Cryptology2014 | International Cryptology and Information Security 2014
 
Home Call for Papers Committee Important Dates Invited Speakers Registration Submission Programs Conference Venue Contact Us

Cryptology2014 - Programs
 
24th June 2014
0900 - 1230 Registration
1400 - 1430 Officiation of Cryptology2014
1430 - 1440 Photograph Session
1440 - 1525 Keynote 1 - Prof Abderrahmane Nitaj
1525 - 1530 Break
1530 - 1600 Special Session by Digicert
1600 - 1615 Tea break
1615 - 1625 Paper 1:
Certificateless Public Key Encryption (CL-PKE) Scheme Using Extended Chebyshev Polynomial Over the Finite Field ℤp
1625 - 1655 Paper 2:
On the Security of a Strongly Secure Efficient Certificateless Signature Scheme
1655 - 1615 Paper 3:
Group Ring Codes Over a Dihedral Group
1715 - 1735 Paper 4:
Harmonic Analysis and a Bentness-like Notion in Certain Finite Abelian Groups Over Some Finite Fields
 
25th June 2014
0830 - 0850 Paper 5:
Survey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks
0850 - 0910 Paper 6:
An Identification Scheme Based On Bivariate Function Hard Problem
0910 - 0930 Paper 7:
Implementation of Identity-Based and Certificateless Identification on Android Platform
0930 - 0950 Paper 8:
Cryptanalysis of an ID-based Blind Signature Scheme
0950 - 1010 Tea Break
1010 - 1055 Keynote 2 - Prof Kouichi Sakurai
1055 - 1115 Paper 9:
Combined Encryption, Signature and Multisignature Schemes
1115 - 1135 Paper 10:
A New Arbitrated Signing Scheme Based on BFHP
1135 - 1155 Paper 11:
Comparative Analysis of Three Asymmetric Encryption Schemes Based Upon the Intractability of Square Roots Modulo N=p2q
1155 - 1215 Paper 12:
Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem
1215 - 1430 Lunch Break
1430 - 1515 Keynote 3 - Prof Andreas Enge
1515 - 1535 Paper 13:
Fast Computation in wNAF Expansion Method for Integer Sub-Decomposition Elliptic Scalar Multiplication
1535 - 1555 Paper 14:
Pseudo t-AdicNon Adjacent Formfor Scalar Multiplication on Koblitz Curves
1555 - 1615 Paper 15:
Improved S-Box Construction from Binomial Power Functions
1615 - 1635 Paper 16:
Analysis on Lightweight Block Cipher, SIMON
1635 - 1655 Paper 17:
Linear Extension Cube Attack on Stream Ciphers
1655 - 1715 Paper 18:
Randomness Analysis on Speck Family of Lightweight Block Cipher
2000 - 2200 Gala Dinner
 
26th June 2014
0850 - 0910 Paper 19:
Compression-Crypto Technique: Smaller Size of the Compressed Plaintext
0910 - 0930 Paper 20:
A Construction of Secret Sharing Scheme
0930 - 0950 Paper 21:
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem
0950 - 1010 Tea Break
1010 - 1055 Keynote 4 - Asst. Prof. Sherman S. M. Chow
1055 - 1115 Paper 22:
Digital watermarking using a fusion of Digital Holographic interferometry and Singular Value Decomposition
1115 - 1135 Paper 23:
Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion
1135 - 1155 Paper 24:
A Balanced Secure Cryptographic Algorithm against Timing and Side Channel Attacks
1155 - 1215 Paper 25:
Investigation Of Medical Identity Theft In Healthcare Sector: Its Statistics, Effects And Way Out
1215 - 1430 Lunch Break
1430 - 1515 Keynote 5 - Mr. Mahmud Ab Rahman
1515 - 1535 Paper 26:
A Survey of Network Protocol based Steganographic Techniques
1535 - 1555 Paper 27:
Digital Forensics: An Overview of the Current Trends
1555 - 1630 Closing Remarks
1730 - 2130 Kuala Lumpur Night Tour


Cryptology2014 | International Cryptology and Information Security 2014