Note: The following is a draft of the conference schedule. Complete schedule, including more details and updates will be coming soon ...
Conference Day | Registration / Reception | Opening / Closing |
Regular Session | Invited Talk | Break / Lunch / Dinner |
Program Summary
|
Tuesday, June 25th |
|||
16:00-18:00 | On-site Registration @ Max Bell Lounge (the "fishbowl") | ||
18:00-22:00 | Welcome Reception (buffet dinner) @ Max Bell Lounge (the "fishbowl") | ||
Wednesday, June 26th |
|||
08:00-09:00 | On-site Registration / Reception | ||
09:00-09:15 | Opening / Announcement @ Max Bell Auditorium | ||
Session 1: Cloud Cryptography @ Max Bell Auditorium | |||
09:15-09:40 09:40-10:05 10:05-10:30 10:30-10:55 |
Transparent, Distributed, and Replicated Dynamic Provable Data Possession Client-controlled Cryptography-as-a-Service in the Cloud CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing Computing on Authenticated Data for Adjustable Predicates |
||
10:55-11:25 | Coffee Break | ||
Invited Talk 1 @ Max Bell Auditorium | |||
11:25-12:25 |
Bootstrapping Cloud Security |
||
12:30-14:00 | Lunch | ||
Session 2: Secure Computation @ Max Bell Auditorium | |||
14:00-14:25 14:25-14:50 14:50-15:15 |
Towards Efficient Private Distributed Computation on Unbounded Input Streams From oblivious AES to Ecient and Secure Database Join in the Multiparty Setting Private Database Queries Using Somewhat Homomorphic Encryption |
||
15:15-15:40 | Coffee Break | ||
Session 3: Hash Function and Block Cipher @ Max Bell Auditorium | |||
15:40-16:05 16:05-16:30 16:30-16:55 16:55-17:20 |
BLAKE2: Simpler, Smaller, Fast as MD5 Cryptophia's Short Combiner for Collision-Resistant Hash Functions Generic Attacks for the Xor of k Random Permutations Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist |
||
Thursday, June 27th |
|||
08:00-09:00 | On-site Registration / Reception | ||
Session 4: Signature @ Max Bell Auditorium | |||
09:00-09:25 09:25-09:50 |
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles Sequential Aggregate Signatures Made Shorter |
||
Session 5: Group-oriented Cryptography @ Max Bell Auditorium | |||
09:50-10:15 10:15-10:40 |
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Toward Practical Group Encryption |
||
10:40-11:10 | Coffee Break | ||
Invited Talk 2 @ Max Bell Auditorium | |||
11:10-12:10 |
Ensemble Clustering for Graphs-Based Data |
||
12:10-13:40 | Lunch | ||
Session 6: System Attack I @ Max Bell Auditorium | |||
13:40-14:05 14:05-14:30 |
Experimental Analysis of Attacks on Next Generation Air Traffic Communication Launching Generic Attacks on iOS with Approved Third-Party Applications |
||
14:30-15:00 | Coffee Break | ||
Session 7: Secure Implementation - Hardware @ Max Bell Auditorium | |||
15:00-15:25
15:25-15:50 |
Hardware Architectures for MSP430-based Wireless Sensor Nodes Performing Elliptic Curve Cryptography Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors |
||
Session 8: Secure Implementation - Software @ Max Bell Auditorium | |||
15:50-16:15 16:15-16:40 16:40-17:05 |
NEON Implementation of an Attribute-based Encryption Scheme Fast and Maliciously Secure Two-Party Computation Using the GPU Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves |
||
18:30-20:30 | Conference Dinner @ Kinnear Centre | ||
Friday, June 28th |
|||
08:00-09:00 | On-site Registration / Reception | ||
Session 9: System Attack II @ Max Bell Auditorium | |||
09:00-09:25 09:25-09:50 09:50-10:15 10:15-10:40 |
FROST - Forensic Recovery of Scrambled Telephones Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware Keystroke Timing Analysis of on-the-fly Web Apps Terrorism in Distance Bounding: Modeling Terrorist Fraud Resistance |
||
10:40-11:10 | Coffee Break | ||
Invited Talk 3 @ Max Bell Auditorium | |||
11:10-12:10 |
Selected Topics in Mobile Security and Trusted Computing |
||
12:10-13:30 | Lunch | ||
Session 10: Group-oriented Systems @ Max Bell Auditorium | |||
13:30-13:55 13:55-14:20 |
CrowdShare: Secure Mobile Resource Sharing Remotegrity: Design and Use of an End-to-End Veriable Remote Voting System |
||
14:20-14:30 | Break | ||
Session 11: Key Exchange and Leakage Resilience @ Max Bell Auditorium | |||
14:30-14:55 14:55-15:20 15:20-15:45 |
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles Public Key Exchange using Semidirect Product of (Semi)Groups Leakage Resilient IBE and IPE under the DLIN Assumption |
||
15:45-16:15 | Coffee Break | ||
Session 12: Cryptographic Proof @ Max Bell Auditorium | |||
16:15-16:40 16:40-17:05 |
Batch Proofs of Partial Knowledge Efficient Signatures of Knowledge and Direct Anonymous Attestation in the Standard Model |
||
Session 13: Cryptosystems @ Max Bell Auditorium | |||
17:05-17:30 17:30-17:55 |
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes Primeless Factoring-Based Cryptography |
||
17:55-18:10 | Closing |