Fri, May 17 AM 10:00 - 11:30 |
(1) |
10:00-10:30 |
[Invited Talk]
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions(from SCN 2018) |
Keisuke Hara, Fuyuki Kitagawa (TokyoTech), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (TokyoTech) |
(2) |
10:30-11:00 |
[Invited Talk]
Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018) |
Kento Oonishi, Noboru Kunihiro (UTokyo) |
(3) |
11:00-11:30 |
[Invited Talk]
Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology (from DSD 2018) |
Jean-Luc Danger (Telecom ParisTech), Risa Yashiro (UEC), Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet (Telecom ParisTech), Kazuo Sakiyama (UEC), Noriyuki Miura, Makoto Nagata (Kobe University), Sylvain Guilley (Secure-IC) |
|
11:30-11:45 |
Break ( 15 min. ) |
Fri, May 17 AM 11:45 - 12:35 |
(4) |
11:45-12:10 |
Examination of quantitative evaluation of attack method to restore the anonymized data |
Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) |
(5) |
12:10-12:35 |
How to Decode Erros in Information Theoretic PIR |
Kaoru Kurosawa, Keito Shibata, Kazuki Ishinari, Ippei Kakurai (Ibaraki Univ.) |
|
12:35-14:30 |
Lunch Break ( 115 min. ) |
Fri, May 17 PM 14:30 - 15:45 |
(6) |
14:30-14:55 |
K(I)Sch-CBPKC Based on Message-Dependent Transformation |
Masao Kasahara (Waseda Univ.) |
(7) |
14:55-15:20 |
The amount of information leakage of decryption keys through timing attacks on RSA decryption system |
Tomonori Hirata, Yuichi Kaji (Nagoya Univ.) |
(8) |
15:20-15:45 |
A secure method of provisioning IoT devices with few operations |
Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) |
|
15:45-16:00 |
Break ( 15 min. ) |
Fri, May 17 PM 16:00 - 17:30 |
(9) |
16:00-16:30 |
[Invited Talk]
Risk of Re-identification from Payment Card Histories in Multiple Domains (from AINA 2018) |
Satoshi Ito, Reo Harada, Hiroaki Kikuchi (Meiji Univ.) |
(10) |
16:30-17:00 |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) |
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) |
(11) |
17:00-17:30 |
[Invited Talk]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018) |
Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) |