ACNS 2013 Schedule

Note: The following is a draft of the conference schedule. Complete schedule, including more details and updates will be coming soon ...

Color Legend

  Conference Day   Registration / Reception   Opening / Closing
  Regular Session   Invited Talk   Break / Lunch / Dinner

 

Program Summary

Tuesday, June 25th
16:00-18:00 On-site Registration
18:00-22:00 Welcome Reception
Wednesday, June 26th
08:00-09:00 On-site Registration / Reception
09:00-09:15 Opening / Announcement
09:15-10:55 Session 1: Cloud Cryptography
10:55-11:25 Coffee Break
11:25-12:25 Invited Talk 1, by Bryan Parno
12:30-14:00 Lunch
14:00-15:15 Session 2: Secure Computation
15:15-15:40 Coffee Break
15:40-17:20 Session 3: Hash Function and Block Cipher
Thursday, June 27th
08:00-09:00 On-site Registration / Reception
09:00-09:50 Session 4: Signature
09:50-10:40 Session 5: Group-oriented Cryptography
10:40-11:10 Coffee Break
11:10-12:10 Invited Talk 2, by Francois Theberge
12:10-13:40 Lunch
13:40-14:30 Session 6: System Attack I
14:30-15:00 Coffee Break
15:00-15:50 Session 7: Secure Implementation - Hardware
15:50-17:05 Session 8: Secure Implementation - Software
18:00-21:00 Conference Dinner (Cash Bar from 18:00-19:00; Dinner at 19:00)
Friday, June 28th
08:00-09:00 On-site Registration / Reception
09:00-10:40 Session 9: System Attack II
10:40-11:10 Coffee Break
11:10-12:10 Invited Talk 3, by Ahmad-Reza Sadeghi
12:10-13:30 Lunch
13:30-14:20 Session 10: Group-oriented Systems
14:20-14:30 Break
14:30-15:45 Session 11: Key Exchange and Leakage Resilience
15:45-16:15 Coffee Break
16:15-17:05 Session 12: Cryptographic Proof
17:05-17:55 Session 13: Cryptosystems
17:55-18:10 Closing

 

Program Details

Tuesday, June 25th

16:00-18:00 On-site Registration @ Max Bell Lounge (the "fishbowl")
18:00-22:00 Welcome Reception (buffet dinner) @ Max Bell Lounge (the "fishbowl")
 

Wednesday, June 26th

08:00-09:00 On-site Registration / Reception
09:00-09:15 Opening / Announcement @ Max Bell Auditorium
Session 1: Cloud Cryptography @ Max Bell Auditorium    

09:15-09:40
 

09:40-10:05
 

10:05-10:30
 

10:30-10:55
 

Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad and Alptekin Küpçü

Client-controlled Cryptography-as-a-Service in the Cloud
Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger and Ahmad-Reza Sadeghi

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng and Jianying Zhou

Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Reimers and Richard Stein

10:55-11:25 Coffee Break
Invited Talk 1 @ Max Bell Auditorium     

11:25-12:25

Bootstrapping Cloud Security
Bryan Parno, from Microsoft Research, Redmond

12:30-14:00 Lunch
Session 2: Secure Computation @ Max Bell Auditorium    

14:00-14:25
 

14:25-14:50
 

14:50-15:15
 

Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov and Yelena Yuditsky

From oblivious AES to Ecient and Secure Database Join in the Multiparty Setting
Sven Laur, Riivo Talviste and Jan Willemson

Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang and David Wu

15:15-15:40 Coffee Break
Session 3: Hash Function and Block Cipher @ Max Bell Auditorium     

15:40-16:05
 

16:05-16:30
 

16:30-16:55
 

16:55-17:20
 

BLAKE2: Simpler, Smaller, Fast as MD5
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn and Christian Winnerlein

Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach

Generic Attacks for the Xor of k Random Permutations
Jacques Patarin

Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
Yu Sasaki

 

Thursday, June 27th

08:00-09:00 On-site Registration / Reception
Session 4: Signature @ Max Bell Auditorium     

09:00-09:25
 

09:25-09:50
 

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou and Jian Weng

Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee and Moti Yung

Session 5: Group-oriented Cryptography @ Max Bell Auditorium     

09:50-10:15
 

10:15-10:40
 

How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin, Sara Krehbiel and Chris Peikert

Toward Practical Group Encryption
Laila El Aimani and Marc Joye

10:40-11:10 Coffee Break
Invited Talk 2 @ Max Bell Auditorium     

11:10-12:10

Ensemble Clustering for Graphs-Based Data
Francois Theberge, from Tutte Institute for Mathematics and Computing

12:10-13:40 Lunch
Session 6: System Attack I @ Max Bell Auditorium     

13:40-14:05
 

14:05-14:30
 

Experimental Analysis of Attacks on Next Generation Air Traffic Communication
Matthias Schäfer, Vincent Lenders and Ivan Martinovic

Launching Generic Attacks on iOS with Approved Third-Party Applications
Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao, Yingjiu Li and Jianying Zhou

14:30-15:00 Coffee Break
Session 7: Secure Implementation - Hardware @ Max Bell Auditorium     

15:00-15:25

 

15:25-15:50
 

Hardware Architectures for MSP430-based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
Erich Wenger

Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors
Michael Henson and Stephen Taylor

Session 8: Secure Implementation - Software @ Max Bell Auditorium     

15:50-16:15
 

16:15-16:40
 

16:40-17:05
 

NEON Implementation of an Attribute-based Encryption Scheme
Ana Helena Sanchez and Francisco Rodríguez-Henríquez

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic

18:30-20:30 Conference Dinner @ Kinnear Centre
 

Friday, June 28th

08:00-09:00 On-site Registration / Reception
Session 9: System Attack II @ Max Bell Auditorium     

09:00-09:25
 

09:25-09:50
 

09:50-10:15
 

10:15-10:40
 

FROST - Forensic Recovery of Scrambled Telephones
Tilo Müller and Michael Spreitzenbarth

Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware
Alexander Wild, Tim Güuneysu and Amir Moradi

Keystroke Timing Analysis of on-the-fly Web Apps
Chee Meng Tey, Payas Gupta, Debin Gao and Yan Zhang

Terrorism in Distance Bounding: Modeling Terrorist Fraud Resistance
Marc Fischlin and Cristina Onete

10:40-11:10 Coffee Break
Invited Talk 3 @ Max Bell Auditorium     

11:10-12:10

Selected Topics in Mobile Security and Trusted Computing 
Ahmad-Reza Sadeghi, from Technische Universität Darmstadt, Germany

12:10-13:30 Lunch
Session 10: Group-oriented Systems @ Max Bell Auditorium     

13:30-13:55 
 

13:55-14:20
 

CrowdShare: Secure Mobile Resource Sharing
N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider and Stanislaus Stelle

Remotegrity: Design and Use of an End-to-End Veriable Remote Voting System
Filip Zagorski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex and Poorvi Vora

14:20-14:30 Break
Session 11: Key Exchange and Leakage Resilience @ Max Bell Auditorium     

14:30-14:55
 

14:55-15:20
 

15:20-15:45
 

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou Suzuki and Kazuki Yoneyama

Public Key Exchange using Semidirect Product of (Semi)Groups
Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis and Vladimir Shpilrain

Leakage Resilient IBE and IPE under the DLIN Assumption
Kaoru Kurosawa and Le Trieu Phong

15:45-16:15 Coffee Break
Session 12: Cryptographic Proof @ Max Bell Auditorium     

16:15-16:40
 

16:40-17:05
 

Batch Proofs of Partial Knowledge
Ryan Henry and Ian Goldberg

Efficient Signatures of Knowledge and Direct Anonymous Attestation in the Standard Model
David Bernhard, Georg Fuchsbauer and Essam Ghadafi

Session 13: Cryptosystems @ Max Bell Auditorium     

17:05-17:30
 

17:30-17:55
 

Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy, Céline Chevalier, David Pointcheval and Damien Vergnaud

Primeless Factoring-Based Cryptography
Sonia Bogos, Ioana Boureanu and Serge Vaudenay

17:55-18:10 Closing

 

 

Quick Links