the program of the icisc 2011
来源:互联网 发布:sqlite linux 安装 编辑:程序博客网 时间:2024/06/08 07:16
http://www.icisc.org/icisc11/asp/03-1-1.html
Program
Conference Program
The 14th International Conference on Information Security and Cryptology
n Wednesday, 30 November, 2011
11:00 – 12:50
Conference Registration
12:50 – 13:00
Welcome Remarks
Invited Talk (1) -- (Chair : Howon Kim, Pusan National University)
13:00 – 14:00
Recent advances on lightweight cryptography designs
Thomas Peyrin(Nanyang Technological University)
14:00 – 14:15
Coffee Break
Session 1 – Hash Function (1) -- (Chair : Dr. Ashish Choudhury, University of Bristol)
14:15 – 15:30
Improved Integral Analysis on Tweaked Lesamnta
Kazumaro Aoki and Yu Sasaki
Analysis of Trivium Using Compressed Right Hand Side Equations
Thorsten Schilling and Håvard Raddum
Cryptanalysis of Round-Reduced HAS-160
Tomislav Nad, Florian Mendel and Martin Schläffer
15:30 – 15:45
Coffee Break
Session 2 – Side Channel Analysis (1) -- (Chair : Dr. SeongHan Shin AIST, Japan)
15:45 – 17:00
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
Daehyun Strobel and Christof Paar
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks
Hailong Zhang, Yongbin Zhou and Dengguo Feng
Correcting Errors in Private Keys Obtained from Cold Boot Attacks
Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
17:00 – 17:15
Coffee Break
Session 3 – Public Key Cryptography -- (Chair : Jeong Hyun Yi, Soongsil University)
17:15 – 18:05
Strong Security Notions for Timed-Release Public-Key Encryption Revisited
Kikuchi Ryo, Fujioka Atsushi, Okamoto Yoshiaki and Saito Taiichi
Fully Secure Unidirectional Identity-Based Proxy Re-encryption
Song Luo, Zhong Chen and Qingni Shen
Session 4 – Network and Mobile Security -- (Chair : Jeong Hyun Yi, Soongsil University)
18:05 – 18:55
Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition
Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability
Kai Chen, Yingjun Zhang and yifeng Lian
19:30 – 21:30
Banquet
n Thursday, 1 December, 2011
09:00 – 09:10
Welcome Remarks
Session 5 – Digital Signature -- (Chair : Dooho Choi, Electronics and Telecommunications Research Institute)
09:10 – 10:25
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users
Keita Emura, Atsuko Miyaji and Kazumasa Omote
Generic Constructions for Verifiable Signcryption
Laila El Aimani
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves
Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du
10:25 – 10:40
Coffee Break
Invited Talk (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology)
10:40 – 11:40
Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication
Atsuko Miyaji (JAIST)
Session 6 – Side Channel Analysis (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology)
11:40 – 12:30
Weaknesses in Current RSA Signature Schemes
Juliane Kraemer, Dmitry Nedospasov and Jean-Pierre Seifert
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementation
Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen
12:30 – 13:40
Lunch
Session 7 – Cryptanalysis -- (Chair : Dr. Hyeokchan Kwon, ETRI)
13:40 – 15:20
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm
Kyung Chul Jeong, Dong Hoon Lee and Daewan Han
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
Yi LU, Serge Vaudenay, Meier Willi, Liping Ding and Jianchun Jiang
On the Resistance of Boolean Functions against Fast Algebraic Attacks
Yusong Du, Fangguo Zhang and Meicheng Liu
CCA Secure IB-KEM from Computational Bilinear Diffie-Hellman in the Standard Model
Yu Chen, Liqun Chen and Zongyang Zhang
15:20 –
Tour
n Friday, 2 December, 2011
09:25 – 09:35
Welcome Remarks
Session 8 – Efficient Implementation -- (Chair : Deukjo Hong, The Attached Institute of ETRI)
09:35 – 10:50
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module
Marko Wolf and Timo Gendrullis
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
Lakshmi Kuppusamy, Juanma Gonzalez Nieto, Colin Boyd, Douglas Stebila and JothiRangasamy
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering
Paolo Palmieri and Olivier Pereira
10:50 – 11:05
Coffee break
Session 9 – Hash Function (2) -- (Chair : Dr. Keita Emura, JAIST)
11:05 – 12:20
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing
Shoichi Hirose, Hirotaka Yoshida and Hidenori Kuwakado
Biclique Attack on the Full HIGHT
Deukjo Hong, Bonwook Koo and Daesung Kwon
Preimage Attacks on Step-Reduced SM3 Hash Function
Jian Zou, Le Dong, Bozhan Su, Shuang Wu and Wenling Wu
12:20 – 13:30
Lunch
Session 10 – Cryptographic Application -- (Chair : Zhong Chen, Peking University)
13:30 – 15:10
Breaking a 3D-based CAPTCHA Scheme
Willy Susilo, Vu Duc Nguyen and Yang-Wai Chow
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
Fangming Zhao, Takashi Nishide and Kouichi Sakurai
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes
Zhenfei Zhang, Thomas Plantard and Willy Susilo
A blind digital image watermarking method based on the dual-tree complex discrete wavelet transform and interval arithmetic
Teruya Minamoto and Ryuji Ohura
15:10 –15:25
Coffee Break
Session 11 – Cryptographic Protocol -- (Chair : Jin Hong, Seoul National University)
15:25 – 16:40
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
Ashish Choudhury and Arpita Patra
Two-Party Round-Optimal Session-Policy Attribute-based Authenticated Key Exchange without Random Oracles
Kazuki Yoneyama
Sufficient Condition for Identity-based Authenticated Key Exchange Resilient to Leakage of Secret Keys
Koutarou Suzuki and Fujioka Atsushi
16:40 –
Adjourn
- the program of the icisc 2011
- The principles of program design
- Debugging the release version of a program
- Translation of the OpenOffice 2.0 program software
- the process of developing a program
- The Flow Chart of Running C Program
- The example program of C on point
- The practice program of C on point
- The program of choosing TWO parameters
- The program of choosing THREE parameters
- Think Python:Chapter 1:The way of the program 笔记
- A function to retrieve the directory of a program
- A good program of the greedy snake game.
- Demo version of the real-time face detection program
- Analyzing the heap(s) of a Win32 program
- The Program of Algorithms ------- Diveide and Conquer ---- Merge Sort
- The Program of Algorithms ------- Diveide and Conquer ---- Powering a number
- The Program of Algorithms ------- Diveide and Conquer ---- Fibonacci
- Tomcat 最简单配置 为何那么麻烦,史上最简单的配置
- JQuery操作XML的方法
- BDC 3种方法综述
- aspx文件的样式在IE6显示混乱的三种解决方法
- ajax的自动完成标签(<ajax:autocomplete />)
- the program of the icisc 2011
- Installing GRUB using grub-install
- solr的配置及使用
- 在自己强大之前,不要奢望别人主动帮助你
- Oracle Connect By Prior用法(实现递归查询)
- 变换坐标系的函数——glLoadIdentity()与glTranslatef()和glRotatef()
- 动画效果
- RANK() ,ROW_NUMBER(),DENSE_RANK( ),ntile( )
- 关于库文件