Time Table (Last Update: August 29th, 2017)
August 30, 2017
Time | Session |
---|---|
13:00-13:10 | Opening |
13:10-14:10 | Keynote 1 |
14:10-14:30 | Break |
14:30-15:20 | Post-Quantum Cryptography |
15:20-15:40 | Break |
15:40-16:25 | System Security (1) |
16:25-16:45 | Break |
16:45-17:35 | Public Key Cryptosystems (1) |
18:00-20:30 | Poster Session / Welcome Party |
August 31, 2017
Time | Session |
---|---|
09:00-10:00 | Keynote 2 |
10:00-10:20 | Break |
10:20-11:10 | System Security (2) |
11:10-11:30 | Break |
11:30-12:20 | Cryptanalysis |
12:20- | Excursion & Conference Dinner |
September 1, 2017
Time | Session |
---|---|
9:00-10:30 | Special Session |
10:30-10:45 | Break |
10:45-11:30 | Cryptographic Protocols |
11:30-12:45 | Lunch |
12:45-13:30 | Public Key Cryptosystems (2) |
13:30-13:45 | Break |
13:45-15:00 | SCIS & CSS Award Session (1) |
15:00-15:15 | Break |
15:15-16:15 | SCIS & CSS Award Session (2) |
16:15-16:30 | Break |
16:30-17:45 | SCIS & CSS Award Session (3) |
17:45-17:50 | Closing |
Program of IWSEC2017
Keynote 1
13:10-14:10 August 30, 2017
Session Chair: Satoshi Obana
-
Where did Alice and Bob go, and can blockchain help to bring them back?
Dr. Kazue Sako
Post-Quantum Cryptography
14:30-15:20 August 30, 2017
Session Chair: Takato Hirano
-
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers (Regular)
Akinori Hosoyamada and Kazumaro Aoki -
The Beauty and the Beasts --The Hard Cases in LLL Reduction (Regular)
Yuntao Wang, Saed Alsayigh, Tsuyoshi Takagi and Jintai Ding
System Security (1)
15:40-16:25 August 30, 2017
Session Chair: Sven Wohlgemuth
-
Simple Infeasibility Certificates for Attack Trees (Regular)
Ahto Buldas, Aleksandr Lenin, Jan Willemson and Anton Charnamord -
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short)
Bingqing Xia, Dongyao Ji and Gang Yao
Public Key Cryptosystems (1)
16:45-17:35 August 30, 2017
Session Chair: Keita Emura
-
Multipurpose Public-Key Encryption (Regular)
Rui Zhang and Kai He -
Secure Certificateless Proxy Re-encryption without Pairing (Regular)
Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia and Olivier Markowitch
Keynote 2
9:00-10:00 August 31, 2017
Session Chair: Koji Chida
-
Practical Risk-based Approaches for Anonymizing Health Data: A Perspective from the Trenches
Dr. Khaled El Emam
System Security (2)
10:20-11:10 August 31, 2017
Session Chair: Tetsushi Ohki
-
Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability (Regular)
Nasser Mohammed Al-Fannah and Wanpeng Li -
Evasion attacks against statistical code obfuscation detectors (Regular)
Jiawei Su, Danilo Vasconcellos Vargas and Kouichi Sakurai
Cryptanalysis
11:30-12:20 August 31, 2017
Session Chair: Atsushi Fujioka
-
Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials (Regular)
Kota Kondo, Yu Sasaki, Yosuke Todo and Tetsu Iwata -
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation (Regular)
Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman and Shinsaku Kiyomoto
Special Session: Introduction to Privacy Enhancing Technology Competitions
9:00-10:30 September 1, 2017
Session Chair: Koji Nuida
-
Genomic Data Privacy and Security Protection Competition
Dr. Shuang Wang, Dr. Xiaoqian Jiang (UCSD) -
Data Anonymization Competition to Study the Security and Utility of Personal Data
Dr. Hiroaki Kikuchi (Meiji Univ.)
Cryptographic Protocols
10:45-11:30 September 1, 2017
Session Chair: Hiroaki Anada
-
Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short)
Baptiste Vinh Mau and Koji Nuida -
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators (Regular)
Atsushi Fujioka
Public Key Cryptosystems (2)
12:45-13:30 September 1, 2017
Session Chair: Mehdi Tibouchi
-
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters (Regular)
Daode Zhang, Fuyang Fang, Bao Li and Xin Wang -
IND-PCA Secure KEM is Enough for Password-Based Authenticated Key Exchange (Short)
Xue Haiyang, Bao Li and Xianhui Lu
SCIS & CSS Award Session (1)
13:45-15:00 September 1, 2017
Session Chair: Yuji Suga
-
Mis-operation Resistant Homomorphic Encryption (from AsiaCCS 2017)
Keita Emura -
A Constant-Size Signature Scheme
Kaisei Kajita -
An Efficient Equi-join Algorithm for Secure Computation and Its Implementation toward Secure Comprehensive Analyses of Users' Attribute and History Information
Naoto Kiribuchi -
Generic Constructions of Attribute-Based Encryption with Revocation (from ESORICS2017)
Kotoko Yamada -
MEVAL2 vs. CCS Best Paper on MPC-AES
Ryo Kikuchi
SCIS & CSS Award Session (2)
15:15-16:15 September 1, 2017
Session Chair: Shiho Moriai
-
Differentially Private Chi-squared Test by Unit Circle Mechanism (from ICML2017)
Kazuya Kakizaki -
Experiment on Removal and Prevention of IoT Malware Using Real Devices
Tie Ying -
Trojan of Things: Embedding Malicious NFC Tags into Common Objects
Seita Maruyama -
Privilege Escalation Attack Prevention Method Based on System Call Processing
Toshihiro Yamauchi
SCIS & CSS Award Session (3)
16:30-17:45 September 1, 2017
Session Chair: Kan Yasuda
-
Design of Highly Efficient Tamper-Resistant AES Processor Based on 1st Order TI
Rei Ueno -
Side-Channel Authentication Using XOR Model
Momoka Kasuya -
A Proposal of PUF utilizing Pixel Variations in the CMOS Image Sensor(2)
Yuki Nakura -
On the Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption
Masayuki Fukumitsu -
Speeding Up of Updates of Gram-Schmidt Vectors in DeepLLL
Junpei Yamaguchi
Accepted Papers
Regular Papers
- Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials
Kota Kondo, Yu Sasaki, Yosuke Todo and Tetsu Iwata - Simple Infeasibility Certificates for Attack Trees
Ahto Buldas, Aleksandr Lenin, Jan Willemson and Anton Charnamord - Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
Daode Zhang, Fuyang Fang, Bao Li and Xin Wang - Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation
Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman and Shinsaku Kiyomoto - Evasion attacks against statistical code obfuscation detectors
Jiawei Su, Danilo Vasconcellos Vargas and Kouichi Sakurai - The Beauty and the Beasts --The Hard Cases in LLL Reduction
Yuntao Wang, Saed Alsayigh, Tsuyoshi Takagi and Jintai Ding - Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators
Atsushi Fujioka - On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
Akinori Hosoyamada and Kazumaro Aoki - Multipurpose Public-Key Encryption
Rui Zhang and Kai He - Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability
Nasser Mohammed Al-Fannah and Wanpeng Li - Secure Certificateless Proxy Re-encryption without Pairing
Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia and Olivier Markowitch
Short Papers
- Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012
Baptiste Vinh Mau and Koji Nuida - IND-PCA Secure KEM is Enough for Password-Based Authenticated Key Exchange
Xue Haiyang, Bao Li and Xianhui Lu - Enhanced TLS Handshake Authentication with Blockchain and Smart Contract
Bingqing Xia, Dongyao Ji and Gang Yao