Program

 

Conference Program

The 15th International Conference on Information Security and Cryptology

n  Wednesday, 28 November, 2012

09:00 - 10:00

Conference Registration

10:00 - 10:10

Welcome Remarks (Taekyoung Kwon)

Session 1 - Attack and Defense -- (Chair : Debin Gao, Singapore Management University)

10:10 - 11:50

Balanced Indexing Method for Efficient Intrusion Detection Systems

BooJoong Kang, Hye Seon Kim, Ji Su Yang, Eul G. Im

Quantitative Questions on Attack-Defense Trees

Barbara Kordy, Sjouke Mauw, Patrick Schweitzer

DNS Tunneling for Network Penetration

Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout

MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring

Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu

11:50 - 13:00

Lunch

Invited Talk (1) -- (Chair : Hyang-Sook Lee, Ewha Womans University)

13:00 - 14:00

Practical Applications of Homomorphic Encryption

Kristin Lauter (Microsoft Research)

14:00 - 14:15

Coffee Break

Session 2 – Software and Web Security -- (Chair : Ji Sun Shin, Sejong University)

14:15 - 15:05

iBinHunt: Binary Hunting with Inter-Procedural Control Flow

Jiang Ming, Meng Pan, Debin Gao

Sometimes it's better to be STUCK! - SAML Transportation Unit for Cryptographic Keys

Christopher Meyer, Florian Feldmann, Jörg Schwenk

15:05 - 15:20

Coffee Break

Session 3 – Cryptanalysis (1) -- (Chair : Jeong Hyun Yi, Soongsil University)

15:20 - 17:00

Improved Impossible Differential Cryptanalysis of Rijndael

Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov

Cube Cryptanalysis of LBlock with Noisy Leakage

Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin

Comprehensive Study of Integral Analysis on 22-Round LBlock

Yu Sasaki, Lei Wang

New Impossible Differential Attack on SAFER+ and SAFER++

Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng

17:00 - 17:15

Coffee Break

Session 4 – Cryptographic Protocol -- (Chair : Dae Hyun Yum, Myongji University)

17:15 - 18:30

An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol

Christian Corniaux, Hossein Ghodosi

Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms

Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi

Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol

Lei Zhang

18:30 - 20:30

Banquet

 

n  Thursday, 29 November, 2012

Invited Talk (2) -- (Chair : Dong Hoon Lee, Korea University)

09:10 - 10:10

Another Look at Affine-Padding RSA Signatures

David Naccache (Ecole Normale Superieure)

Session 5 - Identity-Based Encryption -- (Chair : Myungkeun Yoon, Kookmin University)

10:10 - 11:00

A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles

Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang

Ciphertext Policy Multi-Dimensional Range Encryption

Kohei Kasamatu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai

11:00 - 11:15

Coffee Break

Session 6 – Efficient Implementation -- (Chair: DaeHun Nyang, Inha University)

11:15 - 12:30

Speeding up Ate Pairing Computation in Affine Coordinates

Duc-Phong Le, Chik How Tan

An Improved Hardware Implementation of the Grain-128a Stream Cipher

Shohreh Sharif Mansouri, Elena Dubrova

Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers

Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay

12:30 – 13:40

Lunch

Session 7 – Cloud Computing Security -- (Chair : Abedelaziz Mohaisen, Verisign Labs)

13:40 - 14:30

Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius

Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines

Michael Velten, Frederic Stumpf

14:55 --

Tour

 

n  Friday, 30 November, 2012

Session 8 – Cryptanalysis (2) -- (Chair: Deukjo Hong, NSRI)

09:10 - 10:25

Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha

Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu

Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties

Takuma Koyama, Yu Sasaki, Noboru Kunihiro

Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers

Mohamed Ahmed Abdelraheem

10:25 - 10:40

Coffee break

Invited Talk (3) -- (Chair : Daesung Kwon, NSRI)

10:40 - 11:40

New Meet-In-The-Middle Attacks in Symmetric Cryptanalysis

Christian Rechberger (Technical University of Denmark)

Session 9 - Side Channel Analysis -- (Chair : Mun-Kyu Lee, Inha University)

11:40 - 12:30

Security Evaluation of Cryptographic Modules against Profiling Attacks

Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi

Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher

Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama

12:30 - 13:40

Lunch

Session 10 – Digital Signature -- (Chair : JongHyup Lee, Korea National University of Transportation)

13:40 - 15:20

Efficient Group Signatures in The Standard Model

Laila El Aimani, Olivier Sanders

A Batch Verification Suitable for Fast Verifying A Limited Number of Signatures

Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi

Linear Recurring Sequences for the UOV Key Generation Revisited

Albrecht Petzoldt, Stanislav Bulygin

Galindo-Garcia Identity-Based Signature Revisited

Sanjit Chatterjee, Chethan Kamath, Vikas Kumar

15:20 - 15:35

Coffee Break

Session 11 – Privacy Enhancement  -- (Chair : Marc Joye, Technicolor)

15:35 - 16:50

Private Top-k Aggregation Protocols

Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim

An Improved Anonymous Authentication and Key Exchange Scheme

Kyung-kug Kim, Myung-Hwan Kim

Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System

Nasima Begum, Toru Nakanishi, Nobuo Funabiki

16:50 –

Adjourn