IWSEC2014 (The 9th International Workshop on Security)

Time Table (Last updated: July 19)

August 27, 2014

Time Session
13:30-14:30 Keynote - Cybersecurity Strategy in Japan
14:30-14:40 Short Break
14:40-15:40 SCIS/CSS Invited Session 1
15:40-16:10 Coffee Break + Poster Session
16:10-18:10 Session1: System Security
18:10-19:00 Poster Session + Welcome Drink
19:00-21:00 Welcome Reception

August 28, 2014

August 29, 2014

Time Session
9:30-11:30 Session 3: Hardware Security
11:30-11:50 Coffee Break
11:50-12:50 SCIS/CSS Invited Session 2
12:50-14:00 Lunch (in Cafeteria)
14:00-15:35 Session 4: Foundation
15:35-15:45 Short Break
15:45-16:50 Session 5: Encryption
16:50-17:00 Farewell

Program of IWSEC2014


13:30-14:30 August 27, 2014

Session Chair: Tatsuya Mori

  • Cybersecurity Strategy in Japan
    Yasuhiko Taniwaki

SCIS/CSS Invited Session 1

14:40-15:40 August 27, 2014

Session Chair: Koutarou Suzuki

See the SCIS/CSS Invited Sessions page.

    Poster Session

    15:40-16:10 August 27, 2014

    Session1: System Security (5 talks)

    16:10-18:10 August 27, 2014

    Session Chair: Kanta Matsuura

    • Privacy-Friendly Access Control Based on Personal Attributes
      Jan Hajny, Lukas Malina and Ondrej Tethal
    • Are You Threatening my Hazards?
      Marina Krotofil and Jason Larsen
    • Complicating Process Identification by Replacing Process Information for Attack Avoidance 
      Masaya Sato and Toshihiro Yamauchi
    • Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints
      Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara and Toshiaki Ishiyama
    • Key Management for Onion Routing in a True Peer to Peer Setting (Short Paper)
      Paolo Palmieri and Johan Pouwelse

    Poster Session

    18:10-19:00 August 27, 2014

    Welcome Reception

    19:00-21:00 August 27, 2014

    Session 2: Threshold Cryptography (4 talks)

    9:30-10:55 August 28, 2014

    Session Chair: Akinori Kawachi

    • Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication
      Rui Xu, Kirill Morozov and Tsuyoshi Takagi
    • Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (Short Paper)
      Satoshi Obana and Kazuya Tsuchida
    • Secure Multi-party Computation for Elliptic Curves (Short Paper)
      Koutarou Suzuki and Kazuki Yoneyama
    • More Constructions of Re-splittable Threshold Public Key Encryption (Short Paper)
      Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura

    Poster Session (Voting deadline)

    10:55-11:30 August 28, 2014


    11:30-12:30 August 28, 2014

    Session Chair: Satoshi Obana

    • A model for adversarial wiretap channel and its applications
      Reihaneh (Rei) Safavi-Naini

    Session 3: Hardware Security (5 talks)

    9:30-11:30 August 29, 2014

    Session Chair: Hiroaki Kikuchi

    • How to Effectively Decrease the Resource Requirement in Template Attack?
      Hailong Zhang, Yongbin Zhou and Dengguo Feng
    • Deterministic Hard Fault Attack on Trivium (Short Paper)
      Avijit Dutta and Goutam Paul
    • DPA Resilience of Rotation-Symmetric S-boxes
      Muhammet Ali Evci and Selcuk Kavut
    • A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering
      Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama and Naoya Torii
    • Hydra: An Energy-efficient Programmable Cryptographic Coprocessor Supporting Elliptic-curve Pairings over Fields of Large Characteristics
      Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu and Chen-Mou Cheng

    SCIS/CSS Invited Session 2

    11:50-12:50 August 29, 2014

    Session Chair: Kuniyasu Suzaki

    See the SCIS/CSS Invited Sessions page.

      Session 4: Foundation (4 talks)

      14:00-15:35 August 29, 2014

      Session Chair: Kazuki Yoneyama

      • On the Security Proof of an Authentication Protocol from Eurocrypt 2011
        Kosei Endo and Noboru Kunihiro
      • Improved Linear Cryptanalysis of Reduced-Round MIBS
        Asli Bay, Jialin Huang and Serge Vaudenay
      • Characterization of EME with Linear Mixing
        Mridul Nandi and Nilanjan Datta
      • Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty (Short Paper)
        Yasuyuki Nogami and Shoichi Akagi

      Session 5: Encryption (3 talks)

      15:45-16:50 August 29, 2014

      Session Chair: Noboru Kunihiro

      • Related Key Secure PKE from Hash Proof Systems
        Dingding Jia, Bao Li, Xianhui Lu and Qixiang Mei
      • Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (Short Paper)
        Fu-Kuo Tseng, Rong-Jaye Chen and Bao-Shuh Lin
      • Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (Short Paper)
        Sanjit Chatterjee and Sayantan Mukherjee


      16:50-17:00 August 29, 2014