Fri, Sep 21 AM 09:20 - 12:10 |
(1) |
09:20-09:45 |
Security Evaluation of Pairing-Based Cryptosystems using eta-T Pairing over GF(3^n) |
Takuya Hayashi (Kyushu Univ.), Takeshi Shimoyama (Fujitsu Labs.), Naoyuki Shinohara (NICT), Tsuyoshi Takagi (Kyushu Univ.) |
(2) |
09:45-10:10 |
Computation of pairings and scalar multiplication by using elliptic nets over small characteristic finite fields |
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.) |
(3) |
10:10-10:35 |
Heuristic improvements of BKZ 2.0 |
Yoshinori Aono (NICT), Ken Naganuma (Hitachi) |
|
10:35-10:50 |
Break ( 15 min. ) |
(4) |
10:50-11:15 |
Differential cryptanalysis of CIPHERUNICORN-A |
Tomoyasu Suzaki (NEC), Takeshi Kawabata, Hiroyasu Kubo, Teruo Saito, Maki Shigeri (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) |
(5) |
11:15-11:40 |
A Report on EUROCRYPT2012 |
Mitsugu Iwamoto (UEC) |
(6) |
11:40-12:10 |
[Invited Talk]
Cryptanalyses on a Merkle-Damgard Based MAC
-- Almost Universal Forgery and Distinguishing-H Attacks -- |
Yu Sasaki (NTT) |
|
12:10-13:20 |
Lunch ( 70 min. ) |
Fri, Sep 21 PM 13:20 - 17:30 |
(7) |
13:20-13:50 |
[Invited Talk]
Group to Group Commitments Do Not Shrink |
Miyako Ohkubo (NICT) |
(8) |
13:50-14:20 |
[Invited Talk]
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers |
Jean-Sebastien Coron (Univ. of Luxembourg), David Naccache (ENS), Mehdi Tibouchi (NTT) |
|
14:20-14:35 |
Break ( 15 min. ) |
(9) |
14:35-15:05 |
[Invited Talk]
Tightly-Secure Signatures From Lossy Identification Schemes |
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) |
(10) |
15:05-15:35 |
[Invited Talk]
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption |
Tatsuaki Okamoto (NTT), Katsuyuki Takashima (Mitsubishi Electric) |
|
15:35-15:50 |
Break ( 15 min. ) |
(11) |
15:50-16:15 |
New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)ΣΠPKC |
Masao Kasahara (21st ICRC) |
(12) |
16:15-16:40 |
Pilot Lamps can Serve as Side Channels |
Shohei Saito, Tsutomu Matsumoto (Yokohama Nat'l Univ.) |
(13) |
16:40-17:05 |
Fault Analysis Based on Key Presumption for Multiple Errors |
Midori Ono (Meijo Univ.), Masaya Yoshikawa (Meijo Univ) |
(14) |
17:05-17:30 |
An Efficient Method of Strictly Evaluating Side-Channel Security |
Takeshi Kishikawa, Shohei Saito, Yuu Tsuchiya, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama Nat'l Univ.) |