ICISC2018 Program

 

 Wednesday, (2018-11-28)
8:30 – 9:10

 Registration

9:10 – 9:20  Opening Remarks
9:20 – 10:35

 Session 1: Public-Key Encryption and Implementation
 (Session Chair: Seung-Hyun Seo)

 Mitigating the One-Use Restriction in Attribute-Based Encryption 
 Lucas Kowalczyk, Jiahui Liu, Tal Malkin and Kailash Meiyappan

 Attacking Noisy Secret CRT-RSA Exponents in Binary Method  
 Kento Oonishi and Noboru Kunihiro

 Compact Implementation of Modular Multiplication for Special Modulus on MSP430X Case Study: NIST P-256 
 Hwajeong Seo, Hyeokdong Kwon, Kyuhwang An and Zhi Hu
10:35 – 11:00  Coffee Break
11:00 – 12:00

 Invited Talk 1 (Session Chair: Kwangsu Lee)

 Obfuscation from LWE: How Far Are We?
 Hoeteck Wee (ENS, France) 
12:00 – 13:30  Lunch
13:30 – 14:45

 Session 2: Homomorphic Encryption
 (Session Chair: Kyu Young Choi)

 Multi-Identity IBFHE and Multi-Attribute ABFHE in the Standard Model 
 Xuecheng Ma and Dongdai Lin

 Approximate Homomorphic Encryption over the Conjugate-invariant Ring 
 Duhyeong Kim and Yongsoo Song

 Excalibur Key-Generation Protocols For DAG Hierarchic Decryption 
 Francisco José Vial-Prado, Geraldine Monsalve, Juan Reutter and Louis Goubin
14:45 – 15:45

 Invited Talk 2 (Session Chair: Jongsung Kim)

 Tweakable Block Ciphers: Construction and Applications
 Jooyoung Lee (KAIST, Korea)
15:45 – 16:10  Coffee Break

16:10 – 17:25

 Session 3: Secure Multiparty Computation

 (Session Chair: Bonwook Koo)

 The Six-Card Trick: Secure Computation of Three-Input Equality 
 Kazumasa Shinagawa and Takaaki Mizuki

 Unconditionally Secure Distributed Oblivious Polynomial Evaluation 
 Louis Cianciullo and Hossein Ghodosi

 An Efficient Private Evaluation of a Decision Graph 
 Hiroki Sudo, Koji Nuida and Kana Shimizu

 Social Event

 Thursday, (2018-11-29)
9:20 – 10:35

 Session 4: Post-Quantum Cryptography
 (Session Chair: Jae Hong Seo)

 Key Reuse Attack on NewHope Key Exchange Protocol 
 Chao Liu, Zhongxiang Zheng and Guangnan Zou

 Supersingular Isogeny Diffie--Hellman Authenticated Key Exchange 
 Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada and Kazuki Yoneyama 

 On the Complexity of the LWR-Solving BKW Algorithm 
 Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto and Tsuyoshi Takagi

10:35 – 11:00

 Coffee Break
11:00 – 12:00

 Invited Talk 3 (Session Chair: Moon Sung Lee)

 Security Against Quantum Superposition Attacks
 Aaram Yun (UNIST, Korea)
12:00 – 13:30  Lunch
13:30 – 14:30

 Invited Tutorial (Session Chair: Jong-Hwan Park)

 An Introduction to Isogeny-Based Cryptography
 Katsuyuki Takashima (Mitsubishi Electric, Japan)
14:30 – 14:40  Short Break
14:40 – 15:40

 Invited Talk 4 (Session Chair: Jong-Hwan Park)

 New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption 
 Katsuyuki Takashima (Mitsubishi Electric, Japan)
15:40 – 16:00  Coffee Break
16:00 – 17:15

 Session 5: Secret Sharing and Searchable Encryption
 (Session Chair: Junbeom Hur)

 A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques 
 Koji Shima and Hiroshi Doi

 Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions 
 Romar Dela Cruz and Say Ol

 A New Privacy-Preserving Searching Model on Blockchain 
 Meiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen and Siu Ming Yiu
18:30 – 20:30  Banquet

 Friday, (2018-11-30)
9:10 – 10:25

 Session 6: Storage Security and Information Retrieval
 (Session Chair: Daehun Nyang)

 ELSA: Efficient Long-Term Secure Storage of Large Datasets 
 Matthias Geihs and Johannes Buchmann

 How to Block the Malicious Access to Android External Storage 
 Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou and Jun Li

 A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications 
 Radhakrishna Bhat and N R Sunitha
10:25 – 10:45  Coffee Break
10:45 – 12:00

 Session 7: Attacks and Software Security
 (Session Chair: Taekyoung Kwon)

 Practical Algebraic Side-Channel Attacks on ACORN 
 Alexandre Adomnicai, Jacques Fournier and Laurent Masson

 A Closer Look at the Guo–Johansson–Stankovski Attack Against QC-MDPC Codes 
 Tung Chou, Yohei Maezawa and Atsuko Miyaji

 Recurrent Neural Networks for Fuzz Testing Web Browsers 

 Martin Sablotny, Bjørn S. Jensen and Chris W. Johnson

12:00 – 12:10  Closing Remarks

 

 



- November(Wed), 2018 8:00 pm ~ 9:20pm

link