the program of the icisc 2011

来源:互联网 发布:sqlite linux 安装 编辑:程序博客网 时间:2024/06/08 07:16


http://www.icisc.org/icisc11/asp/03-1-1.html

Program

Conference Program

The 14th International Conference on Information Security and Cryptology

n  Wednesday, 30 November, 2011

11:00 – 12:50

Conference Registration

12:50 – 13:00

Welcome Remarks

Invited Talk (1) -- (Chair : Howon Kim, Pusan National University)

13:00 – 14:00

Recent advances on lightweight cryptography designs

Thomas Peyrin(Nanyang Technological University)

14:00 – 14:15

Coffee Break

Session 1 – Hash Function (1) -- (Chair : Dr. Ashish Choudhury, University of Bristol)

14:15 – 15:30

Improved Integral Analysis on Tweaked Lesamnta

Kazumaro Aoki and Yu Sasaki

Analysis of Trivium Using Compressed Right Hand Side Equations

Thorsten Schilling and Håvard Raddum

Cryptanalysis of Round-Reduced HAS-160

Tomislav Nad, Florian Mendel and Martin Schläffer

15:30 – 15:45

Coffee Break

Session 2 – Side Channel Analysis (1) -- (Chair : Dr. SeongHan Shin AIST, Japan)

15:45 – 17:00

An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software

Daehyun Strobel and Christof Paar

An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks

Hailong Zhang, Yongbin Zhou and Dengguo Feng

Correcting Errors in Private Keys Obtained from Cold Boot Attacks

Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon

17:00 – 17:15

Coffee Break

Session 3 – Public Key Cryptography -- (Chair : Jeong Hyun Yi, Soongsil University)

17:15 – 18:05

Strong Security Notions for Timed-Release Public-Key Encryption Revisited

Kikuchi Ryo, Fujioka Atsushi, Okamoto Yoshiaki and Saito Taiichi

Fully Secure Unidirectional Identity-Based Proxy Re-encryption

Song Luo, Zhong Chen and Qingni Shen

Session 4 – Network and Mobile Security -- (Chair : Jeong Hyun Yi, Soongsil University)

18:05 – 18:55

Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition

Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng

AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability

Kai Chen, Yingjun Zhang and yifeng Lian

19:30 – 21:30

Banquet

 

n  Thursday, 1 December, 2011

09:00 – 09:10

Welcome Remarks

Session 5 – Digital Signature -- (Chair : Dooho Choi, Electronics and Telecommunications Research Institute)

09:10 – 10:25

A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users

Keita Emura, Atsuko Miyaji and Kazumasa Omote

Generic Constructions for Verifiable Signcryption

Laila El Aimani

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves

Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du

10:25 – 10:40

Coffee Break

Invited Talk (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology)

10:40 – 11:40

Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication

Atsuko Miyaji (JAIST)

Session 6 – Side Channel Analysis (2) -- (Chair : Pil Joong Lee, Pohang University of Science and Technology)

11:40 – 12:30

Weaknesses in Current RSA Signature Schemes

Juliane Kraemer, Dmitry Nedospasov and Jean-Pierre Seifert

Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementation

Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen

12:30 – 13:40

Lunch

Session 7 – Cryptanalysis -- (Chair : Dr. Hyeokchan Kwon, ETRI)

13:40 – 15:20

An Improved Known Plaintext Attack on PKZIP Encryption Algorithm

Kyung Chul Jeong, Dong Hoon Lee and Daewan Han

Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit

Yi LU, Serge Vaudenay, Meier Willi, Liping Ding and Jianchun Jiang

On the Resistance of Boolean Functions against Fast Algebraic Attacks

Yusong Du, Fangguo Zhang and Meicheng Liu

CCA Secure IB-KEM from Computational Bilinear Diffie-Hellman in the Standard Model

Yu Chen, Liqun Chen and Zongyang Zhang

15:20 –

Tour

 

n  Friday, 2 December, 2011

09:25 – 09:35

Welcome Remarks

Session 8 – Efficient Implementation -- (Chair : Deukjo Hong, The Attached Institute of ETRI)

09:35 – 10:50

Design, Implementation, and Evaluation of a Vehicular Hardware Security Module

Marko Wolf and Timo Gendrullis

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection

Lakshmi Kuppusamy, Juanma Gonzalez Nieto, Colin Boyd, Douglas Stebila and JothiRangasamy

Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

Paolo Palmieri and Olivier Pereira

10:50 – 11:05

Coffee break

Session 9 – Hash Function (2) -- (Chair : Dr. Keita Emura, JAIST)

11:05 – 12:20

Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing

Shoichi Hirose, Hirotaka Yoshida and Hidenori Kuwakado

Biclique Attack on the Full HIGHT

Deukjo Hong, Bonwook Koo and Daesung Kwon

Preimage Attacks on Step-Reduced SM3 Hash Function

Jian Zou, Le Dong, Bozhan Su, Shuang Wu and Wenling Wu

12:20 – 13:30

Lunch

Session 10 – Cryptographic Application -- (Chair : Zhong Chen, Peking University)

13:30 – 15:10

Breaking a 3D-based CAPTCHA Scheme

Willy Susilo, Vu Duc Nguyen and Yang-Wai Chow

Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control

Fangming Zhao, Takashi Nishide and Kouichi Sakurai

Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes

Zhenfei Zhang, Thomas Plantard and Willy Susilo

A blind digital image watermarking method based on the dual-tree complex discrete wavelet transform and interval arithmetic

Teruya Minamoto and Ryuji Ohura

15:10 –15:25

Coffee Break

Session 11 – Cryptographic Protocol -- (Chair : Jin Hong, Seoul National University)

15:25 – 16:40

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks

Ashish Choudhury and Arpita Patra

Two-Party Round-Optimal Session-Policy Attribute-based Authenticated Key Exchange without Random Oracles

Kazuki Yoneyama

Sufficient Condition for Identity-based Authenticated Key Exchange Resilient to Leakage of Secret Keys

Koutarou Suzuki and Fujioka Atsushi

16:40 –

Adjourn