IWSEC 2018

3 September (Mon) - 5 September (Wed), 2018
Sendai, Miyagi, Japan

Time Table (Last Update: June 13th, 2018)

3 September, 2018

Time Session
11:00-11:15 Opening
11:15-12:15 Keynote 1
12:15-13:40 Lunch
13:40-14:55 Session 1
14:55-15:15 Break
15:15-16:05 Session 2
16:05-16:15 Break
16:15-17:30 Session 3
17:30-17:45 Break
17:45- Poster Session / Welcome Reception

4 September, 2018

Time Session
9:00-10:40 Session 4
10:40-11:00 Break
11:00-11:50 Session 5
11:50-12:00 Break
12:00-13:00 Keynote 2
13:00- Excursion / Conference Dinner

5 September, 2018

Time Session
9:00-10:15 Session 6
10:15-10:35 Break
10:35-11:50 Session 7
11:50-13:15 Lunch
13:15-14:30 SCIS & CSS Session
14:30-14:45 Closing

Accepted Papers

Regular Papers

  • Improvements to Almost Optimum Secret Sharing with Cheating Detection
    Louis Cianciullo and Hossein Ghodosi
  • Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem
    Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino and Ken Naganuma
  • The Anatomy of the HIPAA Privacy Rule: A Risk-based Approach as a Remedy for Privacy-preserving Data Sharing
    Makoto Iguchi, Taro Uematsu and Tatsuro Fujii
  • Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK
    Jingchun Yang, Meicheng Liu, Dongdai Lin and Wenhao Wang
  • Key Recovery Attack on McNie based on Low Rank Parity Check Codes and its Reparation
    Terry Shue Chien Lau and Chik How Tan
  • How to Prove KDM Security of BHHO
    Hayato Tada, Akinaga Ueda and Kaoru Kurosawa
  • Detecting Privacy Information Abuse by Android Apps from API Call Logs
    Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi and Hajime Shimada
  • From Identification using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature
    Pauline Bert and Adeline Roux-Langlois
  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
    Yasufumi Hashimoto, Yasuhiko Ikematsu and Tsuyoshi Takagi
  • XOR-based Hierarchical Secret Sharing Scheme
    Koji Shima and Hiroshi Doi
  • Verification of LINE Encryption Version 1.0 using ProVerif
    Cheng Shi and Kazuki Yoneyama
  • Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
    Weiyao Wang, Yuntao Wang, Atsushi Takayasu and Tsuyoshi Takagi
  • Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries
    Takamichi Saito, Masahiro Yokoyama, Shota Sugawara and Kuniyasu Suzaki
  • Lightweight Recursive MDS Matrices with Generalized Feistel Network
    Qiuping Li, Baofeng Wu and Zhuojun Liu
  • Is Java Card Ready for Hash-based Signatures?
    Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe and Jan Verschuren
  • Universal Witness Signatures
    Chen Qian, Remi Geraud and Mehdi Tibouchi
  • Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT
    Yu Sasaki
  • Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
    Dominik Klein and Andreas Wiemers

Short Papers

  • How to Solve DLOG Problem with Auxiliary Input
    Akinaga Ueda, Hayato Tada and Kaoru Kurosawa
  • Parameter Trade-Offs for NFS and ECM
    Kazumaro Aoki