:00-14:00 November 18, 2013

Session Chair: Kazuo Sakiyama

Session 1: Software and System Security (3 talks)

14:10-15:25 November 18, 2013

Session Chair: Yuji Suga

  • Secure Log Transfer by Replacing a Library in a Virtual Machine
    Masaya Sato and Toshihiro Yamauchi
  • Static Integer Overflow Vulnerability Detection in Windows Binary
    Yi Deng, Yang Zhang, Liang Cheng and Xiaoshan Sun
  • Cancelled
  • Solving Google's Continuous Audio CAPTCHA with HMM-based Automatic Speech Recognition
    Shotaro Sano, Takuma Otsuka and Hiroshi G. Okuno
  • Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces
    José Moreira, Marcel Fernández and Grigory Kabatiansky

SCIS/CSS Invited Session 1

16:00-17:40 November 18, 2013

Session Chair: Keisuke Tanaka

  • An Algorithm for Computing Aggregate Median on Secure Function Evaluation
    Koki Hamada
  • Privacy visor: Wearable device that transmits invisible noise signals for preventing face recognition from camera images
    Isao Echizen
  • Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup Revisited
    Takashi Yamakawa
  • Multiple-Signability: A Study on Multisignatures and Aggregate Signatures
    Naoto Yanai

Poster Session

17:40-18:30 November 18, 2013

12:30-14:00 November 19, 2013

Session Chair: Maki Yoshida

Session 2: Cryptanalysis (4 talks)

9:20-11:00 November 19, 2013

Session Chair: Yang Li

  • Differential Power Analysis of MAC-Keccak at Any Key-Length
    Mostafa Taha and Patrick Schaumont
  • Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC
    Yusuke Naito, Yu Sasaki, Lei Wang and Kan Yasuda
  • New Property of Diffusion Switching Mechanism on CLEFIA and its Application to DFA
    Yosuke Todo and Yu Sasaki
  • Improvement of Faugère et al.'s method to solve ECDLP
    Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara and Tsuyoshi Takagi

Keynote

11:30-12:30 November 19, 2013

Session Chair: Masayuki Terada

Session 3: Privacy and Cloud Computing (4 talks)

14:00-15:40 November 19, 2013

Session Chair: Hiroaki Kikuchi

  • Statistics on Encrypted Cloud Data
    Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen and Bao-Shuh Paul Lin
  • Toward Practical Searchable Symmetric Encryption
    Wakaha Ogata, Keita Koiwa, Akira Kanaoka and Shin'Ichiro Matsuo
  • Unconditionally Secure Oblivious Transfer from Real Network Behavior
    Paolo Palmieri and Olivier Pereira
  • Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption
    Takato Hirano, Mitsuhiro Hattori, Takashi Ito and Nori Matsuda

SCIS/CSS Invited Session 2

16:10-17:00 November 19, 2013

Session Chair: Goichiro Hanaoka

  • Application for Privacy-Preserving Epidemic analysis and Bays Estimation of Size of Intersection using Bloom Filter
    Hiroaki Kikuchi
  • Remote fault-injection method with timing control based on leaked information
    Yu-ichi Hayashi

Session 4: Public Key Cryptosystems (4 talks)

9:20-11:00 November 20, 2013

Session Chair: Noboru Kunihiro

  • Efficient Algorithm for Tate Pairing of Composite Order
    Yutaro Kiyomura and Tsuyoshi Takagi
  • How to Factor $N_1$ and $N_2$ When $p_1=p_2 \bmod 2^t$
    Kaoru Kurosawa and Takuma Ueda
  • Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption
    Takahiro Matsuda and Goichiro Hanaoka
  • Cryptanalysis of the Quaternion Rainbow
    Yasufumi Hashimoto

Session 5: Secure Protocols (4 talks)

11:10-12:50 November 20, 2013

Session Chair: Takahiro Matsuda

  • On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary
    Rui Xu, Kirill Morozov and Tsuyoshi Takagi
  • One-Round Authenticated Key Exchange without Implementation Trick
    Kazuki Yoneyama
  • Attacks to the Proxy Re-Encryption Schemes from IWSEC2011
    Toshiyuki Isshiki, Manh Ha Nguyen and Keisuke Tanaka
  • Game-Theoretic Security for Bit Commitment
    Haruna Higo, Keisuke Tanaka and Kenji Yasunaga