Time Table
August 28th, 2019
Time | Session |
---|---|
08:30- | Registration |
09:40-09:50 | Opening |
09:50-10:40 | Public-key Primitives 1 |
10:40-10:50 | Break |
10:50-11:50 | Keynote Talk 1 |
11:50-13:10 | Lunch |
13:10-14:00 | Cryptanalysis on Public-key Primitives |
14:00-14:10 | Break |
14:10-15:00 | Cryptographic Protocols 1 |
15:00-15:25 | Break |
15:25-16:15 | Symmetric-key Primitives |
16:15-16:25 | Break |
16:25-17:15 | Malware Detection and Classification |
17:30-19:30 | Poster Session / Welcome Reception |
August 29th, 2019
Time | Session |
---|---|
09:40-10:30 | Intrusion Detection and Prevention |
10:30-10:50 | Break (with Poster Session) |
10:50-11:50 | Keynote Talk 2 |
11:50-13:10 | Lunch |
13:10-14:00 | Web and Usable Security |
14:00-14:10 | Break |
14:10-15:10 | Invited talk from AIMaP 1 |
15:10-15:35 | Break |
15:35-16:25 | Public-key Primitives 2 |
16:25-16:35 | Break |
16:35-17:25 | Cryptanalysis on Symmetric-key Primitives |
19:00-21:30 | Banquet |
August 30th, 2019
Time | Session |
---|---|
09:30-10:45 | Cryptographic Protocols |
10:45-10:55 | Break |
10:55-11:55 | Invited talk from AIMaP 2 |
11:55-13:15 | Lunch |
13:15-14:05 | Forensics |
14:05-14:15 | Break |
14:15-15:35 | Invited session from SCIS |
15:30-15:50 | Break |
15:50-17:05 | Invited session from CSS |
17:05-17:10 | Closing |
Program
Public-key Primitives 1
09:50-10:40 August 28th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions (Regular)
Toi Tomita, Wakaha Ogata and Kaoru Kurosawa - A Faster Constant-time Algorithm of CSIDH keeping Two Points (Short)
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki and Tsuyoshi Takagi
Keynote 1
10:50-11:50 August 28th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)
Cryptanalysis on Public-key Primitives
13:10-14:00 August 28th, 2019
Session Chair: Atsushi Takayasu (University of Tokyo, Japan)
- An Efficient F4-style Based Algorithm to Solve MQ Problems (Regular)
Takuma Ito, Naoyuki Shinohara and Shigenori Uchiyama - How to Solve Multiple Short-Exponent Discrete Logarithm Problem (Regular)
Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi and Yuusuke Sakagami
Cryptographic Protocols 1
14:10-15:00 August 28th, 2019
Session Chair: Kirill Morozov (University of North Texas, USA)
- Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm (Regular)
David Lucas, Jean-Guillaume Dumas, Pascal Lafourcade, Julio Lopez Fenner, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys - An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations (Regular)
Ryo Okishima and Toru Nakanishi
Symmetric-key Primitives
15:25-16:15 August 28th, 2019
Session Chair: Shoichi Hirose (University of Fukui, Japan)
- More results on Shortest Linear Programs (Regular)
Subhadeep Banik, Takanori Isobe and Yuki Funabiki - Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (Regular)
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe
Malware detection and classification
16:25-17:15 August 28th, 2019
Session Chair: Yuto Otsuki (NTT Security (Japan) KK, Japan)
- Correlating High- and Low-Level Features: Increased Understanding of Malware Classification (Regular)
Sergii Banin and Geir Olav Dyrkolbotn - Towards Efficient Detection of Malicious VBA Macros with LSI (Regular)
Mamoru Mimura and Taro Ohminami
Poster session / Welcome reception
17:30-19:30 August 28th, 2019
The list of posters is available here.Intrusion Detection and Prevention
09:40-10:30 August 29th, 2019
Session Chair: Daiki Chiba (Nippon Telegraph and Telephone Corporation, Japan)
- IDS Alert Priority Determination based on Traffic Behavior (Regular)
Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima and Hiroki Takakura - Effectiveness of Entropy-based Features in High- and Low-Intensity DDoS Attack Detection (Short)
Abigail Koay, Ian Welch and Winston Seah
Keynote 2
10:50-11:50 August 29th, 2019
Session Chair: Takeshi Yagi (NTT Security (Japan) KK, Japan)
- Fighting Malicious Hosting Practices: The Good, the Bad and the Ugly
Prof. Michel van Eeten
Web and Usable Security
13:10-14:00 August 29th, 2019
Session Chair: Akira Kanaoka (Toho University, Japan)
- API Usability of Stateful Signature Schemes (Regular)
Alexander Zeier, Alexander Wiesmaier and Andreas Heinemann - Method for Preventing Suspicious Web Access in Android WebView (Short)
Masaya Sato, Yuta Imamura, Rintaro Orito and Toshihiro Yamauchi
Invited talk from AlMap 1
14:10-15:10 August 29th, 2019
Session Chair: Yoshihiro Mizoguchi (Institute of Mathematics for Industry, Kyusyu University, Japan)
- Mathematics and Cryptography for Society
Dr. Kazue Sako
Public-key Primitives 2
15:35-16:25 August 29th, 2019
Session Chair: Yohei Watanabe (NICT, Japan)
- Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security Notions (Regular)
Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka and Kanta Matsuura - Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short)
Xin Wang, Shimin Li and Rui Xue
Cryptanalysis on Symmetric-key Primitives
16:35-17:25 August 29th, 2019
Session Chair: Kazuhiko Minematsu (NEC, Japan)
- Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm (Regular)
Fukang Liu, Zhenfu Cao and Gaoli Wang - Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods (Regular)
Fukang Liu and Takanori Isobe
Cryptographic Protocols 2
09:30-10:45 August 30th, 2019
Session Chair: Keita Emura (NICT, Japan)
- VSS Made Simpler (Regular)
Yvo Desmedt and Kirill Morozov - Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity (Regular)
F. Betül Durak and Serge Vaudenay - A New Approach to Constructing Digital Signature Schemes (Short)
Risto Laanoja, Ahto Truu, Ahto Buldas, Denis Firsov and Henri Lakk
Invited talk from AlMap 2
10:55-11:55 August 30th, 2019
Session Chair: Yoshihiro Mizoguchi (Institute of Mathematics for Industry, Kyusyu University, Japan)
- Domain Specific Ciphers
Professor Carlos Cid
Forensics
13:15-14:05 August 30th, 2019
Session Chair: Hajime Shimada (Nagoya University, Japan)
- GRYPHON: Drone Forensics in Dataflash and Telemetry Logs (Regular)
Evangelos Mantas and Constantinos Patsakis - Toward the Analysis of Distributed Code Injection in Post-mortem Forensics (Regular)
Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires and Terrence Lillard
Invited session from SCIS
14:15-15:35 August 30th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)
- Cryptanalysis of OCB2 (from SCIS 2019)
Akiko Inoue and Kazuhiko Minematsu - Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem (from SCIS 2019)
Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka - On Augmented Black-Box Construction Based on an Oracle Without Witness Indistinguishability (from SCIS 2019)
Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe - Can the Logistic Regression in Secure Computation Really be Used? (from SCIS 2019)
Ibuki Mishina, Koki Hamada, Ryo Kikuchi, Dai Ikarashi - Topology-Preserving Computation Using a Deck of Cards and Its Application (from SCIS 2019)
Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone - Timing Attacks against Deep Learning for Adversarial Examples (from SCIS 2019)
Tsunato Nakai - A Study on an Efficient Evaluation Method for EM Information Leakage by Changing Display Color (from SCIS 2019)
Ryota Birukawa, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone - Proposal of IoT malware disablement method using dummy C&C server (from SCIS 2019)
Takeshi Misu and Tatsuaki Momoi
Invited session from CSS
15:50-17:05 August 30th, 2019
Session Chair: Shohei Hiruta (NEC Security Research Laboratories, Japan)
- Efficient Threshold Public-Key Encryption from CBDH (from CSS 2018)
Masahiro Ebina, Yohei Watanabe, Junji Shikata - Kernel Memory Inspection Capability for Malicious Kernel Module Detection (from CSS 2018)
Hiroki Kuzuno and Toshihiro Yamauchi - Unknown Family Detection using Adversarial Training (from CSS 2018)
Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Daniel Dalek, Masayuki Murata - Audio Adversarial Example in the Physical World (from CSS 2018)
Hiromu Yakura and Jun Sakuma - Latest Trends in Voice Assistance Systems and Security Research: An Attack on Voice Assistance Systems Using Directional Sound Beams (from CSS 2018)
Ryo Iijima, Syota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori
Accepted Papers
Regular Papers
Track A
-
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations
Ryo Okishima and Toru Nakanishi -
An Efficient F4-style Based Algorithm to Solve MQ Problems
Takuma Ito, Naoyuki Shinohara and Shigenori Uchiyama -
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
F. Betül Durak and Serge Vaudenay -
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions
Toi Tomita, Wakaha Ogata and Kaoru Kurosawa -
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security Notions
Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka and Kanta Matsuura -
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Fukang Liu, Zhenfu Cao and Gaoli Wang -
How to Solve Multiple Short-Exponent Discrete Logarithm Problem
Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi and Yuusuke Sakagami -
More results on Shortest Linear Programs
Subhadeep Banik, Takanori Isobe and Yuki Funabiki -
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe -
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm
David Lucas, Jean-Guillaume Dumas, Pascal Lafourcade, Julio Lopez Fenner, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys -
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe -
VSS Made Simpler
Yvo Desmedt and Kirill Morozov
Track B
-
API Usability of Stateful Signature Schemes
Alexander Zeier, Alexander Wiesmaier and Andreas Heinemann -
Correlating High- and Low-Level Features: Increased Understanding of Malware Classification
Sergii Banin and Geir Olav Dyrkolbotn -
GRYPHON: Drone Forensics in Dataflash and Telemetry Logs
Evangelos Mantas and Constantinos Patsakis -
IDS Alert Priority Determination based on Traffic Behavior
Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima and Hiroki Takakura -
Towards Efficient Detection of Malicious VBA Macros with LSI
Mamoru Mimura and Taro Ohminami -
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics
Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires and Terrence Lillard
Short Papers
Track A
-
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki and Tsuyoshi Takagi -
A New Approach to Constructing Digital Signature Schemes
Risto Laanoja, Ahto Truu, Ahto Buldas, Denis Firsov and Henri Lakk -
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques
Xin Wang, Shimin Li and Rui Xue
Track B
-
Effectiveness of Entropy-based Features in High- and Low-Intensity DDoS Attack Detection
Abigail Koay, Ian Welch and Winston Seah -
Method for Preventing Suspicious Web Access in Android WebView
Masaya Sato, Yuta Imamura, Rintaro Orito and Toshihiro Yamauchi