|
Friday December 8 |
8:45 - 9:00 |
Opening Remarks |
9:00 - 10:00 |
Invited Speaker: Moni Naor (Weizmann Institute, Israel)
- Chair: David Pointcheval |
|
Compressibility of NP Instances and Cryptographic Applications |
|
Tea Break |
|
Encryption (Chair: Shengli Liu) |
10:30 - 10:55 |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems |
|
Jaimee Brown, Juan Manuel Gonzalez-Nieto, Colin Boyd (QUT, Australia) |
10:55 - 11:20 |
Efficient Identity-Based Encryption with Tight Security Reduction |
|
Nuttapong Attrapadung (University of Tokyo, Japan), Jun Furukawa (NEC, Japan), Takeshi Gomi (University of Tokyo, Japan), Goichiro Hanaoka, Hideki Imai, Rui Zhang (AIST, Japan) |
|
Key Exchange (Chair: Kefei Chen) |
11:20 - 11:45 |
A Diffie-Hellman Key Exchange Protocol without Random Oracles |
|
Ik Rae Jeong (ETRI, South Korea), Jeong Ok Kwon, Dong Hoon Lee (CIST, South Korea) |
11:45 - 12:10 |
Authenticated Group Key Agreement for Multicast |
|
Liming Wang, Chuan-Kun Wu (SKLOIS Lab, China) |
12:10 - 12:35 |
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad hoc Networks |
|
Hongsong Shi (University of Electronic Science Technology of China, ChengDu, China), Mingxing He (Xihua University, Chengdu, China), Zhiguang Qin (University of Electronic Science Technology of China, ChengDu, China) |
|
Lunch Break |
|
Authentication/Signatures (Chair: Yvo Desmedt) |
1:45 - 2:10 |
Efficient Mutual Data Authentication Using Manually Authenticated Strings |
|
Sven Laur, Kaisa Nyberg (Helsinki University of Technology, Finland) |
2:10 - 2:35 |
Achieving Multicast Stream Authentication using MDS Codes |
|
Christophe Tartary, Huaxiong Wang (Macquarie University, Australia) |
2:35 - 3:00 |
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps |
|
Zhou Sujing, Lin Dongdai (SKLOIS Lab, China) |
|
Tea Break |
|
Proxy-Signatures (Chair: David Pointcheval) |
3:30 - 3:55 |
Security model of proxy-multi signature schemes |
|
Feng Cao, Zhenfu Cao (Shanghai Jiao Tong University, China) |
3:55 - 4:20 |
Efficient ID-based One-time Proxy Signature and Its Application in E-cheque |
|
Rongxing Lu, Zhenfu Cao, Xiaolei Dong (Shanghai Jiao Tong University, China) |
|
Cryptanalysis (Chair: Thomas Berson) |
4:20 - 4:45 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields |
|
Tae Hyun Kim (Korea University, Seoul, South Korea), Tsuyoshi Takagi (Future University-Hakodate, Japan), Dong-Guk Han, Ho Won Kim (ETRI, South Korea), Jongin Lim (Korea University, Seoul, South Korea) |
4:45 - 5:10 |
Improved Collision Attack On Reduced Round Camellia |
|
Guan Jie, Zhang Zhongya (Information Engineer University, Zhengzhou, China) |
5:10 - 5:35 |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks |
|
Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagorski (Wroclaw University of Technology) |
6:00 - 8:00 |
Conference Banquet |
|
Saturday December 9 |
09:00 - 10:00 |
Invited Speaker: Xiaoyun Wang (Tsinghua University, Beijin,
China) - Chair: Yi Mu |
|
Cryptanalysis on the stream cipher ABC v3 |
|
Tea Break |
|
Implementation (Chair: Feng Bao) |
10:30 - 10:55 |
Bitslice Implementation of AES |
|
Chester Rebeiro, David Selvakumar, A.S.L. Devi (Centre For Development of Advanced Computing, Bangalore, India) |
10:55 - 11:20 |
A fast algorithm for determining the linear complexity of periodic sequences over GF(3) |
|
Jianqin Zhou, Qiang Zheng (Anhui Univ. of Technology, China) |
|
Steganalysis and Watermarking (Chair: Weidong Qiu) |
11:20 - 11:45 |
Steganalysis Based on Differential Statistics |
|
Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan (Zhejiang University, China) |
11:45 - 12:10 |
Watermarking Essential Data Structures for Copyright Protection |
|
Qutaiba Albluwi, Ibrahim Kamel (University of Sharjah, UAE) |
|
Lunch Break |
1:15 - 5:30 |
Tour |
6:30 - 8:30 |
Dinner |
|
Sunday December 10 |
|
Boolean Functions and Stream Ciphers (Chair: Xuejia Lai) |
9:00 - 9:25 |
A Note of Perfect Nonlinear Functions |
|
Xiyong Zhang, Hua Guo, Jinjiang Yuan (Zhengzhou University, China) |
9:25 - 9:50 |
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing |
|
Xiaomin Wang, Jiashu Zhang, Wenfang Zhang (Southwest Jiaotong University, Chengdu, China) |
|
Tea Break |
|
Intrusion Detection (Chair: Willy Susilo) |
10:20 - 10:45 |
Cooperative Intrusion Detection for Web Applications |
|
Nathalie Dagorn (University of Luxembourg) |
10:45 - 11:10 |
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis |
|
Jianhua Yang (Bennett College), Byong Lee (Bennett College), Yongzhong Zhang (University of Shanghai for Science and Technology, China) |
11:10 - 11:35 |
Smart Architecture for High-speed Intrusion Detection and Prevention Systems |
|
Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang (National Tsing-Hua University, Taiwan) |
11:35 - 12:00 |
A Multi-agent Cooperative Model and System for Integrated Security Monitoring |
|
Xianxian Li, Lijun Liu, Jinpeng Huai (China) |
|
Lunch Break |
|
Disponibility/Reliability (Chair: Yi Mu) |
1:30 - 1:55 |
Detecting DDoS Attacks based on Multi-stream Fused HMM in Source-end Network |
|
Jian Kang, Yuan Zhang, Jiu-bin Ju (Jilin University, China) |
1:55 - 2:20 |
An Immune-based Model for Service Survivability |
|
Jinquan Zeng, Xiaojie Liu,Tao Li, Feixian Sun, Lingxi Peng, Caimin Liu
(Sichuan University,China) |
2:20 - 2:45 |
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks |
|
Lan Yu, Willy Susilo, Rei Safavi-Naini (University of
Wollongong, Australia) |
2:45 - 3:00 |
Closing Remarks |