IWSEC 2018

September 3rd (Mon) - September 5th (Wed), 2018
Sendai, Japan

Time Table (Last Update: August 3rd, 2018)

September 3rd, 2018

Time Session
11:00-11:15 Opening
11:15-12:15 Keynote 1
12:15-13:40 Lunch
13:40-14:55 Session 1
14:55-15:15 Break
15:15-16:05 Session 2
16:05-16:15 Break
16:15-17:30 Session 3
17:30-17:35 Break
17:35-19:30 Poster Session
/ Welcome Reception

September 4th, 2018

Time Session
9:00-10:40 Session 4
10:40-11:00 Poster Session
11:00-11:50 Session 5
11:50-12:00 Break
12:00-13:00 Keynote 2
13:00- Lunch & Excursion
19:00-21:30 Banquet

September 5th, 2018

Time Session
9:00-10:15 Session 6
10:15-10:35 Break
10:35-11:50 Session 7
11:50-12:00 Break
12:00-12:50 SCIS & CSS Session
12:50-13:00 Closing

Program of IWSEC2018

Keynote 1

Cryptanalysis

13:40-14:55 September 3rd, 2018
Session Chair: Mehdi Tibouchi (Nippon Telegraph and Telephone Corporation)

  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 (Regular)
    Yasufumi Hashimoto (University of the Ryukyus), Yasuhiko Ikematsu and Tsuyoshi Takagi (The University of Tokyo)
  • Key Recovery Attack on McNie based on Low Rank Parity Check Codes and its Reparation (Regular)
    Terry Shue Chien Lau and Chik How Tan (National University of Singapore)
  • Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem (Regular)
    Sota Onozawa, Noboru Kunihiro (The University of Tokyo), Masayuki Yoshino (Hitachi, Ltd.) and Ken Naganuma (Hitachi, Ltd., The University of Tokyo)

Implementation Security

15:15-16:05 September 3rd, 2018
Session Chair: Yu Sasaki (Nippon Telegraph and Telephone Corporation)

  • Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack (Regular)
    Dominik Klein and Andreas Wiemers (Bundesamt fur Sicherheit in der Informationstechnik)
  • Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries (Regular)
    Takamichi Saito, Masahiro Yokoyama, Shota Sugawara (Meiji University) and Kuniyasu Suzaki (National Institute of Advanced Industrial Science and Technology)

Public-Key Primitives

16:15-17:30 September 3rd, 2018
Session Chair: Ken Naganuma (Hitachi, Ltd.)

  • Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques (Regular)
    Weiyao Wang (The University of Tokyo), Yuntao Wang (The University of Tokyo, Kyushu University), Atsushi Takayasu (The University of Tokyo, National Institute of Advanced Industrial Science and Technology) and Tsuyoshi Takagi (The University of Tokyo)
  • How to Solve DLOG Problem with Auxiliary Input (Short)
    Akinaga Ueda, Hayato Tada and Kaoru Kurosawa (Ibaraki University)
  • Parameter Trade-Offs for NFS and ECM (Short)
    Kazumaro Aoki (Nippon Telegraph and Telephone Corporation)

Security in Practice

9:00-10:40 September 4th, 2018
Session Chair: Toshihiro Yamauchi (Okayama University)

  • Is Java Card Ready for Hash-based Signatures? (Regular)
    Ebo van der Laan (Netherlands National Communication Security Agency), Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe (Radboud University) and Jan Verschuren (Netherlands National Communication Security Agency)
  • Detecting Privacy Information Abuse by Android Apps from API Call Logs (Regular)
    Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi and Hajime Shimada (Nagoya University)
  • Verification of LINE Encryption Version 1.0 using ProVerif (Regular)
    Cheng Shi and KazukiYoneyama (Ibaraki University)
  • The Anatomy of the HIPAA Privacy Rule: A Risk-based Approach as a Remedy for Privacy-preserving Data Sharing (Regular)
    Makoto Iguchi, Taro Uematsu and Tatsuro Fujii (Kii Corporation)

Secret Sharing

11:00-11:50 September 4th, 2018
Session Chair: Kazuki Yoneyama (Ibaraki University)

  • Improvements to Almost Optimum Secret Sharing with Cheating Detection (Regular)
    Louis Cianciullo and Hossein Ghodosi (James Cook University)
  • XOR-based Hierarchical Secret Sharing Scheme (Regular)
    Koji Shima and Hiroshi Doi (Institute of Information Security)

Keynote 2

Symmetric-Key Primitives

9:00-10:15 September 5th, 2018
Session Chair: Shoichi Hirose (University of Fukui)

  • Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT (Regular)
    Yu Sasaki (Nippon Telegraph and Telephone Corporation)
  • Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK (Regular)
    Jingchun Yang, Meicheng Liu, Dongdai Lin and Wenhao Wang (University of Chinese Academy of Science)
  • Lightweight Recursive MDS Matrices with Generalized Feistel Network (Regular)
    Qiuping Li, Baofeng Wu and Zhuojun Liu (University of Chinese Academy of Science)

Provable Security

10:35-11:50 September 5th, 2018
Session Chair: Keita Emura (National Institute of Information and Communications Technology)

  • How to Prove KDM Security of BHHO (Regular)
    Hayato Tada, Akinaga Ueda and Kaoru Kurosawa (Ibaraki University)
  • From Identification using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature (Regular)
    Pauline Bert and Adeline Roux-Langlois (Univ Rennes, CNRS, Institut de Recherche en Informatique et Systemes Aleatoires)
  • Universal Witness Signatures (Regular)
    Chen Qian (Univ Rennes), Remi Geraud (Ecole Normale Superieure) and Mehdi Tibouchi (Nippon Telegraph and Telephone Corporation)

SCIS & CSS Session

12:00-12:50 September 5th, 2018
Session Chair: Kan Yasuda (Nippon Telegraph and Telephone Corporation)

  • Pseudo-Code Performance Estimation for Pairing-Based Cryptographic Schemes (from SCIS 2018)
    Masayuki Abe, Fumitaka Hoshino (Nippon Telegraph and Telephone Corporation) and Miyako Okubo (National Institute of Information and Communications Technology)
  • Silhouette: Controlling Side Channel to Identify Social Account of Website Visitor (from CSS 2017)
    Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (Nippon Telegraph and Telephone Corporation), Keito Sasaoka and Tatsuya Mori (Waseda University)

Accepted Papers

Regular Papers

  • Improvements to Almost Optimum Secret Sharing with Cheating Detection
    Louis Cianciullo and Hossein Ghodosi
  • Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem
    Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino and Ken Naganuma
  • The Anatomy of the HIPAA Privacy Rule: A Risk-based Approach as a Remedy for Privacy-preserving Data Sharing
    Makoto Iguchi, Taro Uematsu and Tatsuro Fujii
  • Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK
    Jingchun Yang, Meicheng Liu, Dongdai Lin and Wenhao Wang
  • Key Recovery Attack on McNie based on Low Rank Parity Check Codes and its Reparation
    Terry Shue Chien Lau and Chik How Tan
  • How to Prove KDM Security of BHHO
    Hayato Tada, Akinaga Ueda and Kaoru Kurosawa
  • Detecting Privacy Information Abuse by Android Apps from API Call Logs
    Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi and Hajime Shimada
  • From Identification using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature
    Pauline Bert and Adeline Roux-Langlois
  • Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
    Yasufumi Hashimoto, Yasuhiko Ikematsu and Tsuyoshi Takagi
  • XOR-based Hierarchical Secret Sharing Scheme
    Koji Shima and Hiroshi Doi
  • Verification of LINE Encryption Version 1.0 using ProVerif
    Cheng Shi and Kazuki Yoneyama
  • Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
    Weiyao Wang, Yuntao Wang, Atsushi Takayasu and Tsuyoshi Takagi
  • Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries
    Takamichi Saito, Masahiro Yokoyama, Shota Sugawara and Kuniyasu Suzaki
  • Lightweight Recursive MDS Matrices with Generalized Feistel Network
    Qiuping Li, Baofeng Wu and Zhuojun Liu
  • Is Java Card Ready for Hash-based Signatures?
    Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe and Jan Verschuren
  • Universal Witness Signatures
    Chen Qian, Remi Geraud and Mehdi Tibouchi
  • Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT
    Yu Sasaki
  • Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
    Dominik Klein and Andreas Wiemers

Short Papers

  • How to Solve DLOG Problem with Auxiliary Input
    Akinaga Ueda, Hayato Tada and Kaoru Kurosawa
  • Parameter Trade-Offs for NFS and ECM
    Kazumaro Aoki