Co-organized by IEICE & IPSJ

Time Table

October 28 (Wed) , 2009

Time Session
13:00–13:15 Opening
13:15–14:15 Invited Talk 1
14:15–14:30 Coffee break
14:30–15:45 Block Cipher
15:45– Excursion

October 29 (Thu), 2009

Time Session
09:00–10:40 Cryptographic Protocols
10:40–11:00 Coffee break
11:00–12:00 Invited Talk 2
12:00–13:10 Lunch
13:10–14:25 Contents Protection and Intrusion Detection
14:25–15:40 Authentication
15:40–16:00 Coffee break
16:00–17:30 Panel Discussion
17:30– Banquet

October 30 (Fri), 2009

Time Session
09:15–10:15 Short Papers I
10:15–10:35 Coffee Break
10:35–11:35 Short Papers II
11:35– Closing

Program of IWSEC2009

Invited Talk 1

13:15-14:15 October 28 (Wed), 2009

Session Chair: Yuko Murayama

  • The Psychology of Security
    Bruce Schneier

Session 1: Block Cipher

14:30-15:45 October 28 (Wed), 2009

Session Chair: Christian Rechberger

  • Bit-Free Collision: Application to APOP Attack
    Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta
  • Impossible Boomerang Attack for Block Cipher Structures
    Jiali Choy and Huihui Yap
  • Improved Distinguishing Attacks on HC-256
    Gautham Sekar and Bart Preneel

Session 2: Cryptographic Protocols

09:00-10:40 October 29 (Thu), 2009

Session Chair: Keisuke Tanaka

  • A Generic Construction of Timed-Release Encryption with Pre-open Capability
    Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, and Kanta Matsuura
  • An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, and Chandrasekaran Pandu Rangan
  • Universal Designated Verifier Signatures with Threshold-Signers
    Pairat Thorncharoensri, Willy Susilo, and Yi Mu
  • Reducing Complexity Assumptions for Oblivious Transfer
    K.Y. Cheong and Takeshi Koshiba

Invited Talk 2

11:00-12:00 October 29 (Thu), 2009

Session Chair: Kazuo Takaragi

  • The Future of Cryptographic Algorithms
    Bart Preneel

Session 3: Contents Protection and Intrusion Detection

13:10-14:25 October 29 (Thu), 2009

Session Chair: Masakatsu Nishigaki

  • Tamper-Tolerant Software: Modeling and Implementation
    Mariusz H. Jakubowski, Chit Wei (Nick) Saw, and Ramarathnam Venkatesan
  • An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation,
    Koji Nuida
  • Efficient Intrusion Detection Based on Static Analysis and Stack Walks
    Jingyu Hua, Mingchu Li, Kouichi Sakurai, and Yizhi Ren

Session 4: Authentication

14:25-15:40 October 29 (Thu), 2009

Session Chair: Pandu C. Rangan

  • Strongly Secure Authenticated Key Exchange without NAXOS' Approach
    Minkyu Kim, Atsushi Fujioka, and Berkant Ustaoglu
  • ID-Based Group Password-Authenticated Key Exchange
    Xun Yi, Raylin Tso, and Eiji Okamoto
  • A Proposal of Efficient Remote Biometric Authentication Protocol
    Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, and Masakatsu Nishigaki

Panel Discussion

16:00-17:30 October 29 (Thu), 2009

Session Chair: Bart Preneel

  • Cryptographic hash functions: SHA-3 and beyond
    William Burr, Bart Preneel, Christian Rechberger, Bruce Schneier, Dai Watanabe

Session 5: Short Papers I

9:15-10:15 October 30 (Fri), 2009

Session Chair: Kazukuni Kobara

  • Key Generation for Fast Inversion of the Paillier Encryption Function
    Takato Hirano and Keisuke Tanaka
  • Security Analysis of Three Provably Secure ID-based Signcryption Schemes
    Chik How Tan
  • How to Implement Furukawa-Imai Group Signature Scheme with Barreto-Naehrig Curve
    S. Takeuchi, Y. Sakemi, T. Okimoto, Y. Nogami, T. Nakanishi, J. Furukawa, and K. Sako

Session 6: Short Papers II

10:35-11:35 October 30 (Fri), 2009

Session Chair: Xun Yi

  • A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity
    Keita Emura, Atsuko Miyaji, Kazumasa Omote
  • An Adaptation of Proxy Signature for Secure and Serverless Authentication in 3GPP Release 8 Networks
    Chan-Kyu Han, Hyoung-Kee Choi
  • A Formal Approach to Interoperability between Licenses for Content Protection
    Kunihiko Fujita, Hiroki Endo, Yasuyuki Tsukada