Time Table (Last updated: July 19)
August 27, 2014
Time | Session |
13:30-14:30 | Keynote - Cybersecurity Strategy in Japan |
14:30-14:40 | Short Break |
14:40-15:40 | SCIS/CSS Invited Session 1 |
15:40-16:10 | Coffee Break + Poster Session |
16:10-18:10 | Session1: System Security |
18:10-19:00 | Poster Session + Welcome Drink |
19:00-21:00 | Welcome Reception |
August 28, 2014
Time | Session |
9:30-10:55 | Session 2: Threshold Cryptography |
10:55-11:30 | Coffee Break + Poster Session (Voting deadline) |
11:30-12:30 | Keynote - A model for adversarial wiretap channel and its applications |
13:00-18:00 | Lunch (in Bus) + Excursion |
19:00-21:00 | Banquet |
August 29, 2014
Time | Session |
9:30-11:30 | Session 3: Hardware Security |
11:30-11:50 | Coffee Break |
11:50-12:50 | SCIS/CSS Invited Session 2 |
12:50-14:00 | Lunch (in Cafeteria) |
14:00-15:35 | Session 4: Foundation |
15:35-15:45 | Short Break |
15:45-16:50 | Session 5: Encryption |
16:50-17:00 | Farewell |
Program of IWSEC2014
Keynote
13:30-14:30 August 27, 2014
Session Chair: Tatsuya Mori
-
Cybersecurity Strategy in Japan
Yasuhiko Taniwaki
SCIS/CSS Invited Session 1
Poster Session
15:40-16:10 August 27, 2014
Session1: System Security (5 talks)
16:10-18:10 August 27, 2014
Session Chair: Kanta Matsuura
-
Privacy-Friendly Access Control Based on Personal
Attributes
Jan Hajny, Lukas Malina and Ondrej Tethal -
Are You Threatening my Hazards?
Marina Krotofil and Jason Larsen -
Complicating Process Identification by Replacing Process
Information for Attack Avoidance 
Masaya Sato and Toshihiro Yamauchi -
Kernel Memory Protection by an Insertable Hypervisor which
has VM Introspection and Stealth Breakpoints
Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara and Toshiaki Ishiyama -
Key Management for Onion Routing in a True Peer to Peer
Setting (Short Paper)
Paolo Palmieri and Johan Pouwelse
Poster Session
18:10-19:00 August 27, 2014
Welcome Reception
19:00-21:00 August 27, 2014
Session 2: Threshold Cryptography (4 talks)
9:30-10:55 August 28, 2014
Session Chair: Akinori Kawachi
-
Cheater Identifiable Secret Sharing Schemes Via
Multi-Receiver Authentication
Rui Xu, Kirill Morozov and Tsuyoshi Takagi -
Cheating Detectable Secret Sharing Schemes Supporting an
Arbitrary Finite Field (Short Paper)
Satoshi Obana and Kazuya Tsuchida -
Secure Multi-party Computation for Elliptic Curves (Short
Paper)
Koutarou Suzuki and Kazuki Yoneyama -
More Constructions of Re-splittable Threshold Public Key
Encryption (Short Paper)
Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura
Poster Session (Voting deadline)
10:55-11:30 August 28, 2014
Keynote
11:30-12:30 August 28, 2014
Session Chair: Satoshi Obana
-
A model for adversarial wiretap channel and its applications
Reihaneh (Rei) Safavi-Naini
[Abstract]
Session 3: Hardware Security (5 talks)
9:30-11:30 August 29, 2014
Session Chair: Hiroaki Kikuchi
-
How to Effectively Decrease the Resource Requirement in
Template Attack?
Hailong Zhang, Yongbin Zhou and Dengguo Feng -
Deterministic Hard Fault Attack on Trivium (Short Paper)
Avijit Dutta and Goutam Paul -
DPA Resilience of Rotation-Symmetric S-boxes
Muhammet Ali Evci and Selcuk Kavut -
A Technique Using PUFs for Protecting Circuit Layout
Designs against Reverse Engineering
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama and Naoya Torii -
Hydra: An Energy-efficient Programmable Cryptographic
Coprocessor Supporting Elliptic-curve Pairings over Fields of
Large Characteristics
Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu and Chen-Mou Cheng
SCIS/CSS Invited Session 2
Session 4: Foundation (4 talks)
14:00-15:35 August 29, 2014
Session Chair: Kazuki Yoneyama
-
On the Security Proof of an Authentication Protocol from
Eurocrypt 2011
Kosei Endo and Noboru Kunihiro -
Improved Linear Cryptanalysis of Reduced-Round MIBS
Asli Bay, Jialin Huang and Serge Vaudenay -
Characterization of EME with Linear Mixing
Mridul Nandi and Nilanjan Datta -
Exponentiation Inversion Problem Reduced from Fixed
Argument Pairing Inversion on Twistable Ate Pairing and Its
Difficulty (Short Paper)
Yasuyuki Nogami and Shoichi Akagi
Session 5: Encryption (3 talks)
15:45-16:50 August 29, 2014
Session Chair: Noboru Kunihiro
-
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu and Qixiang Mei -
Towards Symmetric Functional Encryption for Regular
Languages with Predicate Privacy (Short Paper)
Fu-Kuo Tseng, Rong-Jaye Chen and Bao-Shuh Lin
-
Framework for Efficient Search and Statistics Computation
on Encrypted Cloud Data (Short Paper)
Sanjit Chatterjee and Sayantan Mukherjee
Farewell
16:50-17:00 August 29, 2014