All talks take place in the Quality Hotel. All contributed talks have a slot of 25 minutes, including questions.
Prof. Geir Egil Øien, Dean, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU
Sequences, Codes and Cryptography
[Slides]
Prof. Tor Helleseth, University of Bergen, Norway
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model
[Slides]
Masayuki Fukumitsu and Shingo Hasegawa
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures
[Slides]
Bei Liang, Hongda Li and Jinyong Chang
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures
Fuqun Wang, Kunpeng Wang, Bao Li and Yuanyuan Gao
Graded Signatures
[Slides]
Aggelos Kiayias, Murat Osmanoglu and Qiang Tang
Dynamically Provisioning Isolation in Hierarchical Architectures
[Slides]
Kevin Falzon and Eric Bodden
Factors Impacting the Effort Required to Fix Security Vulnerabilities
[Slides]
Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim Brucker and Philip Miseldine
Software Security Maturity in Public Organisations
[Slides]
Martin Gilje Jaatun, Daniela Soares Cruzes, Karin Bernsmed, Inger Anne Tøndel and Lillian Røstad
Extending the Applicability of the Mixed-integer Programming Technique in Automatic Differential Cryptanalysis
[Slides]
Siwei Sun, Lei Hu, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song and Jinyong Shan
Automatic Search for Linear Trails of The SPECK Family
[Slides]
Yuan Yao, Bin Zhang and Wenling Wu
From Related-Key Distinguishers to Related-Key Key-Recovery on Even-Mansour Ciphers
[Slides]
Pierre Karpman
Authenticated Encryption and Secure Channels: There and Back Again
[Slides]
Prof. Kenny Paterson, Royal Holloway University of London, UK
Oblivious PAKE: Efficient Handling of Password Trials
[Slides]
Franziskus Kiefer and Mark Manulis
Secure and Efficient Private Set Intersection Cardinality using Bloom Filter
[Slides]
Sumit Kumar Debnath and Ratna Dutta
On the Efficiency of Multi-Party Contract Signing Protocols
[Slides]
Gerard Draper Gil, Jose-Luis Ferrer-Gomila, M. Francisca Hinarejos and Jianying Zhou
On the Provable Security of the Dragonfly Protocol
[Slides]
Marjan Skrobot and Jean Lancrenon
Multipath TCP IDS Evasion and Mitigation
[Slides]
Zeeshan Afzal and Stefan Lindskog
Provenance based Classication Access Policy System based on Encrypted Search for Cloud Data Storage
[Prezi presentation]
Xinyu Fan, Vijay Varadharajan and Michael Hitchens
Multi-User Searchable Encryption in the Cloud
[Slides]
Cédric Van Rompay, Melek Önen and Refik Molva
CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency
[Slides]
Zhiwei Wang and Siu Ming Yiu
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
[Slides]
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay
Hashing into Jacobi Quartic Curves
Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He and Song Tian
Two Generic Analysis Methods of Stream Ciphers
[Slides]
Lin Jiao, Bin Zhang and Mingsheng Wang
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
[Slides]
Massimo Chenal and Qiang Tang
Bit Error Probability Evaluation of RO PUFs
[Slides]
Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing
Extracting Robust Keys from NAND Flash Physical Unclonable Functions
[Slides]
Jia Shijie and Xia Luning
On Security of a White-Box Implementation of SHARK
[Slides]
Yang Shi and Hongfei Fan
GPU-Disasm: A GPU based x86 Disassembler
[Slides]
Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis and Georgios Portokalidis
Reasoning about privacy properties of biometric system architectures
in the presence of information leakage
[Slides]
Julien Bringer, Hervé Chabanne, Danie Le Métayer and Roch Lescuyer
Improvement of Multibit Information Embedding Algorithm for Palette-Based Images
[Slides]
Anu Aryal, Kazuma Motegi, Shoko Imaizumi and Naokazu Aoki
Efficient ephemeral elliptic curve cryptographic keys
[Slides]
Andrea Miele and Arjen K. Lenstra
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications
Aggelos Kiayias, Ozgur Oksuz and Qiang Tang