IWSEC 2020

September 2 (Wed) - 4 (Fri), 2020
ONLINE

All times in this program are in JST time zone (UTC+9).
Poster Session is held on Slack.

Time Table

September 2nd, 2020

Time Session
15:45-15:55 Opening Remarks
15:55-16:45 Symmetric-Key 1
16:45-17:05 Break
17:05-17:55 Malicious Activity Detection 1
17:55-18:25 Break
18:25-18:50 Multiparty Computation

September 3rd, 2020

Time Session
15:30-16:20 Malicious Activity Detection 2
16:20-16:50 Break
16:50-17:40 Post Quantum
17:40-18:10 Break
18:10-19:00 Symmetric-Key 2

September 4th, 2020

Time Session
15:45-16:35 Privacy
16:35-17:05 Break
17:05-17:55 Pairing-Based Cryptography
17:55-18:25 Break
18:25-18:50 Machine Learning
18:50- Closing Remarks

Program

Symmetric-Key 1

15:55-16:45 September 2nd, 2020
Session Chair: Serge Vaudenay (EPFL, Switzerland)

  • On the design of Bit Permutation Based Ciphers
    Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
  • Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol
    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

Malicious Activity Detection 1

17:05-17:55 September 2nd, 2020
Session Chair: Toshihiro Yamauchi (Okayama University, Japan)

  • Detection of Malicious PowerShell Using Word-Level Language Models
    Yui Tajiri, Mamoru Mimura
  • Detection of running malware before it becomes malicious
    Sergii Banin, Geir Olav Dyrkolbotn

Multiparty Computation

18:25-18:50 September 2nd, 2020
Session Chair: Toru Nakanishi (Hiroshima University, Japan)

  • Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing
    Kota Sasaki, Koji Nuida

Malicious Activity Detection 2

15:30-16:20 September 3rd, 2020
Session Chair: Mamoru Mimura (National Defense Academy, Japan)

  • MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption
    Hiroki Kuzuno, Toshihiro Yamauchi
  • (Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
    Takeshi Sugawara, Tatsuya Onuma, Yang Li

Post Quantum

16:50-17:40 September 3rd, 2020
Session Chair: Noboru Kunihiro (University of Tsukuba, Japan)

  • On collisions related to an ideal class of order 3 in CSIDH
    Hiroshi Onuki, Tsuyoshi Takagi
  • Optimization of Search Space for Finding Very Short Lattice Vectors
    Yoshitatsu Matsuda

Symmetric-Key 2

18:10-19:00 September 3rd, 2020
Session Chair: Takeshi Sugawara (The University of Electro-Communications, Japan)

  • Sublinear Bounds on the Distinguishing Advantage for Multiple Samples
    Serge Fehr, Serge Vaudenay
  • Symmetric Asynchronous Ratcheted Communication with Associated Data
    Hailun Yan, Serge Vaudenay

Privacy

15:45-16:35 September 4th, 2020
Session Chair: Yuji Suga (Internet Initiative Japan Inc., Japan)

  • On Limitation of Plausible Deniability
    Atsushi Waseda, Ryo Nojima
  • Model extraction oriented data publishing with k-anonymity
    Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada

Pairing-Based Cryptography

17:05-17:55 September 4th, 2020
Session Chair: Yuichi Komano (Toshiba Corporation, Japan)

  • Efficient Forward-Secure Threshold Signatures
    Rafael Kurek
  • Accelerating beta Weil pairing with precomputation and multi-pairing techniques
    Kai Kinoshita, Koutarou Suzuki

Machine Learning

18:25-18:50 September 4th, 2020
Session Chair: Akira Kanaoka (Toho University, Japan)

  • Timing Attack on Random Forests for Generating Adversarial Examples
    Yuichiro DAN, Toshiki SHIBAHARA, Junko TAKAHASHI

Accepted Papers

Track A

  • Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol
    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara
  • On collisions related to an ideal class of order 3 in CSIDH
    Hiroshi Onuki, Tsuyoshi Takagi
  • Efficient Forward-Secure Threshold Signatures
    Rafael Kurek
  • Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing
    Kota Sasaki, Koji Nuida
  • Symmetric Asynchronous Ratcheted Communication with Associated Data
    Hailun Yan, Serge Vaudenay
  • On the design of Bit Permutation Based Ciphers
    Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
  • Accelerating beta Weil pairing with precomputation and multi-pairing techniques
    Kai Kinoshita, Koutarou Suzuki
  • Sublinear Bounds on the Distinguishing Advantage for Multiple Samples
    Serge Fehr, Serge Vaudenay
  • Optimization of Search Space for Finding Very Short Lattice Vectors
    Yoshitatsu Matsuda

Track B

  • (Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
    Takeshi Sugawara, Tatsuya Onuma, Yang Li
  • Timing Attack on Random Forests for Generating Adversarial Examples
    Yuichiro DAN, Toshiki SHIBAHARA, Junko TAKAHASHI
  • Detection of Malicious PowerShell Using Word-Level Language Models
    Yui Tajiri, Mamoru Mimura
  • On Limitation of Plausible Deniability
    Atsushi Waseda, Ryo Nojima
  • MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption
    Hiroki Kuzuno, Toshihiro Yamauchi
  • Model extraction oriented data publishing with k-anonymity
    Takeru Fukuoka, Yuji Yamaoka, Takeaki Terada
  • Detection of running malware before it becomes malicious
    Sergii Banin, Geir Olav Dyrkolbotn