All times in this program are in JST time zone (UTC+9).
Poster Session is held on Slack.
Time Table
September 2nd, 2020
Time | Session |
---|---|
15:45-15:55 | Opening Remarks |
15:55-16:45 | Symmetric-Key 1 |
16:45-17:05 | Break |
17:05-17:55 | Malicious Activity Detection 1 |
17:55-18:25 | Break |
18:25-18:50 | Multiparty Computation |
September 3rd, 2020
Time | Session |
---|---|
15:30-16:20 | Malicious Activity Detection 2 |
16:20-16:50 | Break |
16:50-17:40 | Post Quantum |
17:40-18:10 | Break |
18:10-19:00 | Symmetric-Key 2 |
September 4th, 2020
Time | Session |
---|---|
15:45-16:35 | Privacy |
16:35-17:05 | Break |
17:05-17:55 | Pairing-Based Cryptography |
17:55-18:25 | Break |
18:25-18:50 | Machine Learning |
18:50- | Closing Remarks |
Program
Symmetric-Key 1
15:55-16:45 September 2nd, 2020
Session Chair: Serge Vaudenay (EPFL, Switzerland)
- On the design of Bit Permutation Based Ciphers
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim - Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol
Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara
Malicious Activity Detection 1
17:05-17:55 September 2nd, 2020
Session Chair: Toshihiro Yamauchi (Okayama University, Japan)
- Detection of Malicious PowerShell Using Word-Level Language Models
Yui Tajiri, Mamoru Mimura - Detection of running malware before it becomes malicious
Sergii Banin, Geir Olav Dyrkolbotn
Multiparty Computation
18:25-18:50 September 2nd, 2020
Session Chair: Toru Nakanishi (Hiroshima University, Japan)
- Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing
Kota Sasaki, Koji Nuida
Malicious Activity Detection 2
15:30-16:20 September 3rd, 2020
Session Chair: Mamoru Mimura (National Defense Academy, Japan)
- MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption
Hiroki Kuzuno, Toshihiro Yamauchi - (Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara, Tatsuya Onuma, Yang Li
Post Quantum
16:50-17:40 September 3rd, 2020
Session Chair: Noboru Kunihiro (University of Tsukuba, Japan)
- On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki, Tsuyoshi Takagi - Optimization of Search Space for Finding Very Short Lattice Vectors
Yoshitatsu Matsuda
Symmetric-Key 2
18:10-19:00 September 3rd, 2020
Session Chair: Takeshi Sugawara (The University of Electro-Communications, Japan)
- Sublinear Bounds on the Distinguishing Advantage for Multiple Samples
Serge Fehr, Serge Vaudenay - Symmetric Asynchronous Ratcheted Communication with Associated Data
Hailun Yan, Serge Vaudenay
Privacy
15:45-16:35 September 4th, 2020
Session Chair: Yuji Suga (Internet Initiative Japan Inc., Japan)
- On Limitation of Plausible Deniability
Atsushi Waseda, Ryo Nojima - Model extraction oriented data publishing with k-anonymity
Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada
Pairing-Based Cryptography
17:05-17:55 September 4th, 2020
Session Chair: Yuichi Komano (Toshiba Corporation, Japan)
- Efficient Forward-Secure Threshold Signatures
Rafael Kurek - Accelerating beta Weil pairing with precomputation and multi-pairing techniques
Kai Kinoshita, Koutarou Suzuki
Machine Learning
18:25-18:50 September 4th, 2020
Session Chair: Akira Kanaoka (Toho University, Japan)
- Timing Attack on Random Forests for Generating Adversarial Examples
Yuichiro DAN, Toshiki SHIBAHARA, Junko TAKAHASHI
Accepted Papers
Track A
- Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol
Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara - On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki, Tsuyoshi Takagi - Efficient Forward-Secure Threshold Signatures
Rafael Kurek - Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing
Kota Sasaki, Koji Nuida - Symmetric Asynchronous Ratcheted Communication with Associated Data
Hailun Yan, Serge Vaudenay - On the design of Bit Permutation Based Ciphers
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim - Accelerating beta Weil pairing with precomputation and multi-pairing techniques
Kai Kinoshita, Koutarou Suzuki - Sublinear Bounds on the Distinguishing Advantage for Multiple Samples
Serge Fehr, Serge Vaudenay - Optimization of Search Space for Finding Very Short Lattice Vectors
Yoshitatsu Matsuda
Track B
- (Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara, Tatsuya Onuma, Yang Li - Timing Attack on Random Forests for Generating Adversarial Examples
Yuichiro DAN, Toshiki SHIBAHARA, Junko TAKAHASHI - Detection of Malicious PowerShell Using Word-Level Language Models
Yui Tajiri, Mamoru Mimura - On Limitation of Plausible Deniability
Atsushi Waseda, Ryo Nojima - MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption
Hiroki Kuzuno, Toshihiro Yamauchi - Model extraction oriented data publishing with k-anonymity
Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada - Detection of running malware before it becomes malicious
Sergii Banin, Geir Olav Dyrkolbotn