| December 12, 2009 | |
|---|---|
| 9:20 – 10:00 | Registration |
| 10:00 – 10:10 | Welcoming Remarks |
| Session 1 – Cryptographic Protocol and Schemes; Chair: Mark Manulis | |
| 10:10 – 10:35 | Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima |
| Vladimir Kolesnikov, Ahmad-Reza Sadeghi and Thomas Schneider | |
| 10:35 – 11:00 | Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security |
| Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary and Pandu Rangan C | |
| 11:00 – 11:25 | On Cryptographic Schemes Based on Discrete Logarithms and Factoring |
| Marc Joye | |
| Invited Talk (1); Chair: Juan A. Garay | |
| 11:25 – 12:25 | A Cryptographer's-eye View of Privacy in Statistical Databases |
| Adam Smith (Penn State University, US) | |
| 12:25 – 14:25 | Lunch and Excursion at Kenrokuen Garden, Photo shoot |
| Session 2 – Cryptanalysis I; Chair: Mitsuru Matsui | |
| 14:30 – 14:55 | Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT |
| Chong Hee Kim and Gildas Avoine | |
| 14:55 – 15:15 | Saturation Attack on the Block Cipher HIGHT |
| Peng Zhang, Bing Sun and Chao Li | |
| 15:15 – 15:40 | Extensions of the Cube Attack based on Low Degree Annihilators |
| Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei and Josef Pieprzyk | |
| 15:40 – 16:05 | An Analysis of the Compact XSL Attack on BES and Embedded SMS4 |
| Jiali Choy, Huihui Yap and Khoongming Khoo | |
| 16:05 – 16:30 | Coffee break |
| Session 3 – Wireless and Sensor Network Security; Chair: Isao Echizen | |
| 16:30 – 16:55 | RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks |
| Chong Hee Kim and Gildas Avoine | |
| 16:55 – 17:15 | Anonymizer-Enabled Security and Privacy for RFID |
| Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann | |
| 17:15 – 17:40 | Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes |
| Nitesh Saxena and Md. Borhan Uddin | |
| 17:40 – 18:05 | DepenDNS: Dependable Mechanism against DNS Cache Poisoning |
| Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang and Yue-Hsun Lin | |
| 18:30 – 21:00 | Banquet at Kanazawa Excel Hotel Tokyu |
| December 13, 2009 | |
| Session 4 – Privacy and Anonymity; Chair: Ahmad-Reza Sadeghi | |
| 09:30 – 09:55 | Privacy-Preserving Relationship Path Discovery in Social Networks |
| Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos | |
| 09:55 – 10:20 | Verifying Anonymous Credential Systems in Applied Pi Calculus |
| Xiangxi Li, Yu Zhang and Yuxin Deng | |
| 10:20 – 10:45 | Transferable Anonymous Constant-Size Fair E-Cash |
| Georg Fuchsbauer, David Pointcheval and Damien Vergnaud | |
| 10:45 – 11:05 | Coffee break |
| Session 5 – Functional and Searchable Encryption; Chair: Seny Kamara | |
| 11:05 – 11:30 | A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle |
| Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wan | |
| 11:30 – 11:55 | Private-Key Hidden Vector Encryption with Key Privacy |
| Carlo Blundo, Vincenzo Iovino and Giuseppe Persiano | |
| Invited Talk (2) Chair: Akira Otsuka | |
| 11:55 – 12:55 | Building Secure Networked Systems with Code Attestations |
| Adrian Perrig (CMU, US) | |
| 12:55 – 14:15 | Lunch |
| Session 6 – Authentication/Block Cipher Design; Chair: Vlad Kolesnikov | |
| 14:15 – 14:40 | Stronger Password Authentication against Cross-Site Impersonation |
| Xavier Boyen | |
| 14:40 – 15:05 | An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards |
| Wen-Ting Jin and Jing Xu | |
| 15:05 – 15:30 | Ensuring Authentication of Digital Information using Cryptographic Accumulators |
| Christophe Tartary | |
| 15:30 – 15:55 | MIBS: A New Lightweight Block Cipher |
| Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki | |
| 15:55 – 16:15 | Coffee break |
| Session 7 – Cryptanalysis II; Chair: Josef Pieprzyk | |
| 16:15 – 16:40 | Distinguishing and Second-Preimage Attack on CBC-like MACs |
| Keting Jia, Xiaoyun Wang, Zheng Yuan and Guangwu Xu | |
| 16:40 – 17:05 | Improving the Rainbow Attack by Reusing Colours |
| Martin Agren, Thomas Johansson and Martin Hell | |
| 17:05 – 17:30 | Side Channel Cube Attack on PRESENT |
| Lin Yang, Meiqin Wang and Siyuan Qiao | |
| 17:30 – 17:55 | Algebraic Attack on the MQQ Public Key Cryptosystem |
| Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding and Johannes Buchmann | |
| 18:00 – 22:00 | Dinner (Wadaya, a traditional Kanazawa cuisine) |
| December 14, 2009 | |
| Session 8 – Algebraic and Number-Theoretic Schemes; Chair: Jorge Nakahara | |
| 09:30 – 09:55 | Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity |
| Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu | |
| 09:55 – 10:20 | Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves |
| Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari and Francisco Rodriguez-Henriquez | |
| 10:20 – 10:45 | On the Complexity of Computing Discrete Logarithms over Algebraic Tori |
| Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki and Hiroki Shizuya | |
| 10:45 – 11:05 | Coffee break |
| Session 9 – Wireless and Sensor Network Security II; Chair: Benoit Libert | |
| 11:05 – 11:30 | On the Usability of Secure Association of Wireless Devices Based On Distance Bounding |
| Mario Cagalj, Nitesh Saxena and Ersin Uzun | |
| 11:30 – 11:55 | Short Hash-based Signatures for Wireless Sensor Networksy |
| Erik Dahmen and Christoph Kraus | |
| Invited Talk(3); Chair: Atsuko Miyaji | |
| 11:55 – 12:55 | Computing on Encrypted Data |
| Craig Gentry (IBM Research, US) | |
| 12:55 – 14:15 | Lunch |
| Session 10 – Cryptographic Protocol and Schemes II; Chair: TBA | |
| 14:15 – 14:30 | Fully Robust Tree-Diffie-Hellman Group Key Exchange |
| Mark Manulis, Emmanuel Bresson and Timo Brecher | |
| 14:30 – 14:55 | Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Modelm |
| Benoit Libert and Damien Vergnaude | |
| 14:55 – 15:30 | Relinkable Ring Signature |
| Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi | |
| 15:30 – 15:40 | Closing |