Time Table

November 7, 2012

Time Session
10:00–12:00 Malware-Analysis Competition (Technical Session)
13:30–13:40 General Opening
13:40–14:40 Invited Talk 1 (Chair: Goichiro Hanaoka)
14:40–15:05 Break
15:05–16:45 Session 1: Implementation (4 talks) (Chair: Akinori Kawachi)

November 8, 2012

Time Session
9:30–11:10 Session 2: Encryption and Key Exchange (4 talks) (Chair: Tsuyoshi Takagi)
11:10–11:30 Break
11:30–12:30 Invited Talk 2 (Chair: Toshihiro Yamauchi)
12:30–13:50 Lunch Break
13:50–14:50 Invited Talk 3 (Chair: Kazuo Sakiyama)
14:50–15:50 Malware-Analysis Competition (Presentation Session) (Chair: Kanta Matsuura)
15:50–16:10 Break
16:10–18:10 Poster Session
19:00–21:00 Banquet

November 9, 2012

Program of IWSEC2012

Invited Talk 1

13:40-14:40 November 7, 2012

Session Chair: Goichiro Hanaoka

Session 1: Implementation (4 talks)

15:05-16:45 November 7, 2012

Session Chair: Akinori Kawachi

  • Model-based Conformance Testing for Android
    Yiming Jing, Gail-Joon Ahn, and Hongxin Hu
  • Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography
    Takanori Yasuda, Tsuyoshi Takagi, and Kouichi Sakurai
  • Standardized Signature Algorithms on Ultra-Constrained 4-bit MCU
    Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, and Sirote Saetang
  • Very Short Critical Path Implementation of AES with Direct Logic Gates
    Kenta Nekado, Yasuyuki Nogami, and Kengo Iokibe

Session 2: Encryption and Key Exchange (4 talks)

9:30-11:10 November 8, 2012

Session Chair: Tsuyoshi Takagi

  • One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
    Kazuki Yoneyama
  • Compact Stateful Encryption Schemes With Ciphertext Verifiability
    S. Sree Vivek, S. Sharmila Deva Selvi, and C. Pandu Rangan
  • Structured Encryption for Conceptual Graphs
    Geong Sen Poh, Moesfa Soeheila Mohamad, and Muhammad Reza Z’Aba
  • Symmetric-Key Encryption Scheme with Multi-Ciphertext Non-malleability
    Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka

Invited Talk 2

11:30-12:30 November 8, 2012

Session Chair: Toshihiro Yamauchi

Invited Talk 3

13:50-14:50 November 8, 2012

Session Chair: Kazuo Sakiyama

  • Recent Topics on Functional Encryption
    Katsuyuki Takashima
    [Abstract]

Banquet

19:00?21:00 November 8, 2012

Place: VEGA room, the third floor, Hilton Fukuoka SeaHawk

900m walking along the river in front of the workshop venue. You can find a detailed map in the program information leaflet.

[Third Floor Map of Hilton Fukuoka SeaHawk]

Invited Talk 4

10:00-11:10 November 9, 2012

Session Chair: Toshihiro Yamauchi

Session 3: Cryptanalysis (1) (2 talks)

11:10-12:00 November 9, 2012

Session Chair: Noboru Kunihiro

  • Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
    Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii
  • Boomerang Distinguishers for Full HAS-160 Compression Function
    Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta

Session 4: Cryptanalysis (2) (2 talks)

13:25-14:15 November 9, 2012

Session Chair: Takashi Nishide

  • Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-based Hash Function
    Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta
  • Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
    Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, and Pierre-Alain Fouque
  • Annihilators of Fast Discrete Fourier Spectra Attacks
    Jingjing Wang, Kefei Chen, and Shixiong Zhu
  • Canceled

Session 5: Secure Protocols (3 talks)

14:40-15:55 November 9, 2012

Session Chair: Kazuki Yoneyama

  • Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security
    Susumu Kiyoshima, Yoshifumi Manabe, and Tatsuaki Okamoto
  • Efficient Secure Primitive for Privacy Preserving Distributed Computations
    Youwen Zhu, Tsuyoshi Takagi, and Liusheng Huang
  • Generic Construction of GUC Secure Commitment in the KRK Model
    Itsuki Suzuki, Maki Yoshida, and Toru Fujiwara