http://www.icisc.org/icisc11/asp/03-1-1.html
|
Conference Program | The 14th International Conference on Information Security and Cryptology |
n Wednesday, 30 November, 2011
11:00 – 12:50 | Conference Registration |
12:50 – 13:00 | Welcome Remarks |
Invited Talk (1) -- (Chair : Howon Kim, Pusan National University) | |
13:00 – 14:00 | Recent advances on lightweight cryptography designs Thomas Peyrin(Nanyang Technological University) |
14:00 – 14:15 | Coffee Break |
Session 1 – Hash Function (1) -- (Chair : Dr. Ashish Choudhury, University of Bristol) | |
14:15 – 15:30 | Improved Integral Analysis on Tweaked Lesamnta Kazumaro Aoki and Yu Sasaki |
Analysis of Trivium Using Compressed Right Hand Side Equations Thorsten Schilling and Håvard Raddum | |
Cryptanalysis of Round-Reduced HAS-160 Tomislav Nad, Florian Mendel and Martin Schläffer | |
15:30 – 15:45 | Coffee Break |
Session 2 – Side Channel Analysis (1) -- (Chair : Dr. SeongHan Shin AIST, Japan) | |
15:45 – 17:00 | An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software Daehyun Strobel and Christof Paar |
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks Hailong Zhang, Yongbin Zhou and Dengguo Feng | |
Correcting Errors in Private Keys Obtained from Cold Boot Attacks Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon | |
17:00 – 17:15 | Coffee Break |
Session 3 – Public Key Cryptography -- (Chair : Jeong Hyun Yi, Soongsil University) | |
17:15 – 18:05 | Strong Security Notions for Timed-Release Public-Key Encryption Revisited Kikuchi Ryo, Fujioka Atsushi, Okamoto Yoshiaki and Saito Taiichi |
Fully Secure Unidirectional Identity-Based Proxy Re-encryption Song Luo, Zhong Chen and Qingni Shen | |
Session 4 – Network and Mobile Security -- (Chair : Jeong Hyun Yi, Soongsil University) | |
18:05 – 18:55 | Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng |
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability Kai Chen, Yingjun Zhang and yifeng Lian | |
19:30 – 21:30 | Banquet |
n Thursday, 1 December, 2011
09:00 – 09:10 | Welcome Remarks |
Session 5 – Digital Signature -- (Chair : Dooho Choi, Electronics and Telecommunications Research Institute) | |
09:10 – 10:25 | A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users Keita Emura, Atsuko Miyaji and Kazumasa Omote |
Generic Constructions for Verifiable Signcryption Laila El Aimani | |
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du | |
10:25 – 10:40 | Coffee Break |
Invited Talk (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology) | |
10:40 – 11:40 | Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication Atsuko Miyaji (JAIST) |
Session 6 – Side Channel Analysis (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology) | |
11:40 – 12:30 | Weaknesses in Current RSA Signature Schemes Juliane Kraemer, Dmitry Nedospasov and Jean-Pierre Seifert |
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementation Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen | |
12:30 – 13:40 | Lunch |
Session 7 – Cryptanalysis -- (Chair : Dr. Hyeokchan Kwon, ETRI) | |
13:40 – 15:20 | An Improved Known Plaintext Attack on PKZIP Encryption Algorithm Kyung Chul Jeong, Dong Hoon Lee and Daewan Han |
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit Yi LU, Serge Vaudenay, Meier Willi, Liping Ding and Jianchun Jiang | |
On the Resistance of Boolean Functions against Fast Algebraic Attacks Yusong Du, Fangguo Zhang and Meicheng Liu | |
CCA Secure IB-KEM from Computational Bilinear Diffie-Hellman in the Standard Model Yu Chen, Liqun Chen and Zongyang Zhang | |
15:20 – | Tour |
n Friday, 2 December, 2011
09:25 – 09:35 | Welcome Remarks |
Session 8 – Efficient Implementation -- (Chair : Deukjo Hong, The Attached Institute of ETRI) | |
09:35 – 10:50 | Design, Implementation, and Evaluation of a Vehicular Hardware Security Module Marko Wolf and Timo Gendrullis |
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Lakshmi Kuppusamy, Juanma Gonzalez Nieto, Colin Boyd, Douglas Stebila and JothiRangasamy | |
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering Paolo Palmieri and Olivier Pereira | |
10:50 – 11:05 | Coffee break |
Session 9 – Hash Function (2) -- (Chair : Dr. Keita Emura, JAIST) | |
11:05 – 12:20 | Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing Shoichi Hirose, Hirotaka Yoshida and Hidenori Kuwakado |
Biclique Attack on the Full HIGHT Deukjo Hong, Bonwook Koo and Daesung Kwon | |
Preimage Attacks on Step-Reduced SM3 Hash Function Jian Zou, Le Dong, Bozhan Su, Shuang Wu and Wenling Wu | |
12:20 – 13:30 | Lunch |
Session 10 – Cryptographic Application -- (Chair : Zhong Chen, Peking University) | |
13:30 – 15:10 | Breaking a 3D-based CAPTCHA Scheme Willy Susilo, Vu Duc Nguyen and Yang-Wai Chow |
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control Fangming Zhao, Takashi Nishide and Kouichi Sakurai | |
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes Zhenfei Zhang, Thomas Plantard and Willy Susilo | |
A blind digital image watermarking method based on the dual-tree complex discrete wavelet transform and interval arithmetic Teruya Minamoto and Ryuji Ohura | |
15:10 –15:25 | |
Session 11 – Cryptographic Protocol -- (Chair : Jin Hong, Seoul National University) | |
15:25 – 16:40 | On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks Ashish Choudhury and Arpita Patra |
Two-Party Round-Optimal Session-Policy Attribute-based Authenticated Key Exchange without Random Oracles Kazuki Yoneyama | |
Sufficient Condition for Identity-based Authenticated Key Exchange Resilient to Leakage of Secret Keys Koutarou Suzuki and Fujioka Atsushi | |
16:40 – | Adjourn |