Program
September 8th, 2021
September 9th, 2021
Time (JST) | Session | Content |
---|---|---|
17:00 | Keynote Talk 2
Session Chair: Toru Nakanishi (Hiroshima University, Japan) |
A journey in vector commitments Prof. Dario Fiore |
18:00 | Break | |
18:10 | Session 4: Machine Learning and Security
Session Chair: Yuji Suga (Internet Initiative Japan Inc., Japan) |
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language |
19:00 | Break | |
19:15 | Session 5: Post-quantum Cryptography (1)
Session Chair: Katsuyuki Takashima (Waseda University, Japan) |
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices FFT Program Generation for Ring LWE-based Cryptography |
20:05 | Session 6: Symmetric-key Cryptography
Session Chair: Kazuhiko Minematsu (NEC, Japan) |
Optimum Attack on 3-Round Feistel-2 Structure |
20:30 | Break | |
20:40 -- 21:30 |
Poster Session |
September 10th, 2021
Time (JST) | Session | Content |
---|---|---|
9:00 | Session 7: Post-quantum Cryptography (2)
Session Chair: Yuichi Komano (Toshiba Corporation, Japan) |
An Intermediate Secret-Guessing Attack on Hash-Based Signatures (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH (Short Paper) Simple Matrix Signature Scheme |
10:15 | Break | |
10:25 | Session 8: Game Theory and Security
Session Chair:Koki Hamada (NTT, Japan) |
Moving Target Defense for Cloud Control Game |
10:50 | Break | |
11:00 | SCIS/CSS Session (Presentation Only)
Session Chair: Noboru Kunihiro (University of Tsukuba, Japan) and Masaya Yasuda (Rikkyo University, Japan) |
Fundamental Study on Forcible EM Information Leakage Caused by Continuous Waves Injection into Electronic Devices Design and Implementation of a Post-Quantum Authenticated Key Exchange Protocol for Signal On Non-interactive Secure Multi-party Computation: New Constructions and Analysis A Study on ASPATH Validation Protocol Based on Aggregate Signatures and Its Experimental Evaluations Proof of Work based Preimage Problem of Variants of SHA-3 with ASIC Resistance Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview |
13:00 -- 13:05 |
Closing |
Accepted Papers
Track A
- #1 "A cryptanalysis of ring-LWE via the trace map"
Yasuhiko Ikematsu, Satoshi Nakamura and Masaya Yasuda - #2 "Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices"
Yasufumi Hashimoto - #8 (Short Paper) "Simple Matrix Signature Scheme"
Changze Yin, Yacheng Wang and Tsuyoshi Takagi - #10 "Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem"
Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo and Tsuyoshi Takagi - #16 "Optimum Attack on 3-Round Feistel-2 Structure"
Takanori Daiza and Kaoru Kurosawa - #20 (Short Paper) "Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH"
Jason LeGrow and Aaron Huchinson - #22 "Evolving Homomorphic Secret Sharing for Hierarchical Access Structures"
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung and Kanta Matsuura - #23 "FFT Program Generation for Ring LWE-based Cryptography"
Masahiro Masuda and Yukiyoshi Kameyama - #35 "An Intermediate Secret-Guessing Attack on Hash-Based Signatures"
Roland Booth, Yanhong Xu, Sabyasachi Karati and Reihaneh Safavi-Naini
Track B
- #14 (Short Paper) "Evidence Collection and Preservation System with Virtual Machine Monitoring" Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto and Toshihiro Yamauchi
- #17 "Moving Target Defense for Cloud Control Game" Koji Hamasaki and Hitoshi Hohjo
- #24 "Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions" Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama and Masayuki Murata
- #27 "KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption" Hiroki Kuzuno and Toshihiro Yamauchi
- #28 "Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language" Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park and Naonobu Okazaki
Accepted Posters
- "Security Risk of Malicious Sites Direction Caused by Misinterpretation of Special Characters in URL" Satoki Tsuji, Hajime Shimada, Yukiko Yamaguchi and Hirokazu Hasegawa
- "Selection of primes in the KLPT algorithm for construction of fast isogeny" Yasushi Takahashi, Yuta Kambe, Masaya Yasuda and Kazuhiro Yokoyama
- "Efficient Verifiable Dynamic Searchable Symmetric Encryption with a Tree-based Index" Kyohei Ozawa, Ryuji Miyoshi and Hiroaki Yamamoto
- "Unsupervised Anomaly Detection for KDD-Cup99 Data Using Self-Organizing Map and Convolutional Encoder" Hiroshi Dozono and Koki Yoshioka
- "Towards Estimating Radio Resources Wasted by IoT Botnet Attacks" Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka
Session Chair: Ryo Nojima (NICT, Japan)
Dr. Takao Murakami
Session Chair: Atsushi Takayasu (NICT, Japan)
A trace map attack against special ring-LWE samples
Yasuhiko Ikematsu, Satoshi Nakamura and Masaya Yasuda
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo and Tsuyoshi Takagi
Session Chair: Akira Yamada (KDDI Research, Inc., Japan)
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption
Hiroki Kuzuno and Toshihiro Yamauchi
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring
Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto and Toshihiro Yamauchi
Session Chair: Chen-Mou Cheng (Kanazawa University, Japan)
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung and Kanta Matsuura
--
21:30