Time Table
November 7, 2012
Time | Session |
---|---|
10:00–12:00 | Malware-Analysis Competition (Technical Session) |
13:30–13:40 | General Opening |
13:40–14:40 | Invited Talk 1 (Chair: Goichiro Hanaoka) |
14:40–15:05 | Break |
15:05–16:45 | Session 1: Implementation (4 talks) (Chair: Akinori Kawachi) |
November 8, 2012
Time | Session | |
---|---|---|
9:30–11:10 | Session 2: Encryption and Key Exchange (4 talks) (Chair: Tsuyoshi Takagi) | |
11:10–11:30 | Break | |
11:30–12:30 | Invited Talk 2 (Chair: Toshihiro Yamauchi) | |
12:30–13:50 | Lunch Break | |
13:50–14:50 | Invited Talk 3 (Chair: Kazuo Sakiyama) | |
14:50–15:50 | Malware-Analysis Competition (Presentation Session) (Chair: Kanta Matsuura) | |
15:50–16:10 | Break | |
16:10–18:10 | Poster Session | |
19:00–21:00 | Banquet |
November 9, 2012
Time | Session | |
---|---|---|
10:00–11:10 | Invited Talk 4 (Chair: Toshihiro Yamauchi) | |
11:10–12:00 | Session 3: Cryptanalysis (1) (2 talks) (Chair: Noboru Kunihiro) | |
12:00–13:25 | Lunch Break | |
13:25–14:15 | Session 4: Cryptanalysis (2) (2 talks) (Chair: Takashi Nishide) | |
14:15–14:40 | Break | |
14:40–15:55 | Session 5: Secure Protocols (3 talks) (Chair: Kazuki Yoneyama) | |
15:55– | Closing |
Program of IWSEC2012
Invited Talk 1
13:40-14:40 November 7, 2012
Session Chair: Goichiro Hanaoka
- Ron was wrong, Whit is right
James Hughes
[Abstract] [Paper] [Slides]
Session 1: Implementation (4 talks)
15:05-16:45 November 7, 2012
Session Chair: Akinori Kawachi
- Model-based Conformance Testing for Android
Yiming Jing, Gail-Joon Ahn, and Hongxin Hu - Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography
Takanori Yasuda, Tsuyoshi Takagi, and Kouichi Sakurai - Standardized Signature Algorithms on Ultra-Constrained 4-bit MCU
Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, and Sirote Saetang - Very Short Critical Path Implementation of AES with Direct Logic Gates
Kenta Nekado, Yasuyuki Nogami, and Kengo Iokibe
Session 2: Encryption and Key Exchange (4 talks)
9:30-11:10 November 8, 2012
Session Chair: Tsuyoshi Takagi
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
Kazuki Yoneyama - Compact Stateful Encryption Schemes With Ciphertext Verifiability
S. Sree Vivek, S. Sharmila Deva Selvi, and C. Pandu Rangan - Structured Encryption for Conceptual Graphs
Geong Sen Poh, Moesfa Soeheila Mohamad, and Muhammad Reza Z’Aba - Symmetric-Key Encryption Scheme with Multi-Ciphertext Non-malleability
Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka
Invited Talk 2
11:30-12:30 November 8, 2012
Session Chair: Toshihiro Yamauchi
- The Insider Problem, Inside Out
Matt Bishop
[Abstract]
Invited Talk 3
13:50-14:50 November 8, 2012
Session Chair: Kazuo Sakiyama
- Recent Topics on Functional Encryption
Katsuyuki Takashima
[Abstract]
Banquet
19:00?21:00 November 8, 2012
Place: VEGA room, the third floor, Hilton Fukuoka SeaHawk
900m walking along the river in front of the workshop venue. You can find a detailed map in the program information leaflet.
Invited Talk 4
10:00-11:10 November 9, 2012
Session Chair: Toshihiro Yamauchi
- Challenges for making scalable security management for information and communication infrastructure
Suguru Yamaguchi
[Abstract]
Session 3: Cryptanalysis (1) (2 talks)
11:10-12:00 November 9, 2012
Session Chair: Noboru Kunihiro
- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii - Boomerang Distinguishers for Full HAS-160 Compression Function
Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta
Session 4: Cryptanalysis (2) (2 talks)
13:25-14:15 November 9, 2012
Session Chair: Takashi Nishide
- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-based Hash Function
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta - Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, and Pierre-Alain Fouque - Annihilators of Fast Discrete Fourier Spectra Attacks
Jingjing Wang, Kefei Chen, and Shixiong Zhu
Session 5: Secure Protocols (3 talks)
14:40-15:55 November 9, 2012
Session Chair: Kazuki Yoneyama
- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security
Susumu Kiyoshima, Yoshifumi Manabe, and Tatsuaki Okamoto - Efficient Secure Primitive for Privacy Preserving Distributed Computations
Youwen Zhu, Tsuyoshi Takagi, and Liusheng Huang - Generic Construction of GUC Secure Commitment in the KRK Model
Itsuki Suzuki, Maki Yoshida, and Toru Fujiwara