List of Posters

Best Poster Award

  • *Yohei Watanabe and Junji Shikata, "Information-Theoretically Secure Revocable-Storage Broadcast Encryption"

Remarks:

  • Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.

IWSEC 2014 List of Posters (tentative program as of 8 August)

  1. An Attack to IWSEC2013's Countermeasure for Cancelable Biometric Authentication Protocols, and Its Countermeasure
    Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Yutaka Kawai, and Takumi Yamamoto
  2. FCDBD: Framework for Countering Drive-by Download
    Takashi MATSUNAKA, Junpei URAKAWA, Akihiro NAKARAI, Ayumu KUBOTA, Kazuo KAWAMORITA, Yuji HOSHIZAWA, Takahiro KASAMA, Masashi ETO, Daisuke INOUE, and Koji NAKAO
  3. A domain-specific language for efficient cryptographic engineering
    Po-Hsiang Hao and Chen-Mou Cheng
  4. Chimera CAPTCHA: A Proposal of CAPTCHA using Strangeness in Merged Objects
    Masahiro Fujita, Yuki Ikeya, Junya Kani, and Masakatsu Nishigaki
  5. Parallel Implementations of QUAD Stream Cipher over Binary Extension Fields on Graphics Processing Units
    Satoshi Tanaka, Takanori Yasuda, and Kouichi Sakurai
  6. How do you build trust with your user?: Third party framework and its user interface providing trust information of cryptographic protocols
    Akira Kanaoka
  7. Multivariate Quadratic Challenge
    Takanori Yasuda, Xavier Dahan, Tsuyoshi Takagi, and Kouichi Sakurai
  8. An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
    Yuntao Wang, Po-Chun Kuo, Chen-Mou Cheng, and Tsuyoshi Takagi
  9. Non-linear Transformations for S-box in Symmetric Key Cryptography
    Kou Hishiya, Goushi Izumiya, Xin Sun, and Tomoyuki Nagase
  10. Attribute-Based Encryption: New Policy Types, Same Assumption, Similar Efficiency
    Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, and Shota Yamada
  11. Secure Remote Diagnostics
    Dennis Kengo Oka, Takahiro Furue, and Camille Vuillaume
  12. User Authentication Trial by Behavior Data of Wearable Device
    Hiroya Susuki and Rie Shigetomi Yamaguchi
  13. Information-Theoretically Secure Revocable-Storage Broadcast Encryption
    Yohei Watanabe and Junji Shikata

    * Underlined authors are presenters.