Thu, May 19 AM 10:00 - 10:50 |
(1) |
10:00-10:25 |
Modified method for identification of template using non-overlapping template matching test |
Yuichi Takeda (KAIT), Huzii Mituaki, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) |
(2) |
10:25-10:50 |
IDS using Discrete Fourier Transform with window functions |
Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) |
|
10:50-11:00 |
Break ( 10 min. ) |
Thu, May 19 AM 11:00 - 12:00 |
(3) |
11:00-11:30 |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs |
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) |
(4) |
11:30-12:00 |
[Invited Talk]
On New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators |
Tatsuaki Okamoto (NTT) |
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Thu, May 19 13:00 - 15:20 |
(5) |
13:00-13:25 |
Proposal of Multivariate Public Key CryptoSystem based on Numerous Prime Numbers and its Application to Organizational Communications
-- For Quantum Proof MPKC and IoT Environment -- |
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo-Univ.) |
(6) |
13:25-13:50 |
On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields |
Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) |
(7) |
13:50-14:15 |
Analysis of Decreasing Squared-Sum of Gram-Schmidt Lengths for Finding Short Lattice Vectors |
Masaya Yasuda (Kyushu Univ.), Kazuhiro Yokoyama (Rikkyo Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
(8) |
14:30-14:55 |
Research Problems in "Instrumentation Security" |
Tsutomu Matsumoto (YNU) |
(9) |
14:55-15:20 |
Instrumentation Security of a Pulse LIDAR System Against Reflected Light Masquerading |
Kazuki Soma, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
|
15:20-15:30 |
Break ( 10 min. ) |
Thu, May 19 PM 15:30 - 17:00 |
(10) |
15:30-16:00 |
[Invited Talk]
Midori: A Block Cipher for Low Energy |
Subhadeep Banik, Andrey Bogdanov (DTU), Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita (Sony), Francesco Regazzoni (USI) |
(11) |
16:00-16:30 |
[Invited Talk]
How Secure is AES Under Leakage |
Andrey Bogdanov (DTU), Takanori Isobe (Sony) |
(12) |
16:30-17:00 |
[Invited Talk]
Refinements of the k-tree Algorithm for the Generalized Birthday Problem |
Yu Sasaki (NTT) |