Conference Program
Day 1 - June 7, 2011
8:00 - 8:30 : Registration
8:30 - 9:00 : Welcome address
9:00 - 10:30 : Session 1: Malware & Intrusion Detection
- Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. Yipeng Wang, Zhibin Zhang, Danfeng Yao, Buyun Qu and Li Guo.
- A Specification Based Intrusion Detection Framework for Mobile Phones. Ashwin Chaugule, Zhi Xu, and Sencun Zhu.
- Misuse Detection in Consent-based Networks. Mansoor Alicherry and Angelos Keromytis.
Coffee Break
11:00 - 13:00 : Session 2: Attacks I
- Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Martin Albrecht and Carlos Cid.
- Exponent Blinding Does not Always Lift (Partial) SPA Resistance to Higher-Level Security. Werner Schindler and Kouichi Itoh.
- Practical Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. Alex Biryukov, Ilya Kizhvatov and Bin Zhang.
- Cache Timing Analysis of RC4. Thomas Chardin, Pierre-Alain Fouque and Delphine Leresteux.
Lunch
14:30 - 15:30 : Session 3: Applied Crypto I
- Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Dana Dachman-Soled, Tal Malkin, Mariana Raykova and Moti Yung.
- Private Discovery of Common Social Contacts. Emiliano De Cristofaro, Mark Manulis and Bertram Poettering.
Coffee Break
16:00 - 17:30 : Industrial Track Session 1
- Mind your nonces: cryptanalysis of a privacy-preserving distance bounding protocol. Jean-Philippe Aumasson, Aikaterini Mitrokotsa and Pedro Peris-Lopez.
- Secret Data Randomisation Secure Against Higher-Order Side Channel Analysis. Guillaume Fumaroli, Philippe Painchault and Sonia Belaid.
- Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL. Yasuhide Sakai, Yu Sasaki, Lei Wang, Kazuo Ota and Kazuo Sakiyama.
Day 2 - June 8, 2011
8:30 - 9:00 : Registration
9:00 - 10:30 : Session 4: Signatures & Friends
- Sanitizable Signatures in XML Signature-Performance, Mixing Properties, and Revisiting the Property of Transparency. Henrich Christopher Pöhls, Kai Samelin and Joachim Posegga.
- Double-Trapdoor Anonymous Tags for Traceable Signatures. Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev and Miyako Ohkubo.
- Hierarchical Identity-Based Chameleon Hash and its Applications. Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai and Yunlei Zhao.
Coffee Break
11:00 - 12:00 : Invited Talk 1: Refik Molva (EURECOM, France)
12:00 - 13:30 : Session 5: Eclectic Assortment
- Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt and Kanta Matsuura.
- Quantitatively Analyzing Stealthy Communication Channels. Patrick Butler, Kui Xu and Danfeng (Daphne) Yao.
- Fully Non-Interactive Onion Routing with Forward-Secrecy. Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro and Orazio Puglisi.
Lunch
Afternoon and Evening: Social Event
Day 3 - June 9, 2011
8:30 - 9:00 : Registration
9:00 - 10:30 : Session 6: Theory
- Generic Fully Simulatable Adaptive Oblivious Transfer. Kaoru Kurosawa, Ryo Nojima and Le Trieu Phong.
- Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. Ashish Choudhury, Kaoru Kurosawa and Arpita Patra.
- Relaxed Security Notions for Signatures of Knowledge. Marc Fischlin and Cristina Onete.
Coffee Break
11:00 - 12:00 : Invited Talk 2: Ed Dawson (QUT, Australia)
12:00 - 13:00 : Session 7: Encryption
- LBlock: A Lightweight Block Cipher. Wenling Wu and Lei Zhang.
- On Hiding a Plaintext Length by Preencryption. Cihangir Tezcan and Serge Vaudenay.
Lunch
14:30 - 15:30 : Session 8: Broadcast Encryption
- Fighting Pirates 2.0. Paolo D'Arco and Angel L. Perez del Pozo.
- Security Notions for Broadcast Encryption. Duong Hieu Phan, David Pointcheval and Mario Strefler.
Coffee Break
16:00 - 17:30 : Industrial Track Session 2
- CardSpace-Shibboleth Integration for CardSpace Users. Haitham Al-sinani and Chris Mitchell.
- Spam Detection Through Sliding Windowing of E-mail Headers. Francisco Javier Salcedo-Campos, Jesús Esteban Díaz-Verdejo and Pedro García-Teodoro.
- Secure Multi-Party Sorting and Applications. Kristján Valur Jónsson, Gunnar Kreitz and Misbah Uddin.
Evening : Gala Dinner
Day 4 - June 10, 2011
8:30 - 9:00 : Registration
9:00 - 10:30 : Session 9: Security Services
- Towards User-Friendly Credential Transfer on Open Credential Platforms. Kari Kostiainen, N. Asokan and Alexandra Afanasyeva.
- Non-transferable User Certification Secure Against Authority Information Leaks and Impersonation Attacks. Jacob C. N. Schuldt and Goichiro Hanaoka.
- Composable Security Analysis of OS Services. Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner and Wietse Venema.
Coffee Break
11:00 - 13:00 : Session 10: Attacks II
- Practical attacks on the Maelstrom-0 compression function. Stefan Kölbl and Florian Mendel.
- Linear Analysis of Reduced-Round CubeHash. Tomer Ashur and Orr Dunkelman.
- On the Indifferentiability of Fugue and Luffa. Rishiraj Bhattacharyya and Avradip Mandal.
- Analysis of Message Injection in Stream Cipher-based Hash Functions. Yuto Nakano, Carlos Cid, Kazuhide Fukushima and Shinsaku Kiyomoto.
Lunch
14:30 - 15:30 : Session 11: Applied Crypto II
- Secure Authenticated Comparisons. Keith B. Frikken, Hao Yuan and Mikhail J. Atallah.
- Public-Key Encryption with Delegated Search. Luan Ibraimi, Svetla Nikova, Pieter Hartel and Willem Jonker.
Coffee Break
16:00 - 17:30 : Industrial Track Session 3
- Comparing the Elliptic Curve Digital Signature Algorithm over GF(p) and GF(2m) on an Area-Optimized Custom Microprocessor. Erich Wenger.
- Efficient Implementation of the EtaT Pairing on GPU. Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng and Tsuyoshi Takagi.
- Multi-Receiver Perfectly Secure Message Transmission Protocols with Broadcast End Channels. Yvo Desmedt, Stelios Erotokritou and Qiushi Yang.