Program
9th China International Conference on Information Security and Cryptology (Inscrypt 2013)

November 27-30, 2013, Guangzhou, China

Inscrypt 2013 advanced program The conference program for Inscrypt 2013 is available in WORD format and PDF format. These files were last updated on November 24th, 2011. Some changes may be made possible at the conference for unpredictable reasons.


Nov. 27

16:00-18:30

Conference on site registration

The Hall in Junhui Building

19:00-20:30

Dinner

Jintai Hall

Nov. 28

08:00-12:00

Conference on site registration

The Hall in Junhui Building

08:30-08:50

Opening Speech

Jinxing Hall

08:50-09:50

Invited Talk ( I )

09:50-10:30

Group Photo and Tea Break

10:30-11:50

Session 1

12:00-13:30

Lunch

Jinxiu Hall

13:30-15:00

Session 2

Jinxing Hall

15:00-15:30

Tea Break

15:30-17:20

Session 3

17:30-19:30

Conference Banquet

Jintai Hall

Nov. 29

8:30-9:30

Invited Talk ( II )

Jinxing Hall

9:30-10:00

Tea Break

10:00-12:00

Session 4

12:00-13:30

Lunch

Jinxiu Hall

13:30-15:10

Session 5

Jinxing Hall

15:10-15:40

Tea Break

15:40-16:40

Session 6

16:40-17:40

Session 7

18:00-19:00

Dinner

Jinxiu Hall

19:30-22:00

Pearl River Night Cruise (Free)

Nov. 30

8:30-9:30

Invited Talk ( III )

Jinxing Hall

9:30-10:00

Tea Break

10:00-12:00

Session 8

12:20-13:30

Lunch

Jinxiu Hall

Nov.30-
Dec.1

Zhaoqing Sightseeing
(free)

Dinghu Mountain Scenic Area and Qi Xing Yan Scenic Spot in Zhaoqing, which is about 100 kilometers distance from Guangzhou. We will leave Guangzhou at 14:00 on Nov 30, and return Guangzhou at 15:00 on Dec 1.

 

9th China International Conference on Information Security and Cryptology (Inscrypt 2013)

November 27-30, 2013, Guangzhou, China

November 27 , 2013

16:00-18:30

Conference on site registration

19:00-20:30

Dinner

November 28 , 2013

08:00-12:00

Conference on site registration

08:30-08:50

Opening Speech

Invited Talk (I)
Session Chair: Dingyi Pei

08:50-9:50

Crypto Against Extreme Attacks
Moti Yung

09:50-10:30

Group Photo and Tea Break

Session 1: Boolean Function and Block Cipher
Session Chair: Wenling Wu

10:30-11:00

A note on semi-bent and hyper-bent Boolean functions
Chunming Tang, Yu Lou, Yanfeng Qi, Maozhi Xu and Baoan Guo

11:00-11:30

New Construction of Differentially 4-Uniform Bijections
Claude Carlet, Deng Tang, Xiao Tang and Qun Liao

11:30-11:50

Automatic Security Evaluation of Block Ciphers with S-bP Structures against Differential Attack (Short Paper)
Siwei Sun, Lei Hu, Ling Song, Yonghong Xie and Peng Wang

12:00-13:30

Lunch

Session 2: Sequence and Stream Cipher
Session Chair: Vladimir Anashin

13:30-14:00

On the key-stream periods probability of Edon80
Yunqing Xu

14:00-14:30

Cube Theory and stable $k$-error Linear Complexity for Periodic Sequences
Jianqin Zhou and Wanquan Liu

14:30-15:00

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six over $Z_{pq}$
Xinxin Gong, Bin Zhang, Dengguo Feng and Tongjiang Yan

15:00-15:30

Tea Break

Session 3: Applications: Systems and Theory
Session Chair: Dongdai Lin

15:30-16:00

Automatic Detection and Analysis of Encrypted Messages in Malware
Ruoxu Zhao, Dawu Gu, Juanru Li and Yuanyuan Zhang

16:00-16:30

EAdroid: Providing Environment Adaptive Security for Android system
Hongliang Liang and Yu Dong

16:30-17:00

Supervised Usage of Signature Creation Devices
Przemystaw Kubiak and Mirostaw Kutytowski

17:00-17:30

A practical attack on patched MIFARE Classic
Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang and Chen-Mou Cheng

17:30-19:30

Conference Banquet

November 29 , 2013

Invited Talk (II)
Session Chair: Shouhuai Xu

08:30-09:30

Security and Privacy Implications of Wireless Communication in Embedded Systems
Wenyuan Xu

09:30-10:00

Tea Break

Session 4: Computational Number Theory
Session Chair: Fangguo Zhang

10:00-10:30

Omega Pairing on Hyperelliptic Curves
Shan Chen, Kunpeng Wang and Dongdai Lin

10:30-11:00

Pairing computation on Edwards curves with high-degree twists
Liangze Li, Hongfeng Wu and Fan Zhang

11:00-11:30

The Gallant-Lambert-Vanstone Decomposition Revisited
Zhi Hu and Maozhi Xu

11:30-12:00

Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit Processors
Zhe Liu, Johann GroBschadl and Duncan S. Wong

12:00-13:30

Lunch

Session 5: Public Key Cryptography
Session Chair: Chunming Tang

13:30-14:00

Secure One-to-Group Communications: Escrow-Free ID-Based Asymmetric Group Key Agreement
Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S.M. Chow and Wenchang Shi

14:00-14:30

Security Model and Analysis of FHMQV, Revisited
Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang and Yunlei Zhao

14:30-14:50

RSA-OAEP is RKA Secure (Short Paper)
Dingding Jia, Bao Li, Xianhui Lu and Yamin Liu

14:50-15:10

A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme (Short Paper)
Zhengjun Cao, Frederic Lafitte and Olivier Markowitch

15:10-15:40

Tea Break

Session 6: Hash Function
Session Chair: Miroslaw Kutylowski

15:40-16:10

LHash: A Lightweight Hash Function
Wenling Wu, Shuang Wu, Lei Zhang, Zou Jian and Dong Le

16:10-16:40

Cryptanalysis of the Round-Reduced GOST Hash Function
Jian Zou, Wenling Wu and Shuang Wu

Session 7: Side-Channel and Leakage
Session Chair: Miroslaw Kutylowski

16:40-17:10

Multivariate Leakage Model for Improving Non-Profiling DPA on Noisy Power Traces
Suvadeep Hajra and Debdeep Mukhopadhyay

17:10-17:40

Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
Mingjie Liu, Jiazhe Chen and Hexin Li

18:00-19:00

Dinner

19:30-22:00

Pearl River Night Cruise (Free)

November 30 , 2013

Invited Talk (III)
Session Chair: Moti Yung

08:30-09:30

Cybersecurity Dynamics
Shouhuai Xu

09:30-10:00

Tea Break

Session 8: Application and System Security
Session Chair: Wenyuan Xu

10:00-10:30

Environment-bound SAML assertions: A fresh approach to enhance the security of SAML assertions
Kai Chen, Dongdai Lin, Li Yan and Xin Sun

10:30-11:00

One-time Programs with Limited Memory
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana and Michat Zajac

11:00-11:30

Voluntarily Defusing Conflicts of Interest by Authorization Policies
Nezar Nassr and Eric Steegmans

11:30-11:50

Cryptanalysis of three Authenticated Encryption Schemes for Wireless Sensor Networks (Short Paper)
Xiaoqian Li, Peng Wang, Bao Li and Zhelei Sun

11:50-12:00

Closing Remark

12:00-13:30

Lunch


Inscrypt 2013 advanced program The conference program for Inscrypt 2013 is available in WORD format and PDF format. These files were last updated on November 24th, 2011. Some changes may be made possible at the conference for unpredictable reasons.