AIST > RCIS > Research Topics > JST-DST Strategic Cooperative Program > 2010 Japan-Indo Joint Workshop on Cryptology and Related Areas
2010 Japan-Indo Joint Workshop on Cryptology and Related Areas
Date: | July 8, 2010 |
Venue: | AIST Akihabara Site, Tokyo Japan |
Sponsors: | JST and DST |
Program
10:00 - 10:30 Opening
10:30 - 12:00 Session 1: Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science
- Information Theoretic Discussions on Perfectly Secure Multi-use Multi-secret Sharing Scheme, Avishek Adhikari (Univ. of Calcutta)
- Improved Subset Difference Method based on Ternary Tree, Kazuhide Fukushima (KDDI Labs)
- On Deployment of Sensors, Bimal Roy (ISI, Kolkata)
- Non-committing Encryption Scheme Based on DDH Assumption, Takashi Nishide (Kyushu Univ.)
12:00 - 13:00 Lunch
13:00 - 14:30 Session 2: Security Proofs and Multidisciplinary Evaluation for Dynamic Hierarchical Key Assignment Schemes
- A Framework for Choosing Security Modules, Kanta Matsuura (Univ. of Tokyo)
- Nominative Signatures, Jacob Schuldt (Univ. of Tokyo)
- On the Security Proof of Wu-Wei Hierarchical Key Assignment Scheme, Murali Medisetty (DA-IICT)
14:30 - 15:00 Coffee Break
15:00 - 16:30 Session 3: Security Evaluation and Design of Components and Cryptographic Primitives for RFID and Sensor Networks
- A Generic Weakness of the k-normal Boolean Functions Exposed to Dedicated Algebraic Attack, Miodrag Mihaljevic (AIST), Goutam Paul (Jadavpur Univ.) and Sugata Gangopadhyay (IIT Roorkee)
- RFID Authentication Using Quasi-Dyadic Fix Domain Shrinking, Yang. Cui (AIST)
- Computationally Secure Communication in the Wire-tap Scenario, Kirill Morozov (AIST)
- A Low Complexity Encryption Technique Based on Joint Employment of Pseudorandomness, Randomness and Coding, Miodrag Mihaljevic (AIST)
16:30 - 17:00 Coffee Break
17:00 - 18:00 Round Table Discussion and Closing