CANS2009 Program (12 - 14 December 2009)


Time Content
09:20-10:00 Registration
10:00-10:10 Welcoming Remarks
10:10-11:25 Session 1: 3 Presentations (25min each)
<<Cryptographic Protocol and Schemes I>> Chair: Mark Manulis
1. Title: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Authors: Vladimir Kolesnikov, Ahmad-Reza Sadeghi and Thomas Schneider
2. Title: Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Authors: Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary and Pandu Rangan C
3. Title: On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Authors: Marc Joye
11:25-12:25 Invited Talk (1) Chair: Juan A. Garay
  Title: A Cryptographer's-eye View of Privacy in Statistical Databases
Speaker: Adam Smith (Penn State University, US)
12:25-14:30 Lunch and Excursion at Kenrokuen Garden, Photo shoot
14:30-16:10 Session 2: 4 Presentations (25min each)
<<Cryptanalysis I>> Chair: Mitsuru Matsui
1. Title: Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Authors: Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang and Meiqin Wang
2. Title: Saturation Attack on the Block Cipher HIGHT
Authors: Peng Zhang, Bing Sun and Chao Li
3. Title: Extensions of the Cube Attack based on Low Degree Annihilators
Authors: Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei and Josef Pieprzyk
4. Title: An Analysis of the Compact XSL Attack on BES and Embedded SMS4
Authors: Jiali Choy, Huihui Yap and Khoongming Khoo
116:10-16:30 Coffee Break (1)
16:30-18:10 Session 3: 4 Presentations (25min each)
<<Wireless and Sensor Network Security I>> Chair: Isao Echizen
1. Title: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
Authors: Chong Hee Kim and Gildas Avoine
2. Title: Anonymizer-Enabled Security and Privacy for RFID
Authors: Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann
3. Title: Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Authors: Nitesh Saxena and Md. Borhan Uddin
<<Network Security>>
1. Title: DepenDNS: Dependable Mechanism against DNS Cache Poisoning
Authors: Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang and Yue-Hsun Lin
18:30-21:00 Banquet at Kanazawa Excel Hotel Tokyu


Time Content
09:30-10:45 Session 4: 3 Presentations (25min each)
<<Privacy and Anonymity>> Chair: Ahmad-Reza Sadeghi
1. Title: Privacy-Preserving Relationship Path Discovery in Social Networks
Authors: Ghita Mezzour, Adrian Perrig, Virgil Gligor and Panos Papadimitratos
2. Title: Verifying Anonymous Credential Systems in Applied Pi Calculus
Authors: Xiangxi Li, Yu Zhang and Yuxin Deng
3. Title: Transferable Anonymous Constant-Size Fair E-Cash
Authors: Georg Fuchsbauer, David Pointcheval and Damien Vergnaud
10:45-11:05 Coffee Break (2)
11:05-11:55 Session 5: 2 Presentations (25min each)
<<Functional and Searchable Encryption>> Chair: Seny Kamara
1. Title: A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
Authors: Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wan
2. Title: Private-Key Hidden Vector Encryption with Key Privacy
Authors: Carlo Blundo, Vincenzo Iovino and Giuseppe Persiano
11:55-12:55 Invited Talk (2) Chair: Akira Otsuka
  Title: Building Secure Networked Systems with Code Attestation
Speaker: Adrian Perrig (CMU, US)
12:55-14:15 Lunch
14:15-15:55 Session 6: 4 Presentations (25min each)
<<Authentication>> Chair: Vlad Kolesnikov
1. Title: Stronger Password Authentication against Cross-Site Impersonation
Authors: Xavier Boyen
2. Title: An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards
Authors: Wen-Ting Jin and Jing Xu
3. Title: Ensuring Authentication of Digital Information using Cryptographic Accumulators
Authors: Christophe Tartary
<<Block Cipher Design>>
1. Title: MIBS: A New Lightweight Block Cipher
Authors: Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki
15:55-16:15 Coffee Break (3)
16:15-17:55 Session 7: 4 Presentations (25min each)
<<Cryptanalysis II>> Chair: Josef Pieprzyk
1. Title: Distinguishing and Second-Preimage Attack on CBC-like MACs
Authors: Keting Jia, Xiaoyun Wang, Zheng Yuan and Guangwu Xu
2. Title: Improving the Rainbow Attack by Reusing Colours
Authors: Martin Agren, Thomas Johansson and Martin Hell
3. Title: Side Channel Cube Attack on PRESENT
Authors: Lin Yang, Meiqin Wang and Siyuan Qiao
4. Title: Algebraic Attack on the MQQ Public Key Cryptosystem
Authors: Mohamed Saied Emam Mohamed, Fabian Werner, Jintai Ding and Johannes Buchmann
18:00-22:00 Dinner (Wadaya, a traditional Kanazawa cuisine)


Time Content
09:30-10:45 Session 8: 3 Presentations (25min each)
<<Algebraic and Number-Theoretic Schemes>> Chair: Jorge Nakahara
1. Title: Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Authors: Shaojing Fu, Chao Li, Kanta Matsuura, and Longjiang Qu
2. Title: Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Authors: Jean-Luc Beuchat, Emmanuel Lopez-Trejo, Luis Martinez-Ramos, Shigeo Mitsunari and Francisco Rodriguez-Henriquez
3. Title: On the Complexity of Computing Discrete Logarithms over Algebraic Tori
Authors: Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki and Hiroki Shizuya
10:45-11:05 Coffee Break (4)
11:05-11:55 Session 9: 2 Presentations (25min each)
<<Wireless and Sensor Network Security II>> Chair: Benoit Libert
1. Title: On the Usability of Secure Association of Wireless Devices Based On Distance Bounding
Authors: Mario Cagalj, Nitesh Saxena and Ersin Uzun
2. Title: Short Hash-based Signatures for Wireless Sensor Networks
Authors: Erik Dahmen and Christoph Kraus
11:55-12:55 Invited Talk(3) Chair: Atsuko Miyaji
  Title: Computing on Encrypted Data
Speaker: Craig Gentry (IBM Research, US)
12:55-14:15 Lunch
14:15-15:30 Session 10: 3 Presentations (25min each)
<<Cryptographic Protocol and Schemes II>> Chair: TBA
1. Title: Fully Robust Tree-Diffie-Hellman Group Key Exchange
Authors: Mark Manulis, Emmanuel Bresson and Timo Brecher
2. Title: Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Authors: Benoit Libert and Damien Vergnaud
3. Title: Relinkable Ring Signature
Authors: Koutarou Suzuki, Fumitaka Hoshino and Tetsutaro Kobayashi
15:30-15:40 Closing