Wed, Dec 21 09:30 - 10:10 |
(1) |
09:30-09:50 |
Improvements of Blacklistable Anonymous Credential System Using Accumulator |
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) |
(2) |
09:50-10:10 |
A note on security notions of anonymity in Identity-based encryption |
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
|
10:10-10:30 |
Break ( 20 min. ) |
Wed, Dec 21 10:30 - 11:30 |
(3) |
10:30-11:30 |
[Invited Talk]
New frontier of machine learning and computation initiated by quantum annealing |
Masayuki Ohzeki (Tohoku Univ.) |
|
11:30-12:30 |
Lunch Break ( 60 min. ) |
Wed, Dec 21 12:30 - 14:10 |
(4) |
12:30-12:40 |
|
(5) |
12:40-13:10 |
[Invited Talk]
Fast and Scalable Bilinear-Type Conversion Using Integer Programming |
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT) |
(6) |
13:10-13:40 |
[Invited Talk]
Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016) |
Mehdi Tibouchi (NTT) |
(7) |
13:40-14:10 |
[Invited Talk]
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results |
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) |
|
14:10-14:30 |
Break ( 20 min. ) |
Wed, Dec 21 14:30 - 15:50 |
(8) |
14:30-14:50 |
|
Miki Miyauchi (NTT) |
(9) |
14:50-15:10 |
|
|
(10) |
15:10-15:30 |
A Loosely-Stabilizing Population Protocol for Maximal Independent Set |
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) |
(11) |
15:30-15:50 |
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches |
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.) |
Thu, Dec 22 09:30 - 10:10 |
(12) |
09:30-09:50 |
Effect on Mix Columns to the Security of Minalpher |
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
(13) |
09:50-10:10 |
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2) |
Yuichi Komano (Toshiba) |
|
10:10-10:30 |
Break ( 20 min. ) |
Thu, Dec 22 10:30 - 11:30 |
(14) |
10:30-11:30 |
[Invited Talk]
Theory and Practice of Succinct Data Structures |
Kunihiko Sadakane (Univ. of Tokyo) |
|
11:30-12:30 |
Lunch Break ( 60 min. ) |
Thu, Dec 22 12:30 - 14:00 |
(15) |
12:30-13:00 |
[Invited Talk]
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup |
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) |
(16) |
13:00-13:30 |
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015) |
Taechan Kim (NTT) |
(17) |
13:30-14:00 |
[Invited Talk]
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS |
Yu Sasaki (NTT) |
|
14:00-14:20 |
Break ( 20 min. ) |
Thu, Dec 22 14:20 - 15:20 |
(18) |
14:20-15:20 |
[Invited Talk]
How small can the diameter of an undirected graph be?
-- Toward low-latency large-scale interconnection networks -- |
Ikki Fujiwara (NICT) |
|
15:20-15:40 |
Break ( 20 min. ) |
Thu, Dec 22 15:40 - 16:20 |
(19) |
15:40-16:00 |
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption |
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab) |
(20) |
16:00-16:20 |
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove |
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College) |