Time Table
November 8, 2011
Time | Session |
---|---|
13:30–13:40 | Opening |
13:40–14:40 | Invited Talk 1 |
14:40–15:05 | Break |
15:05–15:55 | Session 1: Software Protection and Reliability (2 talks) |
15:55–16:45 | Session 2: Cryptographic Protocol (2 talks) |
November 9, 2011
Time | Session | |
---|---|---|
10:00–10:50 | Session 3: Pairing and Identity Based Signature (2 talks) | |
10:50–11:15 | Break | |
11:15–12:30 | Session 4: Malware Detection (3 talks) | |
12:30–14:00 | Lunch Break | |
14:00–15:15 | Session 5: Mathematical and Symmetric Cryptography (3 talks) | |
15:15–15:40 | Break | |
15:40–17:40 | Poster Session | |
18:00–20:00 | Banquet |
November 10, 2011
Time | Session | |
---|---|---|
10:00–11:00 | Invited Talk 2 | |
11:00–11:25 | Break | |
11:25–12:15 | Session 6: Public Key Encryption (2 talks) | |
12:15–12:25 | Closing |
Program of IWSEC2011
Invited Talk 1
13:40-14:40 November 8, 2011
Session Chair: Tetsu Iwata
- Linear Cryptanalysis: History and Open Problems
Mitsuru Matsui
Session 1: Software Protection and Reliability (2 talks)
15:05-15:55 November 8, 2011
Session Chair: Toshihiro Yamauchi
- A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes
Minoru Kuribayashi - REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
Georgios Portokalidis and Angelos D. Keromytis
Session 2: Cryptographic Protocol (2 talks)
15:55-16:45 November 8, 2011
Session Chair: Goichiro Hanaoka
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
Atsushi Fujioka - A Secure M + 1st Price Auction Protocol based on Bit Slice Circuits
Takuho Mitsunaga, Yoshifumi Manabe, and Tatsuaki Okamoto
Session 3: Pairing and Identity Based Signature (2 talks)
10:00-10:50 November 9, 2011
Session Chair: Noboru Kunihiro
- Cryptographic Pairings Based on Elliptic Nets
Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, and Eiji Okamoto - Identity Based Deterministic Signature Scheme Without Forking-Lemma
S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan
Session 4: Malware Detection (3 talks)
11:15-12:30 November 9, 2011
Session Chair: Yutaka Miyake
- Nitro: Hardware-based System Call Tracing for Virtual Machines
Jonas Pfoh, Christian Schneider, and Claudia Eckert - Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis - An Entropy based approach for DDoS attack detection in IEEE 802.16 based networks
Maryam Shojaei, Naser Movahedinia, and Behrouz Tork Ladani
Session 5: Mathematical and Symmetric Cryptography (3 talks)
14:00-15:15 November 9, 2011
Session Chair: Shiho Moriai
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, and Yasuhide Numata - A Theoretical Analysis of the Structure of HC-128
Goutam Paul, Subhamoy Maitra, and Shashwat Raizada - Experimental Verification of Super-Sbox Analysis --- Confirmation of Detailed Attack Complexity
Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta
Invited Talk 2
10:00-11:00 November 10, 2011
Session Chair: Masakatsu Nishigaki
- Palm Vein Authentication Technology and its Application Systems
Takashi Shinzaki
Session 6: Public Key Encryption (2 talks)
11:25-12:15 November 10, 2011
Session Chair: Katsuyuki Takashima
- Towards Restricting Plaintext Space in Public Key Encryption
Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote
- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, and Koji Okada