IMACC 2011 Programme -
PDF
Monday December 12
18:30 – 19:30 Registration
19:30 – 20:30 Buffer dinner for residents only
Tuesday December 13
08:45 – 09:10 Registration
09:10 – 09:15 Opening remarks
09:15 – 10:15 Invited talk:
David Naccache
– chaired by Kyeongcheol Yang
Can a Program Reverse-Engineer Itself?
10:15 – 10:20 Short break
10:20 – 11:10 Homomorphic encryption
– chaired by Michael Ward
Improved Key Generation For Gentry’s Fully
Homomorphic Encryption Scheme
Peter Scholl and Nigel Smart
On Constructing Homomorphic Encryption Schemes from
Coding Theory
Frederik Armknecht, Daniel Augot,
Ludovic Perret
and Ahmad-Reza Sadeghi
11:10 – 11: 30 Coffee
11:30 – 12:45 Coding theory I
– chaired by Felix Ulmer
Generalised complementary arrays
Matthew Parker
and
Constanza Riera
Binary Kloosterman Sums with Value $4$
Jean-Pierre Flori, Sihem Mesnager and Gerard Cohen
On the Triple-Error-Correcting Cyclic Codes with Zero
Set $\{1, 2^i+1, 2^j+1\}$
Vincent Herbert and Sumanta Sarkar
12:45 – 14:00 Lunch
14:00 – 15:00 Invited talk:
Paddy Farrell
– chaired by Matthew Parker
Non-Statistical Soft-in, Soft-out Decoding with the
Euclidean Metric
15:00 – 15:05 Short break
15:05 – 15:55 Knowledge proof
– chaired by Frederik Armknecht
A Secure and Efficient Proof of Integer in an
Interval Range
Kun Peng
Bit Commitment in the Bounded Storage Model: Tight
Bound and Simple Optimal Construction
Junji Shikata and Daisuke Yamanaka
15:55 – 16:15 Tea
16:15 – 17:30 Cryptographic functions
– chaired by Steve Babbage
Self-Correctors for Cryptographic Modules
Go Yamamoto and Tetsutaro Kobayashi
The Symbiosis between Collision and Preimage
Resistance
Martijn Stam and
Elena Andreeva
Enhanced Count of Balanced Symmetric Functions and
Balanced Alternating Functions
Marc Mouffron and Guillaume Vergne
18:00 – 19:30 Drinks reception
Wednesday December 14
09:00 – 10:00 Invited talk:
Ivan Damgård
– chaired by Kenny Paterson
Using unconditionally secure authentication in multiparty computation
with dishonest majority
10:00 – 10:05 Short break
10:05 – 10:55 Public key cryptosystem
– chaired by Kenny Paterson
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its
Application to Searchable Encryption in Multi-user Setting
Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi
Mori, Yusuke Sakai and Kazuo Ohta
Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism
with Authenticity
Yuki Shibuya and Junji Shikata
10:55 – 11:15 Coffee
11:15 – 12:30 Coding theory II
– Chaired by
Matthew Parker
A note on the dual codes of module skew codes
Delphine Boucher and Felix Ulmer
Ensuring message embedding in wet paper steganography
Daniel Augot,
Morgan Barbier
and
Caroline Fontaine
On the Stability of m-Sequences
Alex Burrage, Ana Salagean and Raphael Phan
12:30 – 14:00 Lunch
14:00 – 15:40 Pairing and ECC implementation
– chaired by Martijn Stam
Parallelizing the Weil and Tate Pairings
Diego Aranha, Edward Knapp, Alfred Menezes and Francisco Rodriguez-Henriquez.
On the Efficient Implementation of Pairing-Based Protocols
Michael Scott
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding
Degree 1 and 2
Xusheng Zhang and Dongdai Lin
Improved Precomputation Scheme for Scalar Multiplication on Elliptic
Curves
Duc-Phong Le
and Chik-How Tan
15:40 – 16:00 Tea
16:00 – 17:15 Security analysis
– chaired by Colin Boyd
Breaking an Identity-Based Encryption Scheme based on DHIES
Kenneth Paterson and
Martin Albrecht
Analysis of the SSH Key Exchange Protocol
Stephen C. Williams
Cryptanalysis of the Light-Weight Cipher A2U2
Mohamed Ahmed Abdelraheem, Julia Borghoff,
Erik Zenner
and Mathieu David
19:00 Cryptomathic sponsored banquet
Thursday December 15
9:00 – 10:00 Invited talk:
Jonathan Jedwab
– chaired by Chris Mitchell
Emerging methods in the analysis of aperiodic autocorrelations
10:00 – 10:05 Short break
10:05 – 10:55 Symmetric key cryptosystem
– chaired by Chris Mitchell
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009
Proposal
Kazuhiko Minematsu and
Tetsu Iwata
Security of Hash-then-CBC Key Wrapping Revisited
Yasushi Osaki and Tetsu Iwata
10:55 – 11:15 Coffee
11:15 – 12:30 Cryptographic protocols
– chaired by Michael Scott
Block-wise P-Signatures and Non-Interactive Anonymous Credentials with
Efficient Attributes
Malika Izabachene, Benoit Libert and Damien Vergnaud
On Forward Secrecy in One-Round Key Exchange
Colin Boyd
and Juan Gonzalez Nieto
Designated Confirmer Signatures with Unified Verification
Guilin Wang,
Fubiao Xia and Yunlei Zhao
12:30 – 12:35 Closing remarks
12:40 – 14:00 Lunch
Last updated:
18-November-2011
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|