December 12, 2009 | |
---|---|
9:20 – 10:00 | Registration |
10:00 – 10:10 | Welcoming Remarks |
Session 1 – Cryptographic Protocol and Schemes; Chair: Mark Manulis | |
10:10 – 10:35 | Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima |
Vladimir Kolesnikov, Ahmad-Reza Sadeghi and Thomas Schneider | |
10:35 – 11:00 | Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security |
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary and Pandu Rangan C | |
11:00 – 11:25 | On Cryptographic Schemes Based on Discrete Logarithms and Factoring |
Marc Joye | |
Invited Talk (1); Chair: Juan A. Garay | |
11:25 – 12:25 | A Cryptographer's-eye View of Privacy in Statistical Databases |
Adam Smith (Penn State University, US) | |
12:25 – 14:25 | Lunch and Excursion at Kenrokuen Garden, Photo shoot |
Session 2 – Cryptanalysis I; Chair: Mitsuru Matsui | |
14:30 – 14:55 | Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT |
Chong Hee Kim and Gildas Avoine | |
14:55 – 15:15 | Saturation Attack on the Block Cipher HIGHT |
Peng Zhang, Bing Sun and Chao Li | |
15:15 – 15:40 | Extensions of the Cube Attack based on Low Degree Annihilators |
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei and Josef Pieprzyk | |
15:40 – 16:05 | An Analysis of the Compact XSL Attack on BES and Embedded SMS4 |
Jiali Choy, Huihui Yap and Khoongming Khoo | |
16:05 – 16:30 | Coffee break |
Session 3 – Wireless and Sensor Network Security; Chair: Isao Echizen | |
16:30 – 16:55 | RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks |
Chong Hee Kim and Gildas Avoine | |
16:55 – 17:15 | Anonymizer-Enabled Security and Privacy for RFID |
Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann | |
17:15 – 17:40 | Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes |
Nitesh Saxena and Md. Borhan Uddin | |
17:40 – 18:05 | DepenDNS: Dependable Mechanism against DNS Cache Poisoning |
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang and Yue-Hsun Lin | |
18:30 – 21:00 | Banquet at Kanazawa Excel Hotel Tokyu |
December 13, 2009 | |
Session 4 – Privacy and Anonymity; Chair: Ahmad-Reza Sadeghi | |
09:30 – 09:55 | Privacy-Preserving Relationship Path Discovery in Social Networks |
Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos | |
09:55 – 10:20 | Verifying Anonymous Credential Systems in Applied Pi Calculus |
Xiangxi Li, Yu Zhang and Yuxin Deng | |
10:20 – 10:45 | Transferable Anonymous Constant-Size Fair E-Cash |
Georg Fuchsbauer, David Pointcheval and Damien Vergnaud | |
10:45 – 11:05 | Coffee break |
Session 5 – Functional and Searchable Encryption; Chair: Seny Kamara | |
11:05 – 11:30 | A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle |
Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wan | |
11:30 – 11:55 | Private-Key Hidden Vector Encryption with Key Privacy |
Carlo Blundo, Vincenzo Iovino and Giuseppe Persiano | |
Invited Talk (2) Chair: Akira Otsuka | |
11:55 – 12:55 | Building Secure Networked Systems with Code Attestations |
Adrian Perrig (CMU, US) | |
12:55 – 14:15 | Lunch |
Session 6 – Authentication/Block Cipher Design; Chair: Vlad Kolesnikov | |
14:15 – 14:40 | Stronger Password Authentication against Cross-Site Impersonation |
Xavier Boyen | |
14:40 – 15:05 | An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards |
Wen-Ting Jin and Jing Xu | |
15:05 – 15:30 | Ensuring Authentication of Digital Information using Cryptographic Accumulators |
Christophe Tartary | |
15:30 – 15:55 | MIBS: A New Lightweight Block Cipher |
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki | |
15:55 – 16:15 | Coffee break |
Session 7 – Cryptanalysis II; Chair: Josef Pieprzyk | |
16:15 – 16:40 | Distinguishing and Second-Preimage Attack on CBC-like MACs |
Keting Jia, Xiaoyun Wang, Zheng Yuan and Guangwu Xu | |
16:40 – 17:05 | Improving the Rainbow Attack by Reusing Colours |
Martin Agren, Thomas Johansson and Martin Hell | |
17:05 – 17:30 | Side Channel Cube Attack on PRESENT |
Lin Yang, Meiqin Wang and Siyuan Qiao | |
17:30 – 17:55 | Algebraic Attack on the MQQ Public Key Cryptosystem |
Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding and Johannes Buchmann | |
18:00 – 22:00 | Dinner (Wadaya, a traditional Kanazawa cuisine) |
December 14, 2009 | |
Session 8 – Algebraic and Number-Theoretic Schemes; Chair: Jorge Nakahara | |
09:30 – 09:55 | Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity |
Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu | |
09:55 – 10:20 | Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves |
Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari and Francisco Rodriguez-Henriquez | |
10:20 – 10:45 | On the Complexity of Computing Discrete Logarithms over Algebraic Tori |
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki and Hiroki Shizuya | |
10:45 – 11:05 | Coffee break |
Session 9 – Wireless and Sensor Network Security II; Chair: Benoit Libert | |
11:05 – 11:30 | On the Usability of Secure Association of Wireless Devices Based On Distance Bounding |
Mario Cagalj, Nitesh Saxena and Ersin Uzun | |
11:30 – 11:55 | Short Hash-based Signatures for Wireless Sensor Networksy |
Erik Dahmen and Christoph Kraus | |
Invited Talk(3); Chair: Atsuko Miyaji | |
11:55 – 12:55 | Computing on Encrypted Data |
Craig Gentry (IBM Research, US) | |
12:55 – 14:15 | Lunch |
Session 10 – Cryptographic Protocol and Schemes II; Chair: TBA | |
14:15 – 14:30 | Fully Robust Tree-Diffie-Hellman Group Key Exchange |
Mark Manulis, Emmanuel Bresson and Timo Brecher | |
14:30 – 14:55 | Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Modelm |
Benoit Libert and Damien Vergnaude | |
14:55 – 15:30 | Relinkable Ring Signature |
Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi | |
15:30 – 15:40 | Closing |