Time Table (Last Update: August 26, 2015)
August 26, 2015
Time | Session |
---|---|
13:00-13:10 | Opening |
13:10-14:10 | Keynote 1 |
14:15-15:10 | Identity-based Encryption |
15:10-15:40 | Coffee Break |
15:40-16:30 | Elliptic Curve Cryptography |
16:30-16:50 | Factoring |
17:30-19:00 | Welcome & Poster Session |
August 27, 2015
Time | Session |
---|---|
09:30-10:30 | Keynote 2 |
10:35-11:30 | Symmetric Cryptanalysis |
11:30-13:00 | Lunch |
13:00-14:15 | Provable Security |
14:15-14:40 | Coffee Break |
14:40-15:30 | LWE-based Encryption |
15:30-18:30 | Excursion |
19:00-21:00 | Banquet |
August 28, 2015
Time | Session |
---|---|
09:30-09:55 | Secret Sharing |
09:55-11:10 | Privacy-Preserving and Anonymity |
11:10-11:35 | Secure Protocol |
11:35-13:00 | Lunch |
13:00-14:10 | Systems Security |
14:10-14:30 | Security in Hardware |
14:30-17:00 | Snacks & CSS/SCIS Invited Session |
17:05 | Adjourn |
Program of IWSEC2015
Keynote 1
13:10-14:10 August 26, 2015
Session Chair: Keisuke Tanaka
-
Cryptographic Protocol is and isn't like LEGO
Shin'ichiro Matsuo
Identity-based Encryption
14:15-15:10 August 26, 2015
Session Chair: Satoshi Obana
-
Identity-based Lossy Encryption from Learning with Errors
Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue and Xiaochao Sun -
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
Jae Hong Seo and Keita Emura
Elliptic Curve Cryptography
15:40-16:30 August 26, 2015
Session Chair: Noboru Kunihiro
-
Invalid Curve Attacks in a GLS Setting
Taechan Kim and Mehdi Tibouchi -
<CANCELED>
New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates
Wei Yu, Kwang Ho Kim and Myong Song Jo
Factoring
16:30-16:50 August 26, 2015
Session Chair: Noboru Kunihiro
-
(short paper) Implicit Factorization of RSA Moduli Revisited
Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang and Jun Xu
Keynote 2
09:30-10:30 August 27, 2015
Session Chair: Yuji Suga
-
Recent Applications of Hellman's Time-Memory Tradeoff
Yu Sasaki
Symmetric Cryptanalysis
10:35-11:30 August 27, 2015
Session Chair: Yosuke Todo
-
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Groestl-256 and Studies
on Several Truncation Patterns for AES-like Compression Functions
Bingke Ma, Bao Li, Ronglin Hao and Xiaoqian Li -
<CANCELED>
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s
Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan and Ling Song
Provable Security
13:00-14:15 August 27, 2015
Session Chair: Mitsugu Iwamoto
-
NM-CPA secure encryption with proofs of plaintext knowledge
Ben Smyth, Yoshikazu Hanatani and Hirofumi Muratani -
Improvement of UC Secure Searchable Symmetric Encryption Scheme
Shunsuke Taketani and Wakaha Ogata -
Fully Leakage-Resilient Non-Malleable Identification Schemes in the Bounded-Retrieval Mode
Tingting Zhang and Hongda Li
LWE-based Encryption
14:40-15:30 August 27, 2015
Session Chair: Takeshi Koshiba
-
LWE-Based FHE with Better Parameters
Fuqun Wang, Kunpeng Wang and Bao Li -
Improved Efficiency of MP12
Fuyang Fang, Bao Li, Xianhui Lu and Xiaochao Sun
Secrect Sharing
09:30-09:55 August 28, 2015
Session Chair: Kazuo Sakiyama
-
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
Hidetaka Hoshino and Satoshi Obana
Privacy-Preserving and Anonymity
09:55-11:10 August 28, 2015
Session Chair: Kazuo Sakiyama
-
k-anonymous Microdata Release via Post Randomisation Method
Dai Ikarashi, Ryo Kikuchi, Koji Chida and Katsumi Takahashi -
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
Tadanori Teruya, Koji Nuida, Kana Shimizu and Goichiro Hanaoka -
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes
Shahidatul Sadiah, Toru Nakanishi and Nobuo Funabiki
Secure Protocol
11:10-11:35 August 28, 2015
Session Chair: Kazuo Sakiyama
-
Secure Multi-Party Computation Using Polarizing Cards
Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto
Systems Security
13:00-14:10 August 28, 2015
Session Chair: Akira Kanaoka
-
An Analysis Platform for the Information Security of In-vehicle Networks Connected with External Networks
Takaya Ezaki, Tomohiro Date and Hiroyuki Inoue -
<CANCELED>
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data
Tong Liu and Yazhe Wang -
(short paper) Artifact-Metric-Based Authentication for Bottles of Wine
Reina Yagasaki and Kazuo Sakiyama
Security in Hardware
14:10-14:30 August 28, 2015
Session Chair: Akira Kanaoka
-
(short paper) Bit Error Probability Evaluation of Ring Oscillator PUF
Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing
CSS/SCIS Invited Session
14:30-17:00 August 28, 2015
Session Chair: Kazuto Ogawa
Asymmetric-key Cryptosystem
-
Deniable Group Signature
Ai Ishida -
Unconditionally Secure Revocable Storage
Yohei Watanabe -
Multi-Party Computation Using Regular Polygon Cards
Kazumasa Shinagawa -
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
Fuyuki Kitagawa -
A Verification of 3-dimensional Lattice Sieve
Kenichiro Hayasaka
Symmetric-key Cryptosystems and Power Analysis
-
Design for Involutive Symmetric-Key Primitive
Yosuke Todo -
Power Analysis Attacks on AES with RSM Countermeasure
Mitsuru Shiozaki (main contributor: Daiki Tsutsumi)
Network and System Security
-
ACODE: Analyzing the Inconsistencies between User Expectations and the Developer Intentions of Mobile Apps
Takuya Watanabe -
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
Fei Feng -
Use-After-Free Prevention Method Using Memory Reuse Prohibited Library
Toshihiro Yamauchi (main contributor: Yuta Ikegami)